End-to-end Encryption

美 [end tu end ɛnˈkrɪpʃən]英 [end tu end ɪnˈkrɪpʃ(ə)n]
  • 网络端到端加密
End-to-end EncryptionEnd-to-end Encryption
  1. IDEA is a symmetrical block cipher . End-to-end encryption based on IDEA is presented and analyzed .

    分析了基于分组密码算法IDEA设计的端-端加密系统。

  2. Research on End-to-end Encryption Mechanism of TETRA

    TETRA系统端-端加密机制研究

  3. Design of TETRA End-to-End Encryption System

    TETRA端-端加密系统设计

  4. The TETRA system also supports powerful DMO mode and enables authentication , air interface encryption and end-to-end encryption .

    能支持功能强大的移动台脱网直通(DMO)方式,可实现鉴权、空中接口加密和端对端加密;

  5. We protect personal conversations by providing end-to-end encryption over IMessage and FaceTime .

    我们在iMessage和FaceTime上提供点对点加密,以此保护私人谈话。

  6. The first is end-to-end encryption , which Apple uses in its iMessage system and FaceTime , the video conversation system .

    一种是端到端加密,苹果公司在iMessage和视频聊天服务FaceTime中就使用了这种方式。

  7. An end-to-end encryption module of MAS key management system is designed and realized in this paper with the functions of key generation , key storage , key management and key destruction . 3 .

    本文设计并实现了一个MAS组播加密系统的密钥管理系统,完成了MAS组播加密系统的密钥产生、密钥存储、密钥管理以及密钥销毁等功能。

  8. The scheme can guarantee the confidentiality and integrity of messages during transmission and storage on the terminal . Secondly , this paper completes the terminal program design of the end-to-end encryption for public communication systems .

    该方案可以保证消息在传输过程中和终端存储时的机密性和完整性其次,本文完成了移动通信系统端到端加密的终端程序设计。

  9. This article systematically discussed two kinds of encryption technology : Symmetrical expression encryption , public key encryption , as well as three encryption ways in network : link encryption , pitch point encryption and end-to-end encryption .

    该文系统地讨论了两种加密技术:对称式加密、公开密钥加密,并探讨了网络中的三种加密方式:链路加密、节点加密和端到端加密。

  10. Many understood him to be taking aim at internet communications services that use end-to-end encryption , a now-common technology that makes it impossible to read messages even if they are intercepted in transit .

    许多人认为他针对的是使用端到端加密的互联网通信服务。端到端加密是目前普遍使用的一种技术,它让信息在传输过程中即使被拦截也无法读取。

  11. Mr. Comey recently told CNN , Our job is to find needles in a nationwide haystack , needles that are increasingly invisible to us because of end-to-end encryption .

    科米最近告诉CNN,我们的工作就是在整个国家的这片大海中捞针,因为端到端的加密,这些针现在越来越难找了。

  12. Mr. Comey recently told CNN , " Our job is to find needles in a nationwide haystack , needles that are increasingly invisible to us because of end-to-end encryption . "

    科米最近告诉CNN,“我们的工作就是在整个国家的这片大海中捞针,因为端到端的加密,这些针现在越来越难找了。”

  13. Therefore , this paper will focus on the secure communication technology on mobile terminals , including the end-to-end encryption for public mobile communication systems and the security of mobile online bank . Firstly , this paper proposes an end-to-end encryption scheme for public mobile communication systems .

    因此,本文将从移动通信端到端加密和移动网络银行安全两个方面,对移动终端中的通信安全技术进行研究。首先,本文提出了一种移动通信系统端到端加密方案。

  14. In this paper , on according to system analysis of several network encryption , researching the cryptographic scheme of link encryption , end-to-end encryption and the goodness and sickness of two kinds of cryptographic forms , finding the reasonable network encryption form on several network environment .

    针对网络加密不同方式的系统分析,详细地研究了链路加密和端对端加密的原理和2种加密的优缺点,根据不同的网络环境,找出了合理化的网络加密方式。

  15. The design and application of a new end-to-end data encryption system

    一种新型端端数据加密方法的设计与应用

  16. By the technology of VPN , Private path can be created to transfer important data , Secure communication can be done by the end-to-end data encryption .

    利用VPN技术,为数据传输建立私有通道,实现数据端到端的加密传输。

  17. Design and implementation of a SIP-based secure mobile VoIP system ; including authentication , key management and end-to-end voice encryption , as well as the test and evaluation of its functionality , real-time performance and security .

    设计并实现了基于SIP的移动VoIP安全系统,主要功能包括身份认证、密钥管理以及语音的端到端加解密,并对系统的功能性、实时性和安全性等进行了详细的测试与评估。

  18. Research on End-to-End Authentication and Encryption Protocols of Ad Hoc Network

    adhoc网络端到端认证加密协议研究