保密技术

  • 网络Security Techniques
保密技术保密技术
  1. 我们采用各种保密技术来确保用户信息的安全。

    We employ security techniques to safeguard user information .

  2. 采用IC卡自动管理系统、安全保密技术和加强计算机病毒防护等措施,可进一步加强和完善企业局域网的管理和维护。

    The management and maintenance and maintenance of LAN of enterprise will be enhanced and perfected after adopting IC card auto management system , safety and security techniques , and emphasizing the prevention of computer virus , etc. .

  3. 基于FPGA的单片机系统总线保密技术

    Security Technology on FPGA Single - chip Computer 's Bus

  4. ATM网络安全保密技术研究

    Research on Techniques of Security and Privacy for ATM Network

  5. 本文主要对无线射频识别(RFID,RadioFrequencyIdentification)技术中的安全保密技术和基于RFID的仓储物流管理的应用进行了研究。

    In this thesis , we conduct a research on the security of RFID ( Radio Frequency Identification ) and the warehouse management based on RFID technologies .

  6. 本文的第二章从基于BP神经网络的电子评标方法、标底保密技术、评审专家随机选取技术和身份认证技术几个方面对招投标系统的相关技术进行了简单的分析和介绍。

    The second part introduced the key technology such as electronic evaluation method based on BP neural network , baseprice security technology , evaluation experts randomly selected technology and identity authentication technology .

  7. 相应地,EDI的关键技术主要包括通信技术、标准化技术、安全保密技术和计算机数据处理技术。

    Therefore , the key technologies of EDI are communication technology , standardization technology , confidentiality technology and computer data process technology .

  8. 本论文的研究内容是结合公司的实际业务需求,来构造EDI应用系统,研究内容涉及EDI的主要相关背景知识,重点分析EDI关键技术中的通信技术、标准化技术和安全保密技术。

    The study content includes major EDI background knowledge , mainly analyses the communication technology , standardization technology and confidentiality technology in the EDI key technologies .

  9. 接着从网络信息安全的角度,特别是从密码学角度阐述信息保密技术。

    Then expatiates the technique about information secret from cryptography angle .

  10. 兵器目标与环境数据库安全保密技术研究

    Study on Safety and Encryption of Ordnance Targets and Environmental Characteristics Database

  11. 基于时频分析的多媒体信息保密技术研究

    Research on Multimedia Information Based on Time-frequency Analysis

  12. 而以密码学理论为基础的传统信息保密技术,还不足以满足现代信息安全的需要。

    Traditional password theory is not enough to meet modern information security technology needs .

  13. 网上档案信息的安全及保密技术

    Safety and security technology of network archives information

  14. 为了提高系统安全性,研究了数据保密技术。

    In order to improve the security of system , data security technology is also researched .

  15. 然后简要地阐述了同步混沌通信三大保密技术:混沌遮掩、混沌调制和混沌开关技术的主要进展。

    The main progress on communications with chaotic masking , chaotic switching and chaotic modulation are introduced .

  16. 信息安全领域的研究包括数据保密技术和认证技术。

    Research in the field of information security , which mainly includes data confidentiality and authentication technology .

  17. 电子商务安全保密技术探略

    The Security Technique of E-Business

  18. 随着信息及保密技术的不断发展,传统的保密与认证方式已越来越难以满足认证安全性的要求。

    As information and security technology develops , the traditional security and authentication technology has become increasingly difficult to guarantee the safety of certification .

  19. 通信技术被称为世界经济和军事的生命线,通信中的保密技术则是核心技术之一。

    The communication technology is the lifeline of the economy and military affairs in world all the time , the secure communication technology is the core .

  20. 目前,单片机应用已十分广泛,其系统的保密技术也多种多样,但大都能被轻易破解,给开发者带来不必要的损失,因此,系统的防泄密功能显得至关重要。

    Though there are various types of security technology to protect system , they are easy to be decoded , which constitutes an unnecessary loss to the developers .

  21. 因此,5年后,中国公司拒绝归还焊接机,而事实上,他们采用保密技术开始生产自己的焊接机。

    So after five years , the Chinese corporation refused to return the welding machine , and in fact , they started producing their own welding machine using the confidential technology .

  22. 公开密钥型数字签名的保密技术研究这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。

    The Research of RSA Algorithm to the Figure Signature The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy .

  23. 阐述了基于C/S和B/S模式的企业管理信息系统的设计过程,如设计原则、系统结构、系统配置、系统功能设计、安全保密技术等。

    The paper illustrater the design procedure of management information system based on C / S and B / S , including its design principle , system infrastructure , configuration , functions and securities .

  24. 其涉及数字化技术、超大规模数据库技术、网络技术、信息压缩与传送技术、分布式处理技术、安全保密技术、可靠性技术、数据仓库与联机分析处理技术、基于内容的检索技术、自然语言理解技术等。

    Involving its digital technology , super-large-scale database technology , network technology , information compression and transmission technologies , distributed processing technology , security technology , reliability technology , data warehouses and online analytical processing technology , based on the content of search technology , natural language understanding technology .

  25. 着重介绍无线局域网的网络结构、传输方式、调制和传输技术,以及无线局域网的网络标准和保密技术,阐述了无线局域网技术的现状、存在问题以及未来发展方向。

    The network structure , transmission mode , modulation and transmission technique , network standards and secret-keeping ( or data encryption ) technique of the wireless LAN are introduced in this paper , and the current situation , existing problems and future development trend of wireless LAN are presented too .

  26. IP层保密通讯技术研究及设计实现

    Study and realization of secure communication in IP layer

  27. 基于IP层的保密通信技术研究及实现

    Study on Secure Communication Based IP Layer

  28. 分析了混沌脉冲位置调制与解调的原理,并对遥测系统中基于PCM数据的脉冲信号的保密传输技术进行了仿真分析,为遥测系统中的脉冲信号加、解密提供了一条新的思路。

    On the basis of the theory , we have discussed and simulated the information secure transmitting technology of the pulse signal in Reenter Telemetry system . A new thought about the pulse signal encryption / decryption in Reenter Telemetry system can be provided from the theory . 6 .

  29. 光纤保密通信技术现状及发展

    Actualities and progress of Three Technology in Optical Fiber Secret Communication

  30. 提出了一种新型的图像保密通信技术。

    In this paper , a scheme of image secure communication is presented .