信息安全技术

  • 网络IT Security;information security;Information Security Technology
信息安全技术信息安全技术
  1. 随着Internet和信息安全技术的蓬勃发展,网上银行已经成为一种切实可行的银行运营模式。

    With the development of Internet and information security technology , on-line bank has been a practicable banking operating style .

  2. 随着Internet和信息安全技术的飞速发展,信息在网络中的安全传输也越来越重要。

    With the rapid development of Internet and information security technology , security is playing a more and more important role in data transmission .

  3. 基于Web的协同产品开发体系结构及信息安全技术研究

    Research on Architecture and Security Technology for Web-based Cooperative Product Development System

  4. 基于Windows日志的信息安全技术初步研究

    Preliminary Study of Information Security Bases on The Windows Log

  5. 基于SSL信息安全技术及其在Web服务中的应用

    Technology of Information Security by Using SSL and Its Application in Web Services

  6. 接入服务器能为拨号上网用户提供Internet接入服务,因此基于网络信息安全技术的接入服务器有着广阔的市场前景。

    Based on information safety technology , Network Access Server will find a promising market in that it can provide dial-in users Internet access service .

  7. 研究嵌入式以太网信息安全技术,并实现了部分IPsec协议代码的移植和功能测试。

    Part of the IPsec protocol codes are implemented and tested .

  8. 本文的研究成果,为USBKEY提供了芯片级解决方案,同时也为信息安全技术的发展做出重要贡献。

    The research achievement of this thesis supports a chip level solution for USB Key and makes a contribution to domestic information security technology .

  9. 基于PKI体系的信息安全技术研究

    Research on Information Security Technology Based on PKI System

  10. 网络信息安全技术、信息安全协议、P2P技术成为网络隐私安全保护的有效手段。

    Data Security Technology , data security protocols and P2P technology are the effective measures for Online Privacy protection .

  11. Internet信息安全技术的创新在以下几个方面值得注意:(1)信息安全系统构建、模式、评估的创新;

    The following aspects must be paid attention to during our innovation in Internet Information safety Technology : Innovation of construction , mode and evaluation of information safety system ;

  12. 第一章为第一部分,对入侵检测的有关内容进行概要说明,并简述IDS与其他信息安全技术的区别。

    Chapter One is the first part , and it generalizes the contents of Intrusion Detection System .

  13. 本文在对现代信息安全技术进行深入研究的基础上,结合正则表达式技术实现对网络设备日志的智能解析,完成基于信息安全技术的SOC采集器系统的设计。

    In this paper , design SOC collector system based on regular expression technology and information security technology .

  14. 网络信息安全技术的发展,使得单一的用户口令(PIN)认证方式认证强度已经不能满足用户的安全要求。

    Along with the development of network information security technology , authentication with single Personal Identity Number ( PIN ) becomes unsafe .

  15. 公钥基础设施(PublicKeyInfrastructure)作为一套完整的Internet安全解决方案,现已成为信息安全技术的核心,同时也是电子商务的发展的重要保障。

    As an integrated set of Internet security solution , public key infrastructure has been formed the kernel of information security technology . In addition , it becomes the critical and basic technology of electronic commerce .

  16. SSL协议作为电子商务中最重要的信息安全技术之一,是当前研究的热点。

    SSL protocol , as one of the most important information security technology in the e-commerce , is currently a hot research focus .

  17. PKI技术是信息安全技术的核心,也是电子商务的关键和基础技术。

    PKI technology is the core of information security , and also the key and basic technology of e-commerce ( electronic commerce ) .

  18. Internet信息安全技术是具有对抗性的敏感技术,面对日益迫切的安全需要,惟一的出路就是自主创新。

    Internet Information safety Technology is sensitive technology characterized by antagonism . Faced with increasingly pressing need for the safety of the information on Internet , the only solution to the problem is to innovate in technology by ourselves .

  19. 基于角色访问控制(RBAC)技术是信息安全技术研究的热点,它的发展提高了信息系统安全性。

    The Role-Based Access Control ( RBAC ) is important content of information security technology , development of RBAC force information system security .

  20. 结合J2EE的相关技术和开发方式对四个层的实现分别进行阐述和分析,并对基于点播系统的信息安全技术进行了研究,以保护数据库的安全。

    Combining of J2EE related technologies and development of methods to achieve the four layers described and analyzed separately , the security of the database is protected by studying the information security technology about on-demand system .

  21. 深入阐述了信息安全技术中的加解密技术、CA数字证书技术、数字信封、数字签名技术,以及电子商务中的信息加密和身份认证的一般过程。

    It describes in depth the information security technologies such as encryption and decryption algorithms , CA digital certificate , digital envelopment and digital signature technologies . And also it describes the common encryption and authentication process in E-Commerce .

  22. IPSec已经成为一种成熟的信息安全技术,基于IPSec的信息安全产品已经被广泛地用来保护信息传输的安全。

    At the same time security of information is becoming more and more serious . As a mature technology , IPSec has been used in many kinds of information security products .

  23. 利用RFID技术可以追踪、追溯商品的供应链,确保商品在流通过程中的安全;通过与现有信息安全技术结合,可以大大提高造假难度。

    RFID technology can track , trace back the merchandise supply chain , to ensure the security of the merchandise in circulation ; through the existing information security technologies can greatly enhance the difficulty of counterfeiting .

  24. 在对现有的无线局域网信息安全技术进行了分析和总结的基础上,设计和实现了一个增强型接入点AP的安全设计方案。

    Firstly a comprehensive analysis on the current security and authentication technology used in WLAN is introduced . Based on all related problems , an enforced Access Point ( AP ) design scheme is proposed .

  25. 对于信息安全技术,如防火墙、入侵检测、网络防毒、数据备份、网管软件、日志审计、企业CA构建和身份认证等重要技术,灵活运用。

    Handle some important technology flexibly , for example , firewall technology , intrusion detection technology , anti-virus based on network technology , putting data on records , network management software , log audit , CA building and identify-attesting technology and so on .

  26. 它们是:防火墙技术、信息安全技术,包括:数据加密、身份鉴别、Kerberos鉴别系统、虚拟专用网(VPN)、访问控制及必要的安全协议、网络入侵检测与网络防病毒等。

    Chapter III : Expounding main network security techniques including data Encryption , Authentication , Kerberos , Virtual Private Network ( VPN ), Access Control , Security Protocol and Intrusion Detection Systems and Antivirus technique etc.

  27. 对RFID的基础知识包括物理学基础、无线通信原理基础、编码技术、信息安全技术等进行了较为全面、系统的学习,为读写器的设计奠定了理论基础;

    The main contribution of this thesis is as follows : Firstly , the correlative basic theories of RFID , such as physics basic theory 、 wireless communication theory 、 coding technique 、 information safety technique and etc , are expatiated and studied fully and systematically .

  28. 基于DRM的电子文档保护技术是一种新的信息安全技术,主要为了解决电子政务网中电子文档内容保护和安全分发问题。

    The electronic document protection technology based on the DRM ( Digital Rights Management ) is a new information security technology , to solve the problem of content protection and secure distribution of electronic documents in the E-GOV networks .

  29. 然后通过对Hopfield神经网络的非线性动力学和并行处理特性的介绍,说明它既具有实时并行处理功能又具有高度计算复杂性,在信息安全技术的应用中有很好的前景。

    Then , the nonlinear dynamics and parallel processing nature of Hopfield Neural Network ( HNN ) are analyzed to prove that it will have good prospects in information security technology , because of its property of fast parallel real-time processing and high complex computation .

  30. 分组密码协处理器现已成功的应用到了广州大学信息安全技术实验室研制的PCI-FPGA密码卡中。

    The block cipher coprocessor has been applied in a PCI-FPGA cipher card designed by the Information Security Technology Laboratory of Guangzhou University .