cryptographic communication

网络  加密通信

计算机



双语例句

  1. Secure Sockets Layer ( SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.
    SecureSocketsLayer(SSL)协议是一种加密协议,可为网络上的数据通信提供隐私和安全保障。
  2. Transport Layer Security ( TLS) is a cryptographic protocol that provides secure communication between clients and servers.
    transportlayersecurity(TLS)是一种密码协议,可以在客户机和服务器之间提供安全的通信。
  3. On the other hand, quantum cryptography can in principle offer unwiretapping, undecrypting cryptographic communication system.
    另一方面,量子密码原则上可以提供不可窃听、不可破译的保密通信体系。
  4. An Efficient Cryptographic Method for Laser Communication
    一种激光识别通信的高效编码加密方法
  5. With the achievement of the chaos synchronization, the more and more attentions are paid to the cryptographic communication, in which the carrier is chaotic signal with good cryptic function, unpredictability, high complexity.
    混沌信号具有隐蔽性、不可预测性、高复杂度和易于实现等特性,随着混沌同步的实现,利用混沌信号作为载波进行保密通信越来越受到广泛的关注。
  6. In our improved scheme, in combination with the specialties of One-Time Password, the elliptic curve cryptographic algorithms was used to encrypt the challenging information in communication and the saving information in the server, to prevent information leaking.
    在改进方案中,根据一次性口令认证的特点,利用椭圆曲线密码算法对通信时的挑战信息进行加密,同时对服务器端保存的信息也采用公钥加密后保存的形式,以防止信息泄露。
  7. A safe cryptographic protocol is one of absolutely necessary components of the communication of networks and its applications, and it is the basis of composing information security systems.
    安全的密码协议是网络通信和应用必不可少的组件之一,是构筑信息安全体系的基础。
  8. Cryptographic Protocol is the base of safe communication of information in open network environment. Its validity plays a key role on network security.
    密码协议是在开放式网络环境中进行安全信息交换的基础,它的正确性对于网络安全极其关键。
  9. By using the cryptographic algorithms of RSA and DES, we can attain the synchronization, integrity verification and secret communication of distributed data under the cooperation of agents located in different autonomous systems.
    该方案采用RSA与DES相结合的加密和认证技术,并通过自治系统中代理的自动协作,有效解决了在PSTN下分布数据的同步及其完整性和机密性保护等问题。
  10. Key management is the core of the symmetric cryptographic communication, and the key generation method is the foundation of the key management.
    密钥管理是对称密钥加密体制的核心,而密钥产生方法则是密钥管理的基础。
  11. Recent improvements of quantum cryptographic communication are analyzed, and the existing problems and development prospect in future are also pointed out.
    还讨论了量子密码通信的历史发展和指出现存在的问题以及未来的发展前景。
  12. The XTR public key system was introduced at Crypto 2000.Application of XTR in cryptographic protocols leads to substantial savings both in communication an computational overhead without compromising security.
    XTR公钥系统2000年首次提出,XTR在密码协议领域的应用,在同等安全性下,大大减少了计算量和通信量。
  13. This paper presents a method to design and realize a POS electronic cryptographic communication system in MODEM interface, communication protocol, ciphering, and communication software.
    介绍了一个POS电子保密通系统的MODEM接口,通讯协议,加密方法,通讯软件等方面的设计与实现方法。
  14. JAVA Realization of Cryptographic Communication Based on SSL
    基于SSL的加密通信的JAVA实现
  15. The Designing and Realizing of the Pos Electronic Cryptographic Communication and Communication Protocols
    POS电子保密通讯及通讯协议的设计与实现
  16. With the development of Internet, the packet processing and cryptographic applications become an important issue of secure communication in the Internet. The problem of secure multiparty computation is fundamental in cryptography, as well as relevant to practical cryptographic applications.
    随着因特网的迅速发展,数据包的处理和加密应用成为公共网络上安全通信的一个研究热点。安全计算问题是密码学协议研究的基础问题之一,也与很多重要的密码学应用相关。
  17. A New Programme of the Distributive Management of Cryptographic Key in Confidential Communication
    保密通信密钥分散保管的一个新方案
  18. The research of quantum information has shown that if one encodes messages onto quantum states, he will be able to achieve a perfect cryptographic communication whose security is unconditionally guaranteed by the well-known uncertainty principle of quantum mechanics.
    量子信息学的研究发现,如果能通过量子态编码来传送密码信息的话,那么依据量子力学不确定性原理,任何对量子载体的测量或复制行为都将改变原量子态。
  19. Sender A and receiver B send two message to confirm each other's identity and exchange a cryptographic key in the meantime, which can realize secure communication and discover any modification to their message by intruders.
    通信双方互相发送一次信息来确认对方身份,同时实现密钥的安全传输,从而实现安全通信,并且还可以发现攻击者的非法篡改。
  20. The Design of the POS Cryptographic Communication System and the Performance Analysis
    POS保密通讯系统的设计与性能分析
  21. Design and Implementation of Cryptographic Computation for Substation Security Communication
    变电站安全通信密码计算的设计与实现
  22. Security electronic commerce protocol which uses the cryptographic methods for network communication, its goal is to provide security services in the complex and insecure environment.
    安全电子商务协议,是使用了密码学方法的协议,其目的就是为了在复杂的、不安全的网络环境中为参加电子商务活动的主体提供各种安全服务。
  23. Cryptographic protocol is the basis of network communication and security applications, and it is an important component of security infrastructure.
    安全协议是网络通信和安全应用的基础,是安全基础设施的重要组成部分。
  24. A cryptographic protocol is a communication protocol that uses cryptographic techniques. It is a basic factor in the design of secure information systems.
    密码协议是指应用密码学方法的通讯协议,它是构建安全信息系统的一个基本要素。
  25. Security protocol, also known as cryptographic protocol, is one interactive communication protocol based on the cryptosystem, which runs within the computer communication networks and distributed systems, by means of cryptographic algorithms to achieve the key distribution, authentication or other purposes.
    安全协议,又称密码协议,是建立在密码体制基础上的一种交互通信协议,它运行在计算机通信网络和分布式系统中,借助于密码算法来达到密钥分配、身份认证等目的。
  26. While improving the cryptographic module external command communication rate.
    同时提高了密码模块的对外命令交互的速率。
  27. Image communication contains large amount of information but high redundancy. The traditional cryptographic algorithms cannot encrypt the image communication very well.
    图像通信包含的信息量很大,冗余度较高,传统密码学算法不能很好的对图像通信进行加密。