security communications造句
例句與造句
- A solution to security communication via wireless network
無線網(wǎng)絡安全通信的一種方法 - Three kinds of chaotic security communication schemes based on logistic map
映射的三種混沌保密通信方案 - Make sure that security communication is in use with perlos management and perlos corporation communication department
確認貝爾羅斯內(nèi)部順暢的安全信息溝通。 - The router with ipsec is meant to provide security communication on the basis of the ipsec implementation
基于ipsec協(xié)議的路由器的目的就是以ipsec的實現(xiàn)為基礎,提供網(wǎng)絡信息的安全通信。 - Then , the security protocol is performed on security platform , we achieve a really high - performance and security communications
安全的協(xié)議運行在安全可靠的平臺上,實現(xiàn)真正的高效、安全通信。 - It's difficult to find security communications in a sentence. 用security communications造句挺難的
- Abstract : in this paper , we present a series of important applications of blind signature to computer security communication , especially to electronic voting and electronic cash
文摘:根據(jù)近年來國內(nèi)外關于數(shù)字簽名的研究背景及進展,闡述盲簽名在計算機保密通信,特別是在電子貨幣等方面的一系列重要應用。 - With the knowledge of computer network security widespread , the demand for security communication become more and more imminence . the developer of network application are confronted with big challenge
隨著計算機網(wǎng)絡安全技術的普及,人們對安全通信的需求將會越來越迫切,這必將對網(wǎng)絡應用系統(tǒng)的開發(fā)者提出更高的要求。 - First researches the system of ipsec security protocol deeply , then discusses the problems of security in end - to - end communication , advances the idea of resolving problems in end - to - end security communication using ipsec
論文首先對ipsec安全協(xié)議體系進行了深入分析,討論了端到端通信中的安全問題,提出了利用ipsec實現(xiàn)端到端安全通信的思想。 - The main problem includes the follow two ways : search or discovery resource and security communication . this thesis proposed a novel trust model based upon peer - to - peer network , one of the most popular and rapidly developed networking structures
本文在分析研究傳統(tǒng)信任模型的基礎上,結(jié)合近兩年最熱門的網(wǎng)絡架構(gòu)方式,建立了一種新的基于p2p網(wǎng)絡的信任模型。 - This system realizes the underwater distance mobile security communication . the only shortage is the low velocity , which is result from the speciality of underwater channel and that spread spectrum need big frequency band
采用這一技術的水聲通信實驗系統(tǒng)成功的進行了湖上試驗,這種技術的不足是通信速率較低,這是由于水聲信道的特殊性以及擴頻技術要占用大量帶寬所致。 - The main work of this paper is focused on the design of the latter ip module . in reader software ip design , the method of crc was used to ensure the communication reliability between the reader and responder . and the des encryption is applied to security communication
在閱讀器ip軟件設計中采用crc校驗碼檢錯、出錯重發(fā)相結(jié)合的方法來確保應答器與閱讀器的通信可靠;將des加密算法應用于系統(tǒng)的安全通信,最終實現(xiàn)了本文的設計方案。 - To make sure the railway sell - ticket system running under security , we empolders the system of database security communication ; the system is one of the railway security sell - ticket system , afford the security channel for data translate and the control of accessing
為了保證鐵路售票系統(tǒng)的安全運行,我們開發(fā)了數(shù)據(jù)庫安全通信系統(tǒng),該系統(tǒng)作為鐵路安全售票系統(tǒng)的主要子系統(tǒng),提供了數(shù)據(jù)傳輸?shù)陌踩ǖ兰霸L問控制,已經(jīng)通過了公安部的評審。 - Based upon the sensitive dependence of chaotic systems on their initial conditions , a large number of non - periodic , continuous broadband frequency spectrum , noise - like , yet deterministic and reproducible signals can be generated , so chaotic technology is very useful for security communications
由于混沌動力系統(tǒng)對初始條件的極端敏感性,而能產(chǎn)生大量的非周期、連續(xù)寬帶頻譜、似噪聲且確定可再生的混沌信號,因而特別適用于保密通信領域。 - Finally , according to the request for secure data transmission in an open network , a design scheme for a component - based network cryptography database system , an adopter of pki technology is developed . the scheme implements enterprise security communication platform based on certificate authority ( ca )
其次,根據(jù)數(shù)據(jù)在網(wǎng)絡傳輸中的保密需求,遵循pki思想,采用其數(shù)字證書機制,提出了以pki安全組件為核心的網(wǎng)絡密文數(shù)據(jù)庫系統(tǒng)的設計思想和ncds解決方案。 - The model controls the dynamic security of network information flow on four layers : security entrance layer requires user authentication and encapsulates security information flow ; social intelligence layer makes information flow to have the ability of self - sensing self - protecting and self - adjusting ; business layer carries out business logic in forms of transactions which can be submitted , processed and roll back , in order to provide real - time protecting and online recovering ; tcp / ip security layer ensures security communication for information flow
該模型分4個層次控制網(wǎng)絡信息流的動態(tài)安全;安全入口層負責用戶的身份驗證和信息流的安全封裝;社會智能層賦予信息流自我感應、自我保護、自我調(diào)控的行為能力;事務層實現(xiàn)商業(yè)事務的提交、處理、回滾,提供實時保護和在線恢復機制; tcp / ip安全協(xié)議層則保障網(wǎng)絡信息流的安全傳輸。
更多例句: 下一頁