保密系统

  • 网络Secrecy System;dds;VCN;NSSS
保密系统保密系统
  1. 这些结果推广了保密系统的通信理论,对密码体制的设计和理解提供了帮助。

    These results develop communication theory of secrecy system and help to design and understanding of cryptosystem .

  2. 基于PKI技术的文件保密系统设计与实现

    Design and Implementation of Secret File Transmission System Based on PKI

  3. 本文详细地分析了乘除算法,并讨论了该算法在RSA公钥保密系统中的应用。

    Analysis of MD algorithm and its application to RSA public-key cryptosystems are given in detail .

  4. SPN在网络安全保密系统可靠性分析中的应用

    Application of SPN in Network Security Secret System Reliability Analysis

  5. 这一事件证明,facebook的个人资料保密系统存在着漏洞该系统本应是密不透风的,个人资料本应仅由facebook和用户亲自挑选的应用程序保管。

    A system that is supposed to be sealed , keeping data in the hands of Facebook and the apps personally selected by its users , turned out to have a leak .

  6. 本文主要针对现有的PSTN语音保密系统的一些缺陷,提出了一种新型的结构方式,解决了PSTN语音系统中双方身份认证问题。

    Aiming at the deficiencies of some unsafe faults in current secure speech systems , a new secure speech structure is proposed . It solves identity authentication of bi-communications across PSTN .

  7. 采用Logistic映射时间离散序列和Rossler时间连续方程产生混沌,并调制到软件无线电中,形成一套基于软件无线电的混沌语音保密系统。

    Used the Logistic Map for discrete value time serial and the Rossler 's equation for time continuity to produce chaotic state and modulate in to the software radio to form a set of the Communication System of Speech Secure with Chaos .

  8. 1949年,C.E.Shannon发表了保密系统的通信理论一文,为密码学奠定了坚实的理论基础,使密码学成为了一门真正的学科。

    In 1949 , C. E. Shannon announced the paper " Communication Theory of Secrecy Systems " which learned to establish the solid theories foundation and make the cryptography become a real subject .

  9. 四川党政网安全保密系统方案设计

    Design of Security System of Party and Government Network in Sichuan

  10. 通信安全保密系统安全性评估指标体系研究

    Research on Indices System of Security Assessment for Communication Secure System

  11. 基于混沌无振荡同步的保密系统

    Secure Communication System Based on Dead - beat Chaos Synchronization

  12. 解决了现有保密系统中有效性不强,保密性不高的问题。

    Solved the existing encryption system effectiveness and privacy problem .

  13. 单向通信保密系统的时序逻辑验证

    Verification of One way Communication Protocol by Using Temporal Logic

  14. ORACLE7安全保密系统的通信验证

    The Authentication of Communication in an ORACLE 7 Security System

  15. 政务信息网络多层次安全保密系统方案设计

    A Design of the Multi-layer Security System of Governmental Affairs Information Network

  16. 吉林省邮政综合计算机网安全保密系统总体技术方案设计

    Overall Technology Programme Design of Jilin Province Postal Computer Network Safe Privacy System

  17. 一种话音保密系统的算法与实现

    Algorithm and Implementation of a Secure Speech Communication System

  18. 平板显示通信中的保密系统研究

    A Study of Cryptosystems for Matrix Display Communication

  19. 量子保密系统真随机源的实现

    True Random Number Generation for the Quantum Cryptography

  20. 语音时域保密系统的研究

    An Investigation on a Time-Domain Speech Security System

  21. 本文提出了一种文字符号显示通信装置。它利用矩阵型平板显示技术的特点,设计了一种新的保密系统。

    According to matrix character display communication technology , we suggested a new cryptosystem .

  22. 城市基础地理信息中心安全保密系统的设计

    Provincial Geomatics Center Security System Design

  23. 随机相位信号检测模型及其在移动通信保密系统中的应用

    The test model of random phasic signal and its application in the mobile privacy radio system

  24. 密钥重构保密系统研究

    Research of reconfigurable key encryption system

  25. 国外保密系统介绍

    Introduction to Cipher Systems from Abroad

  26. 战略空军司令部保密系统

    Strategic Air Command security system

  27. 本文基于复合问题针对信息保密系统提出了一种双重认证的存取控制方案。

    Based on compound problem , this paper proposed an authentication-doubled access control scheme for information protection system .

  28. 几乎所有的电话保密系统都使用回波抵消技术来实现全双工通信。

    The echo cancellation technique is now widely used to implement the full-duplex communication in almost all telephone privacy systems .

  29. 作为保护信息资源机密性和完整性的重要手段,访问控制在保密系统、商业系统中占据了重要地位。

    As a way to defend information 's confidentiality and integrity , access control takes a quite important role in military system and commercial system .

  30. 本文描述了密码保密系统的基本构成及实施密码保密过程中必须作出的选择。

    This paper describes the basic building blocks of a cryptographic security system and the choice which must be made during the implementation of cryptographic security .