端到端加密

  • 网络End-to-end Encryption;end to end encryption
端到端加密端到端加密
  1. 一种是端到端加密,苹果公司在iMessage和视频聊天服务FaceTime中就使用了这种方式。

    The first is end-to-end encryption , which Apple uses in its iMessage system and FaceTime , the video conversation system .

  2. 该文系统地讨论了两种加密技术:对称式加密、公开密钥加密,并探讨了网络中的三种加密方式:链路加密、节点加密和端到端加密。

    This article systematically discussed two kinds of encryption technology : Symmetrical expression encryption , public key encryption , as well as three encryption ways in network : link encryption , pitch point encryption and end-to-end encryption .

  3. 该文针对TCP/IP协议的特点,提出了一种基于IP的端到端加密传输机制。

    Aim at the characteristic of TCP / IP technology , this paper puts forward a End-to-End secure transmission mechanism based on IP .

  4. 文章详细论述了TETRA端到端加密系统的关键部分&TETRA调度台加密系统的设计与实现。

    The paper discusses the scheme of design and implementation of TETRA dispatcher encryption system .

  5. 端到端加密在TETRA集群系统的用户面进行,集群终端设备应具有和端到端加密单元间的电气接口和物理接口,以便于把端到端加密单元装入终端设备中。

    The point to point encryption of TETRA occurs in the user interface , and the trunking endpoints have electronic and physical interfaces for encryption to intergrate the encryption system to the endpoint .

  6. 在TETRA系统的端到端加密中,集群系统不参与密钥的产生和管理,也不规定加密算法,只提供透明传输通路。

    In a point to point encryption of the TETRA system , the trunking system does not participate in the key generation and management , and only provides the clear channel for transportation .

  7. 讨论了TETRA数字集群的安全保密体系,提出了端到端加密、密钥分配管理和共用集群(PAMR)安全虚拟专网的实现方法。

    In this article , architecture of security of TETRA is discussed , implementation method of End to End encryption , key distribution and management , and security of VPN of PAMR is presented .

  8. 基于移动通信网的端到端加密终端研究与实现

    Research on End to End Encryption Terminal in Mobile Communications System

  9. 它还包括了一些独特的特性,例如零配置的端到端加密、自动消息排队和到达消息修改,以及功能强大的动态模块支持。

    It includes unique features like zero-configuration peer-to-peer encryption , automatic message queueing , and incoming message modification , as well as powerful dynamic module support .

  10. 针对移动终端计算能力不足的特点,提出了一套基于对称加密体系的密钥管理和分配方案,为移动终端进行端到端加密提供了共享密钥。

    A key management scheme based on symmetric encryption is provided which is used to distribute the shared key for mobile terminals lacking of computing power . 4 .

  11. 这些问题涉及到认证、语音编解码、数据加解密和数据传输等多个方面的技术,并集中体现在作为端到端加密承载者的加密终端上。

    These problems relate authentication , encrypting / decrypting , coding / decoding of voice , and transmission of cipher signals , which are all implemented in encryption mobile terminal .

  12. 许多人认为他针对的是使用端到端加密的互联网通信服务。端到端加密是目前普遍使用的一种技术,它让信息在传输过程中即使被拦截也无法读取。

    Many understood him to be taking aim at internet communications services that use end-to-end encryption , a now-common technology that makes it impossible to read messages even if they are intercepted in transit .

  13. 该方案可以保证消息在传输过程中和终端存储时的机密性和完整性其次,本文完成了移动通信系统端到端加密的终端程序设计。

    The scheme can guarantee the confidentiality and integrity of messages during transmission and storage on the terminal . Secondly , this paper completes the terminal program design of the end-to-end encryption for public communication systems .

  14. 因此,本文将从移动通信端到端加密和移动网络银行安全两个方面,对移动终端中的通信安全技术进行研究。首先,本文提出了一种移动通信系统端到端加密方案。

    Therefore , this paper will focus on the secure communication technology on mobile terminals , including the end-to-end encryption for public mobile communication systems and the security of mobile online bank . Firstly , this paper proposes an end-to-end encryption scheme for public mobile communication systems .

  15. XML加密为结构数据的安全交换提供了端到端的加密。

    XML encryption provides end-to-end security for applications that require secure exchange of structured data .

  16. adhoc网络端到端认证加密协议研究

    Research on End-to-End Authentication and Encryption Protocols of Ad Hoc Network

  17. 利用VPN技术,为数据传输建立私有通道,实现数据端到端的加密传输。

    By the technology of VPN , Private path can be created to transfer important data , Secure communication can be done by the end-to-end data encryption .

  18. 科米最近告诉CNN,我们的工作就是在整个国家的这片大海中捞针,因为端到端的加密,这些针现在越来越难找了。

    Mr. Comey recently told CNN , Our job is to find needles in a nationwide haystack , needles that are increasingly invisible to us because of end-to-end encryption .

  19. 科米最近告诉CNN,“我们的工作就是在整个国家的这片大海中捞针,因为端到端的加密,这些针现在越来越难找了。”

    Mr. Comey recently told CNN , " Our job is to find needles in a nationwide haystack , needles that are increasingly invisible to us because of end-to-end encryption . "

  20. 针对雷达情报网的特点,提出了一种应用分层加密思想实现端到端安全加密传输的机制。

    In terms of the characteristics of the radar intelligence network , an end-to-end encrypted information transmission mechanism based on encryption layer is proposed in this paper .