This algorithm has been applied successfully in the Postal Saving Security Communication System.
该算法已在绿卡安全通信系统中成功应用,效果良好。
In the high security communication system, stream cipher as an important technique is widely used.
在高保密强度的通信系统中,流密码是一种广泛采用的重要技术手段。
Near-infrared single photon detection is one of the key problems of realizing the quantum security communication.
其中近红外单光子探测技术是实现量子保密通信的关键问题之一。
Simultaneously, the realization of chaos synchronized has provided the rationale for the chaos security communication.
目前,混沌键控系统是混沌通信中研究最多的系统。
The specific implementation of all these layers and the security communication mechanism among all these components are described.
然后描述了各个层次的具体实现方案以及各个组件之间的安全通信机制。
Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.
混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。
A security communication system based on SMS (short message service) is designed associating with the application in the mobile police affair system.
文中针对短消息在移动警务系统中的具体应用,设计了一个安全的短信通信系统。
This paper presents a kind of secure communication protocol model-EABRA, by which network security communication can be realized easily and efficiently.
提出了一种安全的通信协议模型EABRA,通过该模型可以简单有效地实现网络安全通信。
Lastly, it is introduced for chaos 'application in electronic jamming. It includes the detecting technology for weak signal and chaos security communication.
最后介绍了混沌技术在电子干扰中的应用,包括利用混沌技术实现对弱信号的检测以及混沌保密通信。
In this paper, we present a series of important applications of blind signature to computer security communication, especially to electronic voting and electronic cash.
根据近年来国内外关于数字签名的研究背景及进展,阐述盲签名在计算机保密通信,特别是在电子货币等方面的一系列重要应用。
Chaos synchronization has very important applications in security communication, optimization of nonlinear system performance, modeling brain activity and pattern recognition.
混沌同步在保密通信、非线性系统性能优化、大脑行为建模以及模式识别等领域有着极为重要的应用。
Based on this, by combining the operation sequence of control in substation automation, a security communication system of remote control for substation automation is designed.
在此基础上,针对变电站远程控制的安全需求,结合变电站自动化控制操作的动作序列,设计了变电站自动化远程控制的安全通信体系。
Behavior of the chaos system may be not the foresight, and is the intrinsic randomness for the initial value sensitivity, which can be used to hide signal in the security communication.
混沌系统对初值的敏感性会使系统产生不可预见性和内在随机性,这一特性可以用来隐藏信号,进行混沌通信。
As for the flaws of the SSL handshake protocol part in the SSL based security communication model, the thesis proposes a PMI based solution and analyzes the design by using the BAN logic.
针对基于SSL的安全通信模型中ssl握手协议部分在访问控制方面的缺陷,本文提出了一个基于pmi的全解决方案,并对改进设计进行了分析和BAN逻辑证明。
A new scheme in chaos security communication, the time-variable system added in the transmission and reception unit, is proposed in this paper. This way can make the system be double-secure.
本文提出了一种保密通信的新设想,也就是在通常的混沌通信系统的收发端,各增加一个时变系统,可以达到“双重加密”的目的。
And the fractional -order chaotic system is very useful for security communication because it is a new chaotic system for its order is adjustable and the actual system usually is differential form.
另外,分数阶混沌系统是一类新型的混沌系统,其阶数可调使得它在复杂度上更优于整数阶混沌系统,同时,实际系统也通常以微分形式存在,因此分数阶混沌系统也很适用于保密通信。
Security for data communication is another important aspect to consider.
数据通信的安全是要考虑的另一个重要方面。
The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.
TCS要求控制关键系统资源的分配和释放,包括数据库记录、通信套接字、安全密钥,等等。
These files specify security configuration to use in RMI-IIOP communication with the server.
这些文件指定了RMI - IIOP与服务器的通信中要使用的安全配置。
Moreover, the capability declaration notes security policy so that multiple services can participate in a secure transaction communication.
此外,功能声明说明了安全策略,以便多种服务可以参与安全事务通信。
Each instance also has its own configuration file, the Database Manager configuration file (DBM CFG) for instance level security, performance variables, and communication configuration.
每个实例还具有自己的配置文件,数据库管理器配置文件(DBMCFG)用于进行实例级的安全、性能变量和通信配置。
You and your friend don't need to be concerned as to how your conversation is transmitted (technologies, communication protocols, security mechanisms, etc).
您和您的朋友无需关心对话的传输方式(技术、通信协议、安全机制等)。
To write distributed applications, programmers must learn and use a large variety of lower-level libraries for cross-tier communication, data marshaling, synchronization, and security.
要编写分布式应用,程序员必须学习和使用针对跨层通信、数据编制、同步和安全等领域的底层类库。
Above the communication protocols are the optional file attachment and security layers that are implemented with MIME.
通信协议的上面是可选的文件附件和安全层,用MIME实现。
Manufacturers may eventually market LEDs with all sorts of enhanced features, such as security sensors, cameras or wireless communication.
生产商们最终能让市场上的二极管设备具备所有的加强特性,如安全感应器,摄像头或者无线通信。
In the next step, you configure WS-Security policies and bindings to verify successful secure communication for the echoed messages.
在下一步中,您将配置WS - Security策略和绑定,以验证回显消息是否成功进行安全通信。
Currently, Transport Layer Security (TLS) is the DE facto standard for secure communication over the Internet.
当前,传输层安全性(Transport Layer Security (TLS))是因特网上安全通信的事实标准。
Before delving into SSL itself, it is useful to consider the key security problems that network communication faces, along with the appropriate solutions. Key security problems include.
在深入研究ssl本身之前,考虑一下网络通信面临的关键的安全性问题以及适当的解决方案,这是很有帮助的。
Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication between clients and servers.
TransportLayerSecurity (TLS)是一种密码协议,可以在客户机和服务器之间提供安全的通信。
To configure SSL communication on the client with the security trust service, complete the following steps.
要用安全信任服务在客户端上配置SSL通信,请完成以下步骤。
应用推荐