As a very important application of information hiding, covert communication plays a very important role in the field of information security.
作为信息隐藏技术的一个重要应用,隐秘通信在信息安全领域扮演着十分重要的角色。
Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
With the rapid development of information and communication technology, people attach more importance to the information security.
随着信息与通信技术的飞速发展,信息安全日益受到人们的重视。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
To determine the set s is an important problem in the field of communication and information security.
决定集合s是通信和信息安全领域一个重要问题。
Therefore, the research of Internet security technique has been one of focuses in the communication and an important research area of the information science.
因此,网络安全技术的研究已成为现在计算机和通信界的一个热点,并且成为现在信息科学的一个重要研究领域。
It also analyzes the application of Bluetooth in information communication between human and medical equipment, and proposes measures regarding security.
分析了蓝牙技术在人与医疗仪器之间信息交流中的应用,并提出了相应的安全对策。
This paper designs security and reliability on a type of information direct transmission model in communication systems.
本文对通信系统中一类直接传输式的信息传输模型进行了安全可靠性设计。
Information security is the precondition and basis of everything that can work regularly based on the computer network communication.
信息安全是一切基于盘算机网络的通信活动得以正常运行的前提和基本。
The capacity of watermarking as a basic communication system, the capacity as side information, the capacity using dirty paper encoding and the capacity of security watermarking are introduced.
文中介绍了作为基本通信系统的水印、作为边信息的水印、利用脏纸编码的水印及安全水印的信道容量。
This research is helpful to the application of stream cipher algorithm in information security and modern secure communication equipment.
该研究结果有助于序列密码算法在信息安全及现代保密通信设备中的应用。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.
本课题在现有的网络通信技术、数据库技术和信息安全技术的基础上设计并实现了新型的安全即时通信系统。
In order to ensure information transmission security, encrypt and decrypt was used in channel coding and decoding of data communication.
为了保证信息传输的安全性,往往在数据通信的信道编码中进行加密处理,在收方进行解密处理。
Within the process of communication, people attach their most attentions to the security and secrecy during the information transmitting.
在通信过程中,人们一直关心着信息在传输过程中的安全性和保密性。
Information hiding is a novel technique in the field of information security in this years, and it is significant to covert communication.
信息隐藏技术是近些年来信息安全领域出现的一种新技术,该技术对于隐秘通信有着重要的意义。
The standardization of Unified ETC System will be involved with wireless communication, CPU IC, information security, system integration, testing etc.
联网电子收费系统涉及无线通讯、智能卡技术、信息安全、系统集成、测试技术等多个领域。
A new transmission method of the Chinese character text information based on the picture solves the communication security problem of the information transmission at Internet.
通过对图片的数字密写来进行汉字文本信息传输,较好地解决了在互联网上信息传输的通信安全问题。
To safeguard the information system of mobile communication, it is urgent to make effective, maneuverable and scientific security risk evaluation system.
为了保障移动通信信息系统的安全,制定有效的、操作性的、学的安全风险评估体系是当务之急。
This method can be used in other continuous chaotic system and the application of chaotic system in information security and secure communication field will be accelerated.
该法可应用于其他连续混沌系统中,有助于加快混沌系统在信息安全及保密通信网络领域中的应用。
This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.
探讨了采用DES和RSA混合加密方式来实现计算机网络通信中的信息安全的问题。
Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.
混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。
With the rapid development of the network communication, there have been more and more requirements for information security.
随着网络通信的迅猛发展,对信息安全的要求越来越高。
Theories related to watermark are introduced in detail, including communication model, related detection model, hiding information capacity analysis and security of steganography.
从水印的通信模型建立,水印的相关检测模型,到信息隐藏容量分析,隐写术的安全性理论,详细介绍了水印的相关理论;
Aim to identify the id of the speaker in digital voice communication in order to assure the security of information which is transmited in the network.
目的为保证网络信息交互的安全,在数字语音通信中对说话人进行身份认证。
Quantum cryptography communication system is based on principles of quantum mechanics, thereby it can provide absolute security of information.
量子保密通信系统以量子力学中的基本定理为基石,可以提供绝对的信息安全。
The trunking communication system needs to transmit large amount of secret information, and have high security demand.
集群通信系统要传输大量机密信息,对通信保密性要求很高。
The establishment of exclusive franchise of express is to achieve a better universal service, to protect basic communication rights of citizens, and to protect national information security.
邮政专营权制度的设立是为了更好的实现普遍服务,保障公民的基本通信权利,维护国家的信息安全。
Information security not only includes guaranteeing the security of locally stored data, but also the confidentiality and integrity of data in the process of communication.
信息安全除了保证数据在本地存储过程中的安全,还应该满足其在网络传输过程中的保密性和完整性要求。
With the fast development of information technology, network communication and electronics trade, information security has become one of the hottest research fields in the world.
随着信息技术、网络通信和电子交易的迅猛发展,信息安全已成为全球最为热门的研究领域之一。
应用推荐