This paper mainly introduces the procedure of integrity protection and ciphering in TD-SCDMA.
本文将主要介绍TD - SCDMA系统中的完整性保护和加密的实现过程。
In TD-SCDMA system, it is added integrity protection and ciphering to enhance system security.
在TD - SCDMA系统中,新增加了完整性保护和加密过程来增强系统的安全性。
The Civil Law hasn't state directly the privacy protection and it only states personal integrity protection generally.
在中国,对隐私权的保护呈现出一个总体特点:法律零散、保护途径间接、手段脆弱。
SEC_CIRCUIT_AUTH — Use SSL security for privacy and integrity protection only on the initial request (while establishing the connection).
SEC_CIRCUIT_AUTH——仅在初始化的请求中(当建立连接时)使用SSL安全用于私有性及完整性保护。
Additionally, EMC EFDs safeguard data with full round-trip error correcting code (ECC) data integrity protection and destage power backup.
此外,EMCEFD也使用全双工错误修正码(ECC)数据完整性保护和离线电源备份来保护数据。
Through the capability analysis, the scheme has more advantages as source authenticity and integrity protection than the original one.
经性能分析,该方案相对原方案而言,具有源真实性和完整性保护等优点。
The first fragile watermarking scheme is more suitable for high precision data in the traditional network model of integrity protection;
第一种脆弱水印方案更适合于数据精度要求高、集中式网络模式的数据完整性保护;
At present, watermarking technique has been a kind of effective means to multimedia copyright authentication and its integrity protection.
目前数字水印已成为多媒体版权认证和完整性保护的有效手段。
Companies rely on perfect quality system, strong technical strength, reliable integrity protection, has been recognized and praised the user.
公司依靠完善的质量体系、雄厚的技术实力、可靠的诚信保障,得到了用户的认可及好评。
Confidentiality protection ensures that the data can't be understudied by attackers and integrity protection ensures that the data can't be tampered.
存储器的机密性保证了数据不被攻击者窃取,完整性保证了数据不被攻击者篡改。
Chapter Two finally focuses its attention on the reasonable restriction and counter-restriction rules in the revision right and integrity protection right of architectural works.
最后着重阐述了对建筑作品作者修改权和保护作品完整权的合理限制和反限制规则。
SEC_PACKET_INTEGRITY — Use SSL security for privacy and integrity protection on the initial request (while establishing the connection) and for integrity protection on all other requests.
SEC_PACKET _ INTEGRITY——在初始化的请求中(当建立连接时)使用SSL安全用于私有性及完整性保护,并在所有其它的请求中用于完整性保护。
Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.
鉴于存储器是数据最主要的驻留场所,因此,防范攻击首要的是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密性和完整性保护。
Once that protection is lost, and the integrity of the skin barrier disrupted, skin becomes dry.
一旦保护层丧失,皮肤的整体屏障就受到破坏,皮肤变干。
Past NFS versions did not have this ability and therefore could not negotiate for the quality of protection, data integrity, the requirement for authentication, or the type of encryption.
以前的NFS版本都没有这种能力,因此不能对保护的质量、数据的完整性、认证的要求或加密类型进行协商。
This standard adds a data integrity field (DIF) to each sector to maintain data protection on the medium.
这个标准为每扇区都增加了一个数据完整性字段(DIF)以保护介质上的数据。
Without this protection, a malicious web page could compromise the integrity of another web page.
没有这个保护的话,恶意的网页可能危害到另外一个正常的网页。
Embedded within ZFS is an implementation of an important set of features such as snapshots, copy-on-write clones, continuous integrity checking, and data protection through RAID-Z.
ZFS内嵌入的是重要功能集(如快照、即写即拷克隆、连续完整性检查和通过RAID - Z的数据保护)的实现。
"Once that protection is lost, and the integrity of the skin barrier disrupted, skin becomes dry - which means it can crack, peel, itch, burn, sting, or any combination," says Crutchfield.
一旦保护层丧失,皮肤的整体屏障就受到破坏,皮肤变干——这意味着皮肤会开裂、起皮、发痒、灼痛、刺痛或各种组合的情况,“科兰驰菲尔德说。”
Information security is refers to the accuracy of the information, and authenticity, confidentiality, integrity, and availability and the protection of utility.
信息安全则是指对信息的精确性、真实性、机密性、完整性、可用性和效用性的保护。
Logical integrity refers to the logical structure of the database protection, including the semantic integrity and operational integrity.
逻辑完整性是指对数据库逻辑结构的保护,包括数据的语义完整性与操作完整性。
Justice refers to the process and results of judgment to meet legal requirements inherent essence of the protection of the legal process in the implementation of the integrity and unity.
正义是指判决的过程和结果要符合法律规定的内在实质,保障法律在实施过程中的完整和统一。
It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.
又包括内部审计的管理目标—即不仅包括被审计IS保护资产安全及数据完整,且包括IS的有效性目标。
The term of protection of the rights of authorship, alteration, and integrity of an author shall be unlimited.
作者的署名权、修改权、保护作品完整权的保护期不受限制。
The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.
讨论了第3代移动通信系统的空中接口安全保护技术,包括数据机密性保护、数据完整性保护。
As an effective implements in the copyright protection and integrity authentication for multimedia, digital watermarking techniques has become an active and flouring research topic.
数字水印技术是对多媒体版权进行保护和完整认证的有效工具之一,近年来成为研究热点。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
Double Digital Watermarking Method based on Transform Domain has realized the double aims of the copyright protection and the integrity authentication of image content.
基于变换域的双重数字水印方法,通过嵌入鲁棒水印和脆弱水印实现了图像内容版权保护和完整性认证的双重目的。
Analysis results show that this algorithm satisfied the requirement of protection and solve the consistency and integrity problem of communication data.
结果表明该算法能够满足保护需求,初步解决了通信数据的完整性和一致性问题。
To protect the integrity and security of property, restrictions should be taken close to double the protection, spot checks and verification, inventory and other measures.
为保护财产的完整和安全,要采取限制接近、双重保护、突击检查与核对、盘点等措施。
应用推荐