Key establishment is the central problem in communication and network security.
密钥建立是通信网络安全中的关键问题。
Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.
SecureSocketsLayer (SSL)协议是一种加密协议,可为网络上的数据通信提供隐私和安全保障。
Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
The communication between each subsystem and the security management center integrates many kinds of network security mechanisms such as encryption, signature, authentication etc.
各子系统与安全管理中心之间的通信采用了加密、签名、认证等安全机制。
A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.
一个安全的认证协议能有效抵御恶意的攻击者对通信网进行的欺诈,保证通信网的安全运行。
Information security is the precondition and basis of everything that can work regularly based on the computer network communication.
信息安全是一切基于盘算机网络的通信活动得以正常运行的前提和基本。
In modern network and communication system, the security of data convey seems important day by day.
在现代的网络和通信系统中,数据传输的安全性日益显得重要。
This paper proposes an effective improved ring topology for the real-time network with high communication reliability and security.
在通信可靠性和安全性要求较高的实时网络中,建议采用改进的环形拓扑。
This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.
本课题在现有的网络通信技术、数据库技术和信息安全技术的基础上设计并实现了新型的安全即时通信系统。
Based on the in-depth research of network communication and security technologies, this paper builds up a architectural model of cross-area logistics management system.
论文在深入研究网络通信技术和安全技术的基础上,构建了跨区域物流管理系统的框架模型。
This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.
探讨了采用DES和RSA混合加密方式来实现计算机网络通信中的信息安全的问题。
Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.
混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。
The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
This paper discusses the technical requirement and working principle of this equipment. It also discusses positive function to communication equipment security and normal operation of ring network.
围绕该装置的技术要求、工作原理设计,以及它对通信设备安全、环网正常运行所起的积极作用进行了论述。
Using the technologies such as hook, network communication, data encrypting and database, computer operation analyzing and data security managing system has been implemented.
综合运用系统钩子、网络通信、数据加密和数据库等多种技术,计算机操作行为分析与数据安全管理系统的功能已经基本实现。
With the rapid development of the network communication, there have been more and more requirements for information security.
随着网络通信的迅猛发展,对信息安全的要求越来越高。
In addition, the article proposes a security solution for the Electronic Health Record taking into account identity authentication, network communication encryption and XML SOAP messages encryption.
另外,本文从身份验证、网络通信加密和XMLSOAP消息加密三方面考虑提出电子健康档案的安全性解决方案。
With the fast development of information technology, network communication and electronics trade, information security has become one of the hottest research fields in the world.
随着信息技术、网络通信和电子交易的迅猛发展,信息安全已成为全球最为热门的研究领域之一。
Therefore, it is a most important and meaningful job to research the applications of a network processor in these fields such as communication, security.
因此,研究、探索网络处理器在通信、安全等领域的应用,就是一件十分重要而有意义的工作。
This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.
这是一个高级示例,假定您熟悉加密、进程间通信和网络安全。
Security protocol is a very important role in securing network communication, and the formal analysis method for security protocol becomes one of the hottest research topics in security field.
保障网络通信安全的一个极其重要的环节是安全协议,安全协议的形式化分析方法已成为近年来安全领域研究的热点之一。
The dispatch communication network is divided into real-time, quasi-real-time and non-real-time systems according to security classes.
根据调度通信网络各组成系统的安全级别将其分为实时、准实时和非实时系统。
With the widely application of the computer network communication technology in the power secondary system, network security problems become more and more striking.
随着计算机网络通信技术在电力二次系统中的广泛应用,网络安全问题越来越突出。
Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.
指挥自动化网络安全系统,基于信息存储、通信信道、计算机病毒及电磁辐射等安全性分析。
This paper presents a kind of secure communication protocol model-EABRA, by which network security communication can be realized easily and efficiently.
提出了一种安全的通信协议模型EABRA,通过该模型可以简单有效地实现网络安全通信。
Network Information security includes context security and the anonymous property of Network Communication.
网络信息安全包括信息内容的加密及通讯的匿名性质。
This mechanism effectively improves the data security and network robustness of Ad Hoc networks, and reduces the bandwidth communication and data storage space.
该机制有效地提高了移动自组织网络的数据安全性和网络健壮性,减少了带宽通信和数据存储空间的压力。
The system USES a network of communication and measures to effectively protect the human physiological parameters transmission security, reliability and real-time.
本系统采用的网络通信方式和措施有效地保障了人体生理参数信息传输的安全性、可靠性和实时性要求。
Article 3 the communication network security protection shall follow the principle of "active defense, comprehensive precaution and classified protection".
第三条通信网络安全防护工作坚持积极防御、综合防范、分级保护的原则。
应用推荐