• Key establishment is the central problem in communication and network security.

    密钥建立通信网络安全中的关键问题

    youdao

  • Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.

    SecureSocketsLayer (SSL)协议一种加密协议,可网络数据通信提供隐私安全保障

    youdao

  • Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.

    加密可以个人计算机系统网络安全设备提供密码服务实现数据的安全存储网络信息保密通信

    youdao

  • There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.

    智慧城市网络通信过程存在信息安全隐患,主要有木马程序拒绝服务攻击欺骗攻击、SQL注入蠕虫病毒

    youdao

  • The communication between each subsystem and the security management center integrates many kinds of network security mechanisms such as encryption, signature, authentication etc.

    子系统安全管理中心之间通信采用了加密签名认证安全机制

    youdao

  • A secure authentication protocol can resist the cheat of malicious attacker to communication network and guarantee the security of network.

    一个安全认证协议有效抵御恶意攻击者通信网进行欺诈保证通信网的安全运行。

    youdao

  • Information security is the precondition and basis of everything that can work regularly based on the computer network communication.

    信息安全一切基于盘算网络通信活动得以正常运行的前提基本

    youdao

  • In modern network and communication system, the security of data convey seems important day by day.

    现代网络通信系统中,数据传输安全性日益显得重要

    youdao

  • This paper proposes an effective improved ring topology for the real-time network with high communication reliability and security.

    通信可靠性和安全性要求较高实时网络中,建议采用改进环形拓扑

    youdao

  • This project design and implementation the new security instant messaging based on the topic of the existing network communication technology, database technology and information security technology.

    课题现有网络通信技术数据库技术信息安全技术基础设计实现新型的安全即时通信系统。

    youdao

  • Based on the in-depth research of network communication and security technologies, this paper builds up a architectural model of cross-area logistics management system.

    论文深入研究网络通信技术安全技术基础上,构建了跨区域物流管理系统框架模型

    youdao

  • This paper discusses on the problem of realizing the information security of network communication by using DES and RSA hybrid encryption technology.

    探讨采用DESRSA混合加密方式来实现计算机网络通信中的信息安全问题

    youdao

  • Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.

    混沌加密计算机网络安全通信方面应用解决信息安全问题开辟一种新的研究途径

    youdao

  • The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".

    研究来源于自然科学基金课题“计算机通信网络结构数据加密安全研究”。

    youdao

  • This paper discusses the technical requirement and working principle of this equipment. It also discusses positive function to communication equipment security and normal operation of ring network.

    围绕装置技术要求工作原理设计,以及通信设备安全正常运行所起积极作用进行了论述

    youdao

  • Using the technologies such as hook, network communication, data encrypting and database, computer operation analyzing and data security managing system has been implemented.

    综合运用系统钩子网络通信数据加密数据库多种技术计算机操作行为分析数据安全管理系统的功能已经基本实现

    youdao

  • With the rapid development of the network communication, there have been more and more requirements for information security.

    随着网络通信迅猛发展,对信息安全的要求越来越高

    youdao

  • In addition, the article proposes a security solution for the Electronic Health Record taking into account identity authentication, network communication encryption and XML SOAP messages encryption.

    另外本文身份验证网络通信加密XMLSOAP消息加密三方面考虑提出电子健康档案安全性解决方案。

    youdao

  • With the fast development of information technology, network communication and electronics trade, information security has become one of the hottest research fields in the world.

    随着信息技术网络通信电子交易迅猛发展,信息安全成为全球最为热门的研究领域之一

    youdao

  • Therefore, it is a most important and meaningful job to research the applications of a network processor in these fields such as communication, security.

    因此研究、探索网络处理器通信、安全领域应用就是一件十分重要有意义工作

    youdao

  • This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.

    一个高级示例假定熟悉加密进程间通信网络安全

    youdao

  • Security protocol is a very important role in securing network communication, and the formal analysis method for security protocol becomes one of the hottest research topics in security field.

    保障网络通信安全一个极其重要环节安全协议,安全协议形式化分析方法已成为近年来安全领域研究热点之一

    youdao

  • The dispatch communication network is divided into real-time, quasi-real-time and non-real-time systems according to security classes.

    根据调度通信网络各组成系统安全级别将其分为实时实时非实时系统。

    youdao

  • With the widely application of the computer network communication technology in the power secondary system, network security problems become more and more striking.

    随着计算机网络通信技术电力二次系统中的广泛应用,网络安全问题越来越突出。

    youdao

  • Security system for command automation network is based on the security analysis of information storage, communication channel, computer virus, electromagnetism radiation and so on.

    指挥自动化网络安全系统基于信息存储通信信道计算机病毒及电磁辐射安全性分析

    youdao

  • This paper presents a kind of secure communication protocol model-EABRA, by which network security communication can be realized easily and efficiently.

    提出安全通信协议模型EABRA通过模型可以简单有效地实现网络安全通信。

    youdao

  • Network Information security includes context security and the anonymous property of Network Communication.

    网络信息安全包括信息内容加密通讯匿名性质

    youdao

  • This mechanism effectively improves the data security and network robustness of Ad Hoc networks, and reduces the bandwidth communication and data storage space.

    机制有效地提高了移动自组织网络数据安全性网络健壮性减少了带宽通信和数据存储空间的压力。

    youdao

  • The system USES a network of communication and measures to effectively protect the human physiological parameters transmission security, reliability and real-time.

    系统采用网络通信方式措施有效地保障人体生理参数信息传输安全性可靠性实时性要求

    youdao

  • Article 3 the communication network security protection shall follow the principle of "active defense, comprehensive precaution and classified protection".

    第三通信网络安全防护工作坚持积极防御综合防范分级保护原则

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定