英语人>网络例句>in security for 相关的网络例句
in security for相关的网络例句

查询词典 in security for

与 in security for 相关的网络例句 [注:此内容来源于网络,仅供参考]

Provable Security is a formal method for proving the security of cryptographic schemes, in which the difficulty of breaking a particular scheme is formally related to that of solving a widely believed computational hard problem. Provable security has already become an important theme of theoretical researches in modern cryptography. This dissertation investigates the provable security of public-key encryptions and hybrid encryptions of asymmetric and symmetric encryptions. This includes the various formal security notions and the constructions can be proved to achieve them. Among the constructions, hybrid encryptions are themselves an important way to obtain public-key encryption schemes with chosen ciphertext security. The main results are as follows:(1) The one-wayness of the trapdoor one-way function in NTRU depends on the randomness of the session key, which is different from previous ones. Based on this observation, a new kind of trapdoor one-way function, trapdoor one-way functions with an auxiliary random variable is proposed.

可证明安全性是一种证明密码学方案安全性的形式化方法,它将密码学方案的安全性归约为公认的计算难题,已成为现代密码学领域中理论工作的主线,本文主要研究公钥加密与单双钥混合加密的可证明安全性,这包括它们的各种形式化安全性定义以及达到这些安全性定义的方案构造,而单双钥混合加密本身也是一种构造选择密文安全公钥加密的重要方法,本文得到的主要结果如下:(1)在研究NTRU公钥加密的特殊性基础上,对于公钥加密的陷门单向函数加密模型进行了扩展,提出了具有辅助陷门单向函数的概念,并将其扩展到多元的情况,讨论了可能的密码学用途。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

It is known that the security defense intensity of the information system depends on the weakest part of Maginot line. If there is no appropriate security architecture as a guide, it is difficult for the various security components in the information system to coordinate with each other and to work in order. Then, it often appears the "safety shortcomings" phenomenon, resulting in the vulnerability in the security and all the protection efforts in the information system are in vain. 2 Trusted computing and security mechanisms come apart.

众所周知,信息系统的安全防护强度取决于"马奇诺防线"中最为薄弱的环节,如果没有合理的安全体系结构作为指导,信息系统中各安全部件就难以相互协调、有序工作,就很容易出现"安全短板"现象,从而导致信息系统安全防护不堪一击,所有的努力功亏一篑。2可信计算和安全机制相脱节。

Including TCSEC (Trusted Computer System Evaluation Criteria; commonly called the "Orange Book"), which is a standard for computer security issued by the US government; ITSEC(the Information Technology Security Evaluation Criteria), which is a standard for computer security that was issued by the Europe, CC, which is a world standard for computer security; GB 17859-1999, which classified criteria for security protection of Computer information system in China.

本文论述了计算机网络安全现状、评价现状,以及网络信息安全评估标准,包括美国可信计算机安全评价标准,欧洲的安全评价标准,国际通用准则(CC,等同GB 18336),我国计算机信息系统安全保护等级划分准则(GB 17859-1999)。

Security" means any note, stock, treasury stock, security future, bond, debenture, evidence of indebtedness, certificate of interest or participation in any profit-sharing agreement, collateral-trust certificate, preorganization certificate or subscription, transferable share, investment contract, voting-trust certificate, certificate of deposit for a security, fractional undivided interest in oil, gas, or other mineral rights, any put, call, straddle, option, or privilege on any security (including a certificate of deposit) or on any group or index of securities (including any interest therein or based on the value thereof), or any put, call, straddle, option, or privilege entered into on a national securities exchange relating to foreign currency, or, in general, any interest or instrument commonly known as a "security, or any certificate of interest or participation in, temporary or interim certificate for, receipt for, guarantee of, or warrant or right to subscribe to or purchase, any of the foregoing.

参见笔者文章,《美国&公司&的主要经营组织形式及法律特征分析》,&corporation&与&Company&在我国虽然都被翻译为&公司&,但它们在英文中却是两个完全不同的概念。

The elimination of Nazi tranny over the oppressed people of Europe, and security for ourselves in a free world.

推翻压在欧洲人民身上的纳粹暴政,保卫我们在一个自由世界的安全。

The use of CAXA entity software provides the effectual security for 3D physical design of the turning attachment of emulsion pump three-throw crankshaft,in assembling and animation simulation,reflecting the work principle of scale division,examining interference and installing、debugging、maintaining tongs.

应用CAXA实体设计软件对乳化液泵三拐曲轴车床夹具的三维结构设计、装配及动画模拟,反映分度车床夹具的工作原理,检查分度机构的设计是否合理及干涉情况,为安装、调试、维护夹具提供有效的技术保障。

Pawnbrokers give customers money in return for an object which is held as security until thecustomer pays off the loan plus any interest charges.

光顾当铺的人将物件作为抵押典当,当铺给出现金,直到典当人偿还本金和利息。

Kainan Cemetery, East Gate, South Gate to the main entrance.liang bi gaterong zi and comrades are personally inscribed couplet:"heroic efforts in exchange for national well-being of the martyrs lay sweat national security."

大门两壁是戎子和同志亲笔题写的对联:&英雄功劳换来民族幸福,烈士血汗奠定国家安全&。

Though Jackson did not admit embracing Islam, he moved to Dubai after he was cleared of child abuse in 2005, and was linked to the American black Muslim organisation Nation of Islam, which provided security for him at his trial.

尽管杰克逊并未承认皈依伊斯兰教,但在2005年洗清虐童罪名后,他迁往迪拜,并与美国黑人穆斯林组织&伊斯兰国家派&保持联系,该组织将负责葬礼的安保工作。

第14/100页 首页 < ... 10 11 12 13 14 15 16 17 18 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。