信息加密 meaning in English
information encryption
message encryption
Examples
- In contrast with encryption , the existence of communication process and both communication sides is hided in the information hiding technique . even if the cover is intercepted by illegal users , the secret message can not be revealed because they do not know whether the secret message exists or not
与信息加密技术相比,它隐藏了通信过程及通信双方的存在,使得一些非法的窃取者即使截获一些信息,也无从下手,因为他们无法判断是否存在秘密信息。 - With the development of computer technology and the advancement of digital media storage and transmission , it is a serious challenge that protecting the copyright of digital media . and at the same time , it is easy to break through information security system . the tradition information encryption technology is easy to be cracked under the open network environment
近年来随着计算机技术的飞跃发展,数字媒体存储与传输技术的进步,数字媒体的版权保护正受到日益严重的挑战,信息安全系统正变的不堪一击,传统的信息加密技术在开放的网络面前,极易被破解。 - The structure of this paper goes like this , the first chapter introduce the development of e - b / l in practice and in laws . and draw a conclution that the electrification of the b / l is a history tide . in the second chapter , on the basic of reseach the security trap in e - b / l running , 1 conclude six security elements of , e - b / l : the liability of the system , the authenticity of dealers ' identity . the integrity and secrecy of electronic data , and the validity and evidence effectiveness of electronic data . from the third chapter to the eighth , 1 reseach these elements one by one . the third chapter introduce the establishment of the e - b / l security system , and some related laws the fourth chapter introduce the certification authority of e - b / l . in the fifth chapter , 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography . the sixth chapter introduce the concept and principle of digital signature , and reseach some related legal issues . the seventh chapter reseach the legal demand of validity , then come to a conclution that to establish a independent electronic information system is necessary . in the eighth chapter , 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析电子提单运作中的安全隐患的基础上,归纳出其六大安全要素,即系统的可靠性、交易者身份的真实性、数据电讯的机密性和完整性、数据电讯的合法有效性以及交易者行为的不可抵赖性。第三章到第八章分别对这六大要素进行分析:第三章介绍了电子提单网络安全体系的建立以及系统安全保护法规,第四章则介绍了电子提单的安全认证机构,第五章介绍了信息加密技术以及各国立法对密码技术的进出口及使用的控制,第六章介绍了数字签名的概念及原理,并以bolero为例介绍了数字签名的技术方式,对有关法律问题作了论述;第七章首先论述了电子提单对有效性的法律需求,然后结合国内法和国际规则的规定论证了数据电讯制度产生的必然性;第八章通过对各国立法对电子证据的法律效力的规定,论述了对电子交易至关重要的数据电讯的不可抵赖性。 - The key technology dealing with information security is encryption , decryption and authentication . this paper introduces and deeply researches the basic theory and application of symmetrical and asymmetrical cryptography . in order to solve the database encryption , this paper also puts forward a scheme named security database system ( sds ) , whose core is ca authentication and information encryption
解决数据库数据加密问题的关键技术是密钥理论和认证技术。本文将对称密钥体系和非对称密钥体系的原理及其应用进行了较为深入的分析和研究,同时提出了以信息加密和身份认证为核心的数据库的一种加密系统的实现模型sds ( securitydatabasesystem ) 。 - As people enjoyed the opening and sharing of network , they were also distressed about the problem of security . this paper mainly studies the security encryption technology of networks - based e - commerce systems . it analyzes the message encryption and digital signature process of client browser , and the message decryption and validation of merchant server in a integrated e - commerce system , and it also provides an application example
本文主要研究基于网络环境的电子商务系统安全加密技术,分析了一个完整的电子商务应用系统中客户浏览器端和商家服务器端的信息加密、信息解密、数字签名、身份验证,以及pki ( publickeyinfrastructure ,公开密钥基础设施)机制、数字证书技术在这个过程中的功能,并给出了一个具体的实现例子。