| 1. | Design and analysis of authentication protocol in military network 军网身份鉴别协议设计与分析 |
| 2. | The authentication system can meet the security require of the application system in military network 军网身份鉴别系统满足了军网应用系统的安全需求。 |
| 3. | A preliminary discussion of the application and development of streaming media technology in the military network 浅谈流媒体技术在军事通信网络中的应用与发展 |
| 4. | Fast speed , physical connection discovery and correct result is extraordinarily needed in military network 基于icmp和snmp两种协议对网络拓扑进行自动发现和显示。 |
| 5. | This paper discuss the corresponding problems of design and implementation of authentication system in military network at length by introducing the hardware and software structure of system , designing of key database and cipher module , measures of enhancing the security of user end 本文从系统的硬件组成和软件结构、密钥数据库和密码模块的设计、增强用户端安全性的措施等方面对军网域内身份鉴别系统设计与实现过程中的有关问题作了较详细的介绍。 |
| 6. | This paper describes two ways of information communication of aircraft in the network centric warfare ( ncw ) in the future - communication by voice and by data links , analysis structures of data links ' hardware which communication shares information via military network , and a research on principles of hardware of the networking data links 摘要通过对作战飞机信息通信方法的研究,指出了作战飞机进行信息通信的两种方法语音通信和数码通信;并分析了数码通信的硬件结构和机载通信的硬件设备的工作原理。 |
| 7. | Currently , the army is developping military network based oa project with effort among which military email transferring system is an essential application module . this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system , practical condition of current military network and official model as well as document transferring process . it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model , mail exchange protocol and application requirement of cryptogram management 该文针对电子邮件服务系统中存在的安全隐患,基于对目前国内外电子邮件安全技术的分析研究,立足于现有军事计算机网络的实际现状,根据目前军队的办公模式、公文传输流程,提出了一种适合于军队办公自动化中军用电子邮件传输的数据模型及具体的设计方案,详细讨论了军用电子邮件传输系统的安全服务需求,对相关的数据模型、邮件交换协议、密码管理的应用需求等进行了详细的分析和设计。 |
| 8. | The translation process from basic and complex asn . l modules into idl that includes default clause , optional clause and asn . l recursive definition is also shown . the implementation of the mib structure presented in the dissertation plays an important role in developing the platform of military network management . besides , the application of corba technology in tmn framework and the corresponding mapping algorithm of management information , provide efficient tools to develop the distributed network management in future 由于mib是网络管理系统的核心,因此本文提出的klb结构的实现方法对军事网络管理开发平台的研究具有非常重要的意义;另外, tmn和corba的集成研究以及二者在管理信息方面的映射算法为实现分布式网络管理的进一步研究提供了坚实基础和可靠工具。 |
| 9. | In this paper , we describe the research and realization of the security management center of the military remote multiple _ media cooperation system and its encryption algorithm . this system can control the remote logging in from else where in the military networks , and it is the first time for system of this kind designed to equip the army by some research institute and universities 本文主要介绍了军用远程多媒体协作系统的安全管理中心及加密算法的软件实现。该系统由几家研究所和大学共同研制,实现对军用网络上的远程登录与访问的控制以及保密通信。计算机协作系统在商业上应用已经很广泛,如netmeeting , quicktime等但这些产品均未提供对信息安全和保密功能的支持。 |
| 10. | Authentication system in military network is designed based on symmetrical encryption scheme which has the attributes of high efficiency , centralized key management , compendious authentication protocol , small quantity of cipher processing , high efficiency , and it s fit for authentication in area of lan 基于对称密钥密码体制的军网身份鉴别系统,其主要特点是安全强度高,密钥采用集中管理方式,身份鉴别协议简洁,鉴别步骤少,密码处理量小,效率高,适合于局域网络环境下的身份鉴别。 |