| 1. | Now ssl protocol becomes industry standard of secret communication on the internet 目前,利用公开密钥技术的ssl协议,已成为internet上保密通讯的工业标准。 |
| 2. | The development of chaos synchronization makes it realizable to use chaos for secret communication 混饨同步问题的提出掀起了混饨在保密通信方面应用研究的热潮。 |
| 3. | Finally , we discuss the application of the ecc crypto in the field of computer secret communication 最后以加密芯片在串行通信中的应用方法为例阐述了设计的密码芯片在计算机保密通信中的应用。 |
| 4. | In chapter 4 , the spread spectrum modulation sequence performance is discussed on the base of the multiple address selected ability and secret communication 在第四章中,在基于多址选择能力和保密通信的基础上对扩频调制序列性能进行了讨论。 |
| 5. | Moreover , this algorithm can be implemented very easily in software , and has a good prospect in the fields of secret communication and information security 此外,本算法还特别易于软件实现,在通信保密和信息安全领域具有良好的实际应用前景。 |
| 6. | Recently , the research of digital watermarking is emphasized , and the stegnaography that is applied to the secret communication is also focused 目前信息隐藏技术大部分的研究工作集中在数字水印技术,而用于秘密通信的隐秘术也逐渐引起人们的兴趣。 |
| 7. | Chaotic signal with continuous wide band frequency spectrum is not periodic and is similar with noise signal . these properties make it suitable to secret communication 由于混饨信号的非周期,连续宽带频谱,似噪声等特点,特别适用于保密通信领域。 |
| 8. | The crux of secret communication is the secrecy of secret key . it has been pointed out that declassification can be realized by reconstructing phase space 实现保密通信的关键是密钥的保密性,己有文献指出,可以利用相空间重构理论实现保密通信的解密。 |
| 9. | 2 . propose a matter - off - act information security hierarchy concept and attest the adequate and necessary existing condition of ideal secret communication system firstly 率先提出并证明了理想隐秘通信系统存在的充要条件,此结果为设计安全的隐秘通信系统指出了方向。 |
| 10. | Evidence from intelligence sources , secret communications , and statements by people now in custody reveal that saddam hussein aids and protects terrorists , including members of al qaeda 从情报来源、秘密通讯联系和目前在押人员的陈述那里得到的证据显示,萨达姆侯赛因为恐怖主义分子提供援助和保护,其中也包括“基地”组织成员。 |