Mobile
Log In Sign Up
Home > english-chinese > "bluetooth security" in Chinese

Chinese translation for "bluetooth security"

安全驱动

Related Translations:
bluetooth:  单元的地址蓝芽蓝牙技术(无线耳机接听)手机相关英语词汇意译的如“蓝牙主机应用软件
harold bluetooth:  蓝牙哈罗德
bluetooth settings:  蓝牙设置
harald bluetooth:  布鲁图斯
bluetooth technology:  蓝牙技术
moto bluetooth:  罗拉蓝牙耳机
onboard bluetooth:  板载蓝牙设备
inet bluetooth:  聊天软件汉化
bluetooth dongle:  蓝芽传输器
bluetooth tm:  支持蓝牙
Example Sentences:
1.Application of cryptographic algorithm in bluetooth security mechanism
加密算法在蓝牙安全机制中的应用
2.Bluetooth security fixes - no longer asks for file confirmations with paired devices
蓝牙安?拚? ?不再提示成对设备之间的文件操作确认。
3.Bluetooth security fixes - no longer asks for file confirmations with paired devices
蓝牙安全修正。 -不再提示成对设备之间的文件操作确认。
4.Then architecture and design of bluetooth security are studied , and some advises on bluetooth security are also be set forth
然后,研究了蓝牙网络安全体系结构及其设计方法,对其存在的问题提出建议。
5.Some advantages and weakness of bluetooth security and improving measures are also studied primarily based on others researches at last
本文第三部分则集中精力研究了如何在不同的情形下通过这些安全机制提供并实现安全服务。
6.The initialisation key is the first security gate in bluetooth security system , if the initialisation key is got by attacker , the attacker will get the common link key by continue listening the communication . if the common link key is known by others , the two device is no secret before he . the third party can not only listen the two device ' s communication but also assert him one party to authenticate the other . pairing at place where less people here will reduce the attack . to use long pin managed by diffie - hellman key exchange algorithm will also reduce the attack
初始字是蓝牙安全系统的第一道安全屏障,如果初始字被攻击者得到,攻击者就可以通过监听两设备的后续通讯进而获得两设备的公共链路字,如果两设备的公共链路字为第三方知晓,那么两设备对于第三方面而言就毫无安全性可言。第三方不但可以偷听两设备的加密通讯,还可以冒充其中一方向另一方鉴权。
7.In chapter 2 , the security measures and mechanism are introduced and studied . it mainly includes authentication , encryption , pairing / bonding , key management defined by bluetooth core protocol , three security modes defined by bluetooth profile and bluetooth security architecture defined by bluetooth white paper . in chapter 3 , the implementation of secure services in bluetooth environment is studied deeply according to different scenarios
在第二部分,本文阐述了蓝牙技术中的安全机制和各种具体措施,主要包括蓝牙标准对直接链路层的安全标准定义如鉴权、加密、配对/ bonding 、密钥管理等,蓝牙应用规范中给出的三种安全模式以及蓝牙安全标准白皮书的安全体系结构。
8.The thesis is organized as below : in chapter 1 , the background knowledge is given which is needed for study on bluetooth security mechanism and implementation . first bluetooth technology is overviewed including its develop history , radio interface , physical links , interference , network topology , core protocol , etc . next communication security is introduced according to the model of network security architecture from osi . finally some primary cryptographic techniques are discussed based on symmetric encryption , asymmetric encryption and advanced encryption standard published years ago
本文研究了利用蓝牙技术提供各种安全服务和实现的课题,并通过一些具体实现的实例进行阐述,具体安排如下:在第一部分,本文首先回顾了蓝牙技术及发展情况,主要包括蓝牙发展简史、蓝牙标准的射频接口、物理链路、干扰情况、网络拓扑结构以及核心协议等;然后介绍了通信安全的基础知识,讨论了osi系统中的四层网络安全结构模型;最后给出了各种加密技术的基本理论,包括对称加密体制如des和blowfish 、非对称加密体制( rsa公钥算法、数字签名和身份证明等)以及新一代的高级加密标准( advancedencryptionstandard , aes )等。
Similar Words:
"bluetooth class2" Chinese translation, "bluetooth dongle" Chinese translation, "bluetooth enabled household appliances" Chinese translation, "bluetooth headset" Chinese translation, "bluetooth real-time messaging" Chinese translation, "bluetooth serial port" Chinese translation, "bluetooth settings" Chinese translation, "bluetooth sig adopter member" Chinese translation, "bluetooth special interest group" Chinese translation, "bluetooth technology" Chinese translation