共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
《信息安全与通信保密》1990,(4)
·著作· 期数.贝数 通信保密及井石外军中的应用································~,·············……(1,1) 加密产品集萃·····································································……(1,38) 置换敞特性及共研究················,···········································……(1,46) 伪随机序列研究工一移位寄存器序列跳状态互相关… 相似文献
4.
《中国雷达》2000,(4)
·技术评论·舰载相控阵雷达装备水平和研制现状·································……徐产兴(2000一1一1)新型无源探测与跟踪雷达系统—“沉默哨兵”·········……朱庆明吴曼青(2000一1一8)雷达干扰技术的发展现状····································……付伟侯振宁(2000一1一16)电子战和信息战在诺曼底登陆中的作用······························……田在津(2000一1一22)我国雷达技术和产业的发展战略·······································……张锡熊(2000一2一1)舰载相控阵雷达体制的发展趋势···························……周希辰华学增(2000一2一4)现代高技术战争与现代雷达·································……贺瑞龙谢成学(2000一2一7)台湾海军指挥控制自动化系统的发展现状···························……付伟(2000一2一16)结合国情加速发展我国海用雷达···... 相似文献
5.
《信息安全与通信保密》1991,(4)
·著作·数据加密标准-一信息时代的产物·····························,············‘··…(1,工)置换多项式在密码中的应用1·····,············································……(1,8)K元M序列的两种实造方法···················································……(I,12)使用公开密钥的对等实体鉴别协议的研究······························… 相似文献
6.
7.
8.
9.
10.
11.
12.
《信息安全与通信保密》1994,(4)
著作·期,页美国商用密码风波又起············...······‘·····,·······,,·············,·,········……罗昭武(1,1)灵巧卡的安全······························,··,····················……,’’··········……段丽斌(1,5)一种用于多媒体通信的加密处理器···························,········,··,·····,……金传升(1,19)分布式系统中的鉴别机制···········… 相似文献
13.
14.
15.
16.
17.
《电子产品可靠性与环境试验》2003,(6)
目录1.电子信息系统质量可靠性···········,··…,’···································……,’郭从良等(l)2.网络系统可靠性技术初讨·················……,’’·······························~。…莫郁薇等(7)3.复杂网络系统的完成性研究探讨·············································……张昊等(l4)4.数据库系统可用性与可靠性当议·············….…,’’···… 相似文献
18.
19.