您要查找的是不是:
- There are many ways to protect information security,nowadays information encryption is in common use. 現在有很多種保護信息安全的方法,最常用的就是信息加密。
- The article emphasizes on discussing the two measures to protect the datum in the network:accessing control measure and information encryption measure. 文章將著(zhù)重討論保護網(wǎng)絡(luò )中數據的兩種策略:訪(fǎng)問(wèn)控制策略和信息加密策略。
- This article describes the situation of information security theory and technology, and discusses the theories of CA, Information Encryption, and Public Key System. 本文介紹了目前信息安全理論和技術(shù)發(fā)展狀況,對CA認證理論、信息加密以及公共密鑰管理等方面的技術(shù)進(jìn)行了分析和論述。
- Users who download this product should observe any local regulations that may apply to the distribution or use of encryption products. 下載此產(chǎn)品的用戶(hù)應遵守所有當地適用于加密產(chǎn)品之分發(fā)及使用的規范。
- Conventional optical information encryption system can be divided into three kinds: double random phase encryption, iterative phase retrieve algorithm and digital holography. 常見(jiàn)的光學(xué)信息加密系統可以分為三類(lèi),一類(lèi)是典型的雙隨機相位加密;
- In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward. 摘要針對信息與網(wǎng)絡(luò )安全的重要性及嚴峻性,提出了一種漢字信息加密、在BMP圖像文件中隱藏、恢復及解密的方法。
- And then PRI,information encryption and VCS are add to this PLC scheme,and these effective measures improve the home control network characteristics on reliability,security and response time. 該方案由于增加了優(yōu)先級機制、信息加密和虛擬載波監聽(tīng)(VCS)等技術(shù),使網(wǎng)絡(luò )在實(shí)際應用中,在可靠性、安全性和滿(mǎn)足不同控制信息對時(shí)間的要求等方面,有所改善。
- Other countries may exercise separate jurisdiction over the import, export or use of encryption products. 其他國家或地區可能對加密產(chǎn)品的進(jìn)口、出口或使用有不同的管制。
- Integrated with Domino/Notes, used arrangement nominate structure , identity authentication , database access control , information encryption , digital signature and digital sign badge etc, emphasized the security of application layer. 結合Domino/Notes平臺的安全機制,運用層次命名結構,身份認證、數據庫存取控制、信息加密、數字簽名和數字簽章等安全技術(shù)重點(diǎn)加強系統在應用級的安全性。
- The design thoughts of the CDSP is seen through the development process. The user's requirements are met by the implementation of the information Encryption, concealing and secure transmission. . 在開(kāi)發(fā)過(guò)程中,充分運用了信息保密安全平臺的設計思想,從信息保密、信息隱藏和信息安全傳輸等幾個(gè)方面實(shí)現了用戶(hù)的需求,具有較高的實(shí)用價(jià)值。
- The term has been appropriated to mean security and encryption products that make impossible claims, such as unbreakable codes. 用此詞表示那些不可能做到(如不會(huì )破譯的代碼)的安全和加密產(chǎn)品非常適合。
- The encrypted product is accessible, but it can be decrypted only by those who have the correct key. 加密后的產(chǎn)品是可以訪(fǎng)問(wèn)的,但只有那些具有正確密鑰的人才能解密。
- Information Encryption Techniques in Smart IC Card 智能IC卡中的信息加密技術(shù)
- Co.Olym-Tech is the national fixed company of encryption products, dealing with the research of encryption and security products professionally.In 2005, Enyo-Tech (Shen Zhen)Ltd,.Co was presented. 奧聯(lián)科技是國家涉密產(chǎn)品定點(diǎn)單位,專(zhuān)業(yè)從事密碼學(xué)及安全產(chǎn)品研究,2005年創(chuàng )辦安郵科技(深圳)有限公司。
- Information encrypted using one key can only be decrypted using the other, and vice versa. 信息使用一個(gè)密鑰加密過(guò)只能通過(guò)另一個(gè)密鑰解密,無(wú)法破譯。
- Study of Information Encrypt Application Technology 信息加密應用技術(shù)研究
- The important point is that the keys are asymmetric - information encrypted with one key can be decrypted using the other key. 關(guān)鍵的問(wèn)題是這些密鑰是非對稱(chēng)的使用一個(gè)密鑰加密的信息可以使用另一個(gè)密鑰來(lái)解密。
- core and general encryption products 核密和普密產(chǎn)品
- He is raking through old records for information. 他在過(guò)去的記錄中找尋資料。
- Sensitive Information Encryption of Network Database Base on JCE 基于JCE的網(wǎng)絡(luò )數據庫敏感信息加密技術(shù)與實(shí)現