最后给出了一个综合的加密方法。
不存在 100% 不受攻击的绝对完整的加密方法。
There is no 100-percent uncrackable, full-proof cryptographic method.
提出了一种新的具有多个私钥的加密方法。
A novel public key encryption scheme with multiple private keys is presented.
加密方法,加密装置,解密方法和解密装置。
Ciphering method, ciphering device, deciphering method and deciphering device.
最后通过算例验证了该自适应加密方法的有效性。
An example verifies the effectiveness of this adaptive refinement method.
非常快速和安全的加密方法是用来争夺您的秘密数据。
Very fast and Secure Encryption method is used to scramble your secret data.
旨在讨论分析自行高炮火控计算机数据外推加密方法。
In this paper, method of data extrapolation of fire control computer is described.
硬件加密方法有较强的抗解密性,但用户使用不方便。
Hardware encrypting resists decryption intensely, but it use inconveniently for user.
这种软件加密方法特点是实现简单,隐蔽性好,成本低。
The characteristics of the methods are easy realization, good concealment and low cost.
提出一种新的基于混沌有序化映射的数字图像加密方法。
A novel image encryption scheme based on chaos-sorting technique is proposed.
对于PGP和其他公钥加密方法,不存在从公钥推断某人私钥的方法。
With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.
这种加密方法是用量子状态来作为信息加密和解密的密钥。
This encryption method uses quantum state as the key used for the encryption and decryption of information.
调用元素内容加密方法,它只对 CardNo 元素的文本内容加密。
The element content encryption method is invoked, which encrypts only the textual content of the CardNo element.
提出了一种基于数字全息技术和相位恢复算法的信息加密方法。
An information encryption method is proposed based on digital holographic technique and phase retrieve algorithm.
在综合分析光盘数据加密方法的基础上提出了一种有效的加密方法。
It puts forward an available means based on analyzing the encryption of CD data.
在您之前担任开发人员时,通常首先从加密方法、ssl证书等等开始整个讨论。
In your previous role as developer, you'd normally begin the entire discussion with encryption methods, SSL certificates, and the like.
还可以提供用户ID和密码信息,用于数据库身份验证,可以选择密码的加密方法。
You can also provide user id and password information for database authentication, and you can select the encryption method for the password.
相比单纯使用幻方变换的加密方法,新方法有双重因素控制,有更高的安全性。
Comparing with the encryption method only using magic transformation, the new method has two controlling factors and is more secure.
系统的实现为虚拟光学加密方法在现实信息加密中的应用开辟了一条有效的途径。
This approach paves the way for the realization of virtual-optics based methodology by combining major advantages of optical encryption and electronic encryption.
介绍了软加密和硬加密的方法和特点以及各种加密方法的适应场所,并进行了比较。
The methods and technology of software and hardware encrypting, the adaptative fields and the comparison of various encrypting methods were introduced and compared.
为了准确清楚地阐述这种加密方法,本文分五章来加以分析:1。全息光存储技术。
In order to accurately, explicitly illustrating this technology, this paper is divided into five chapters: 1. optical holographic storage system.
传统的光学加密方法分为两类,一种是基于联合变换相关器的加密方法,第二种是基于。
The traditional optical encryption methods are classified into two kinds, one is based on the joint transform correlator, the second is based on the matched filter.
尽管传统文本加密方法可以用于加密图像,但因为未考虑图像数据特点,加密效率不高。
Although traditional text encryption approaches can be used to encrypt image, they are inefficient since without using characteristics of image data.
例如服务提供方要求采用一种特殊的加密方法,而服务请求方没有支持这种加密方法的安全基础架构。
An example of this would be a service provider that asks for a particular type of encryption method, for which the service requester doesn't have the security infrastructure to support.
目前,它不包含XML加密;我期望XML加密或类似的加密方法将来成为它的一部分。
At the moment, it does not include XML encryption; I expect XML encryption or a similar encryption methodology to be part of it in the future.
这里需要重点强调的一点是,这与直接使用WS - Encryption加密方法不同。
The main thing to stress here is that this is quite different from straight WS-Encryption.
并通过对RSA公钥密码算法的改进,给出一种新的组播加密方法,进而给出相应的密钥管理方案。
Through some improvement to the RSA public key system, a new method of multicast encryption is put forward and then corresponding key management model is given.
根据ATA协议,该系统利用FPGA硬件加密方法实现数据透明加密和流水线操作来达到高吞吐率。
According to ATA protocol, PHES used hardware encryption method in FPGA to achieve the transparent data encryption and high data throughput rate by pipeline operation.
在可搜索的加密方法成为虚拟的私有存储服务的可行的解决方案之前,在该领域还需要更多的研究和提高。
More research and advances in the searchable cryptography field are necessary before this approach becomes a viable solution for a virtual private storage service.
在可搜索的加密方法成为虚拟的私有存储服务的可行的解决方案之前,在该领域还需要更多的研究和提高。
More research and advances in the searchable cryptography field are necessary before this approach becomes a viable solution for a virtual private storage service.
应用推荐