• 其他性能包括高安全性基于标准加密技术可同时单向双向加密的加密密码文本数字二进制文件

    Other features include high-security, standards-based encryption techniques, both for unidirectional and bidirectional encryption to encrypt passwords, texts, numbers and binaries.

    youdao

  • 密码领域保障信息安全重要技术——数字签名正在逐步取代手写签名趋于普及

    Digital signature, as an important technology to ensure information safety in cryptology field, is now gradually replacing manual signature and tends to be in common use.

    youdao

  • 利用现代密码技术构造了两个数字版权保护方案

    Applying the modern cryptographical technology constructs two digital copyright protection schemes.

    youdao

  • 本文中,笔者着重研究如何利用现代密码技术构造叛逆者追踪方案数字版权保护方案。

    In this dissertation, the author focuses on how to apply the modern cryptography to construct traitor tracing scheme and digital copyright protection scheme.

    youdao

  • 密码安全技术核心,其中的加密解密数字签名密钥交换技术起到保障作用重要机制

    Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.

    youdao

  • 针对密码技术数据保护方面不足提出一种新的数字水印算法——基于分块统计的水印嵌入算法。

    In order to use cryptographic techniques to avoid the lack of data protection, this paper proposes a new watermark algorithm based on block statistics.

    youdao

  • 数字版权保护问题越来越受到人们重视密码技术解决问题的关键技术之一。

    The problem of digital copyright protection is taken into account by more and more people. Cryptographical technology is one of the key solutions to this problem.

    youdao

  • 技术不再需要密码作为三位附加安全级别

    It would do away with the need for passwords used as an additional level of security to the three-digit code.

    youdao

  • 传统版权保护内容认证技术密码技术数字签名技术

    The traditional techniques of copyright protection and content authentication are cryptology technique and digital signature technique.

    youdao

  • 密码学中的公钥思想为基础,提出了一种基于数字图像置乱技术

    Based on the ideas of public key cryptography, a new scrambling technology of digital image based on primitive roots is given.

    youdao

  • SSL协议采用对称加密、非对称加密、信息摘要数字签名数字证书密码技术

    SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.

    youdao

  • 第三研究课题是密码技术数字签名网络加密技术安全API

    The third chapter studies cryptology data signature types of network cryptology and secure API.

    youdao

  • 第一版权保护密码技术数字签名技术

    The first generation of copyright protection is cryptography and digital signatures.

    youdao

  • 传统密码技术侧重数字产品访问控制保密通信但是版权认证盗版追踪问题显得力不从心。

    Traditional cryptography technology focused on the access control and confidentiality communications of digital products, but for authentication and copyright piracy tracing it is insufficient.

    youdao

  • 因此信息安全技术便应运而生包括公钥密码体制数字签名体制两个分支

    Therefore, the information security technology has emerged, including two branches, the public-key cryptosystem and digital signature system.

    youdao

  • 信息隐藏技术门多学科交叉的新兴学科,它涉及到了信息论、数字信号处置密码数字通信。

    Information hiding technology is a rising subject involved with information theory, Digital Signal Processing, Cryptography, Digital communication.

    youdao

  • 密码数字水印技术认为是解决数字版权管理问题种有效方法

    Cryptography and digital watermarking technologies are considered effective methods to resolve the issue of digital rights management.

    youdao

  • 提出一种基于数字水印技术应用密码数字产品版权保护认证机制。

    The attacks on digital watermarking increasingly become serious, with the application of digital watermarking on digital copyright protection.

    youdao

  • 绘制出数字基因组图实验室技术人员就可以对症下药通过改写计算机密码序列改变人体基因

    Digital genome maps will allow lab technicians to create customized prescriptions, altering individual genes by rewriting lines of computer code.

    youdao

  • 第二章介绍基本应用密码算法密码协议包括对称加密算法、非对称加密算法、散列函数数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • 第二章介绍基本应用密码算法密码协议包括对称加密算法、非对称加密算法、散列函数数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定