• CAJ digital watermark in information security applications.

    CAJ数字水印信息安全中的应用

    youdao

  • Syncing security information for remote service authentication and techniques to consistently brand and personalize applications are just a couple of examples of how best to use the bridge.

    远程服务验证同步安全信息以及提供品牌一致技术,以及打造个性化应用程序,这些仅仅演示桥接一部分最佳应用。

    youdao

  • As the Internet increasingly emphasizes information security, more web applications are using SSL authentication.

    随着互联网日益强调信息安全越来越多web应用程序使用SSL身份认证

    youdao

  • The "unlocked" information can be mixed and transformed to meet specific needs and the demands of situational applications, while security and governance are managed to enterprise standards.

    解锁信息可以混合转换符合环境应用程序特定需求要求安全和控制通过企业标准进行管理。

    youdao

  • It can provide many network applications with all kinds of security service, such as authentication, confidentiality, information integrity and non-repudiation of transaction.

    可以各种网络应用提供身份认证、信息机密性完整性以及交易不可否认安全服务

    youdao

  • This paper discusses information security threats and cryptosystems, and describes standardizations, organizations, development and applications and export restriction in cryptologic technology field.

    本文论述信息安全威胁密码体制,描述密码技术领域标准化组织机构开发应用出口限制

    youdao

  • Therefore, the research on ECC and its applications are becoming new highlight in information security field.

    因此ECC及其应用正在晋升为信息安全研究领域新的热点

    youdao

  • Detection of Security Vulnerabilities in Applications with Static analysis requires precise context-sensitive alias analysis information.

    使用静态分析方法检测应用程序安全漏洞基础精确上下文敏感别名分析信息

    youdao

  • Process audit software on information system applications is effective means in ensuring security of information systems.

    信息系统应用过程审计种有效信息系统安全保障手段

    youdao

  • At present, the problem of network security such as information leakage, network viruses, such as a direct impact on the normal computer applications.

    目前网络安全问题信息泄密、网络病毒直接影响计算机正常应用

    youdao

  • SVM applications, such as pattern recognition, function approaching, time series prediction, fault prediction and recognition, information security, power system and power electronics, are described.

    归纳了支持向量机在诸如模式识别函数逼近时间序列预测故障预测识别、信息安全电力系统以及电力电子领域中的应用

    youdao

  • With the extensive applications of the network and other information technologies, the security of network systems has become critical.

    随着网络其它信息技术广泛应用,网络系统安全变得至关重要

    youdao

  • In practical applications, we need to effectively detect these vulnerabilities and avoid the disclosure of security information.

    现实应用中我们需要有效地检测测这些漏洞并加以解决,避免安全信息的泄露

    youdao

  • Face detection plays an important role in security, information processing and other applications.

    人脸检测安全信息处理应用领域起到很重要作用

    youdao

  • The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.

    数字签名技术身份认证、数据完整性等方面具有其它技术无法替代作用,在信息安全领域得到广泛的应用

    youdao

  • The purpose of the sub-project is to provide a fundamental platform for the upper applications such as national network security and information security.

    实验上层国家网络安全信息安全应用提供基础性支撑平台

    youdao

  • Four is not sure the absolute security of the WiFi, try not to use payment applications or interactive sensitive information in order to protect the safety of funds and information.

    是在确定绝对安全wifi下尽量不要使用支付类应用交互敏感信息保障资金信息安全

    youdao

  • Absrtact: Internet banking, online transaction has been widely used in practice, information security has become an important factor in the credibility of network applications.

    摘要网络银行网上交易实际中广泛应用信息安全成为网络应用可信度重要因素

    youdao

  • In this lecture the speaker will demonstrate sample algebraic and number theory applications in information security, in particular, in the design of cryptosystems.

    讲座中,报告人实例展示代数数论在信息安全特别是密码系统设计中的应用

    youdao

  • Digital watermarking technologies have aroused board attention in academy and industry, because of their brand applications, and have been an advanced direction of information security.

    数字水印技术由于崭新应用前景已经受到学术界工业界广泛关注,成为信息安全技术的前沿方向

    youdao

  • Face recognition in computer is a very active research topic nowadays, shows a wide range of applications in the areas of information security, criminal detection, import and export controls etc.

    计算机人脸识别目前一个非常活跃研究课题,信息安全刑事侦破出入口控制等领域呈现广泛应用前景

    youdao

  • Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.

    确定几种类型安全管理策略防御说明如何利用它们,以确保安全,业务应用信息技术

    youdao

  • The benefit of installing an application is lowered security restrictions so that applications may read and write files, and access user preferences and system information.

    安装一个应用程序好处较低安全限制因此应用程序可以文件并且获得用户参数选择系统信息

    youdao

  • Please read your mobile provider's terms of service for information about the security of applications stored on your device.

    仔细阅读移动设备你与移动服务商有关信息安全服务条款

    youdao

  • Signatures of behavioral activity where applications and system resources are modified and might indicate a benign security risk or an attempt to access sensitive system information.

    信息级别,已经不算真正意义上威胁了,对于系统应用程序资源修改对敏感系统信息的读取属于此类。

    youdao

  • Signatures of behavioral activity where applications and system resources are modified and might indicate a benign security risk or an attempt to access sensitive system information.

    信息级别,已经不算真正意义上威胁了,对于系统应用程序资源修改对敏感系统信息的读取属于此类。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定