工商企业给信息加密或译码已达多年。
Businesses have been encrypting, or coding, messages for years.
对信息加密的法律管制。
传统的信息加密技术存在密钥管理的问题。
The traditional encryption has the problem of the manage of key.
AES是一种使用安全码进行信息加密的标准。
AES is a safety code for the use of information encryption standards.
本文提出了两种基于时空混沌的信息加密方案。
Two encryption schemes based on spatiotemporal chaotic system are proposed in this paper.
文章提出将全数字全息术应用于音频信息加密。
It is presented here that the all-digital holography is applied to the digital audio encryption.
这种加密方法是用量子状态来作为信息加密和解密的密钥。
This encryption method uses quantum state as the key used for the encryption and decryption of information.
现在有很多种保护信息安全的方法,最常用的就是信息加密。
There are many ways to protect information security, nowadays information encryption is in common use.
提出了一种基于数字全息技术和相位恢复算法的信息加密方法。
An information encryption method is proposed based on digital holographic technique and phase retrieve algorithm.
结合递归运算,设计了基于MDA置换的信息加密、解密算法。
Combined with recursion operation, an encrypting and decrypting based on MDA disorder information are designed.
混沌信号具有天然的随机性,可以作为序列密码应用于信息加密。
The chaotic signal, which possesses natural randomness, can be used for information encryption as sequence cipher.
该信息加密系统通过证实数字签名算法来实现系统的不可否认性。
This system has the attribute of non-repudiation of the sender by using the improved confirmer signature.
这种产生数字混沌序列的方法可应用于保密通信和信息加密之中。
The approach to generating digital chaotic sequence can be applied in secret communications and information encryption.
该设计旨在理解信息加密与隐藏技术在实际生活中的应用,从总体上阐述了它们的原理。
The purpose of this design is to make the application of information encryption and hiding in real life understood, as well as to describe the principles of the technology on the whole.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
The article emphasizes on discussing the two measures to protect the datum in the network: accessing control measure and information encryption measure.
在信息加密前,对所有可能用到的原始信息进行二维化处理,建立原始信息表。
Before encrypting the information, process all the original information into two-dimension and establish the original information tables.
系统的实现为虚拟光学加密方法在现实信息加密中的应用开辟了一条有效的途径。
This approach paves the way for the realization of virtual-optics based methodology by combining major advantages of optical encryption and electronic encryption.
图像数据的保护日益受到社会的普遍重视,使图像信息加密技术也变得至关重要。
Image data protection has been noticed in the society, that causes the image encryption technology also becomes very important.
通过诸如信息加密和数字签名等多种技术,SSL促进安全的电子商务通信和支付。
SSL helps secure e-commerce communications and payments through a variety of techniques such as message encryption and digital signatures.
最后介绍了加密技术在信息加密保护、身份识别、信息完整性和数字签名中的应用。
The last part introduces the application of encryption protection, (identity) identification, information integrality and figure signature.
介绍了安全信息加密的技术原理,着重对usb加密狗在电子商务的应用进行分析。
The safe information technology principle is introduced of USB SoftDog in E-commerce is analyzed.
混沌映射因为初值敏感性、参数敏感性、遍历性和类随机性的特点,很适合用于信息加密。
Based on the features of initial value sensitivity, parameter sensitivity, ergodicity and random similarity, chaotic maps are now widely used in information encryption.
很受欢迎的聊天工具WhatsApp使用Signal的软件为自己的通讯信息加密。
WhatsApp, the popular chat tool, uses Signal's software to encrypt its messaging.
数字水印技术就是在这个背景下应运而生的,它可以有效地弥补传统信息加密方式的缺点。
Digital watermarking occurred in such a background, which can make up for the shortcomings of traditional methods of information cryptology.
本文较详细的介绍了密码通信系统中的信息加密技术原理和算法,以及实现该技术的方法。
This paper discuss principle and count of information secret technique about cipher communicate system , and way to realize this technique.
该密钥将发件人的“纯文本”信息加密,然后在接收方进行解密,使他们可以读取或收听信息。
The key converts a sender's "plain-text" messages into encrypted form, then decrypts them at the receiver's end so the messages can be read or heard.
针对信息与网络安全的重要性及严峻性,提出了一种汉字信息加密、在BMP图像文件中隐藏、恢复及解密的方法。
In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.
数字证明把拥有者与一对能用于对信息加密和签名的电子钥匙捆绑在一起,保证了这对钥匙真正属于指定的个人或机构。
Digital certificates bind owners to a pair of electronic keys that can be used to encrypt and sign information, assuring that the keys actually belong to the person or organization specified.
首先阐述了电子商务的四个主要的安全需求,并就信息加密、数字签名、数字证书等信息安全技术的特点及其应用作了探讨。
First, This paper discusses four E-business's demands for safety, then introduces technology of information security and how they meet demands of secure electronic transactions.
为了给一条信息加密,发送者,按大家熟知的惯例是Alice,在将信息发送至接受者Bob前,用一个密钥来把信息打乱。
To encrypt a message, the sender, known conventionally as Alice, scrambles it using a secret key before sending it to the receiver, Bob.
应用推荐