可配置该组件来使用一个特定加密方案。
This component can be configured to use a specific encryption scheme.
提供比邮件加密方案更深层的保护。
提供比邮件加密方案更深层的保护。
So it can provide deeper protection than email encryption. 5.
提出了一个完全式公钥广播加密方案。
This paper proposes a fully public key tracing and revocation scheme.
描述如何从各种加密基元创建加密方案。
Describes how to help create a cryptographic scheme from the various cryptographic primitives.
协议的安全性基于其使用的公钥加密方案。
Accordingly, the protocol security is rested on the used underlying public cryptosystems.
本文提出了两种基于时空混沌的信息加密方案。
Two encryption schemes based on spatiotemporal chaotic system are proposed in this paper.
如果数据库暴露了,那么使用加密方案将防止暴露用户的密码。
Using an encryption scheme will prevent exposing a user's password if the database ever becomes compromised.
最后讨论了数据库加密的局限性和属性级加密方案。
At last, we discuss the limitation of database encryption and field level encryption technology.
基于分段非线性混沌映射设计了一种流密码加密方案。
A stream cipher encryption scheme was designed based on piecewise nonlinear chaotic map.
单向加密方案和crypt特别受欢迎。可以使保护信息的方法更安全。
One-way encryption schemes, and crypt in particular, are extremely popular, secure ways of protecting information.
克服,你需要使用对称加密方案和需要的关键每一次你读/写文件。
To overcome that, you'd need to use a symmetric encryption scheme and require the key each times you read/write the file.
最后,本文给出了一个基于此混合加密方案的多媒体会议系统的实现。
Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme.
公钥加密算法和追踪算法结合在一起,可构成一个公钥广播加密方案。
A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.
有关加密和传输密钥与IV的过程的更多信息,请参见创建加密方案。
For more information on this process of encrypting and transferring the key and IV, see Creating a Cryptographic Scheme.
证明了给出的协议既是一个安全的加密方案,也是一个安全的认证方案。
It was demonstrated that the proposed protocol was not only a secure encryption scheme, but also a secure authentication scheme.
他称这种自我更新的属性为“自展的”,该属性保证他的同态加密方案是完全同态的。
He calls this self-refreshing property "bootstrapping," and it was enough to make his homomorphic encryption scheme fully homomorphic.
环认证加密方案是加密方案与环签名方案的融合,具有这两种方案的优点。
Ring authenticated encryption scheme can be regarded as the combination of message encryption scheme and ring signature scheme, which has both encryption and ring signatures priority.
但通过研究发现,有的环认证加密方案不具有环签名的无条件匿名性的性质。
This paper found that the scheme didn t have the unconditional anonymity characteristic being including in a ring signature, so improved it.
本文结合PGP加密标准的特点,设计了移动警务通系统数据传输加密方案。
This thesis coalesces the characteristic of PGP encryption standard, and design a data transfer encryption Solution in the police mobile wireless system.
本文在分析H.323标准模型及编解码算法后,提出了视频会议的加密方案。
The system model and algorithms of coding and decoding of H. 323 are analyzed in this paper.
在对换位加密技术研究的基础上,提出了一个基于混沌系统的动态换位加密方案。
The technology of transposition cipher is discussed firstly and a novel dynamic transposition cipher based on chaotic systems is presented.
将智能卡技术引入认证加密体制中,提出了一种基于离散对数问题的认证加密方案。
Smart card is integrated into authenticated encryption scheme, a new cryptographic scheme based on the discrete logarithm problem is presented.
为了解决这些问题,我们需要一种具有灵活加密方案的端对端安全性模型以满足一系列不同的需求。
To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.
图像部分加密方法只加密图像压缩编码的部分重要数据,是一种可行的实时加密方案。
This paper presents a partial encryption of gray images compressed by Set Partitioning in Hierarchical Trees (SPIHT).
本文提出了一类新的认证加密方案,这类方案首次将消息可恢复签名和对称加密有机结合。
A new type of authenticated encryption schemes is proposed. It first combines signature with message recovery schemes and symmetric encryption schemes together.
随着引入新型数字视频技术(如加密方案、高清视频、深色浓度),视频测试应用日趋复杂。
Video test applications are increasingly more complex with the introduction of new digital video technologies such as encryption schemes, Full HD video and deep color content.
在研究现有的安全方案的基础上,提出了一种支持安全网内处理的无线传感器网络加密方案。
Based on learning the existing security schemes, an encryption scheme supporting secure in-network processing for wireless sensor networks was introduced.
在实际中通常是把叛逆者追踪方案和广播加密方案有效地结合起来使盗版造成的损失最小化。
In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy.
在实际中通常是把叛逆者追踪方案和广播加密方案有效地结合起来使盗版造成的损失最小化。
In practice, traitor tracing schemes and broadcast encryption schemes can be effectively combined in order to minimize the damage as the result of piracy.
应用推荐