最后应用此序列进行了图像加密解密的研究。
In the end, image encryption and decryption with the new sequence are studied.
图像加密解密实验表明,序列具有参数敏感性。
The images encrypting and images decrypting show that the sequences are sensitive to initial parameter.
最后提出了用软件对PE可执行文件的加密解密方法。
Finally a software encryption and decryption method of PE file is put forward.
这还没提到加密解密和改变恶意代码形态所需要的能力。
And this has not even touched the capabilities needed to encrypt, decrypt, and morph the malicious code.
随着计算机的广泛使用,文件加密解密已成为相当频繁的工作。
With the wide use of computers, the enciphering and deciphering of the files are becoming quite usual work.
该插件可以帮助您快速加密解密某个分类或某个标签下的所有的文章。
Post Encryption And Decryption is an plugin designed to help you quickly encrypt or decrypt all posts of specific category or tag.
用来加密解密的代码我现在正在进一步研究,希望能够得到大家的帮助。
Used for encryption and decryption code I now further study, we hope to receive help.
它是包含有转动盘、继电器、步进器和荆齿的复杂设计,它能将键盘输入任意加密解密。
It had a complex design consisting of rotors, electric relays, steppers and ratchets, which would translate the whatever was typed on its keyboard into or out of code.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
这种方式对于数据库自身来说也是透明的,数据库管理系统也感觉不到加密解密过程的存在。
This approach is transparent to the database itself, the database management system can not feel the existence of encryption and decryption process.
尽管对称密钥有自身的缺陷(主要是如何在互信的双方之间传递),它们最大的优点是加密解密的速度快。
Though symmetric keys have their disadvantages (primary among them being how to pass them among the trusted parties), the major advantage they offer is speed of encryption and decryption.
在不改变现有协议的前提下,嵌入性能良好的加密解密算法(排列码算法)来保障信息的安全;
Not changing the Video Conference protocols in existence, we embed a good encryption algorithm (Permutation Code) in the system to safeguard the information of Multimedia.
该系统能有效的防止网络内部的重要数据通过网络泄露出去,无需用户进行手动的加密解密操作。
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.
密码学是安全技术的核心,其中的加密解密、数字签名、密钥交换等技术是起到保障作用的重要机制。
Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.
解密是个逆向过程,难度大,需要很多技术和经验,所以进行解密的一般都是精通加密解密的开发人员。
And because decode is a reverse direction procedure, which is more difficult and need more technique and experience, decoders are always advanced developer.
这份资料主要是和大家探讨一些加密解密的问题,在文中引用了不少平时收集的资料,但均保持文章原样。
This information is encrypted and decrypted U. S. probe into some of the problems cited in the text a number of normal data collection, but the article kept intact.
给出了一些较常用的加密解密方法及反跟踪技术,内容包括硬盘加密、软盘加密以及磁盘软件加密与保护技术。
The paper gives some practical methods of encryption and decryption as well as preventive trace, including hard disk encryption, floppy disk encryption, disk file encryption and protection.
该系统能够为基于XML文档中的任意粒度数据信息提供任意次序的加密解密、数字签名、授权认证等相关操作。
The system can operate any part of the XML documents, and perform encryption and decryption, digital signature, authorization in arbitrary sequences.
一些经过优化后的VC++加密解密算法,生成加密类文件,然后可以调用,早两年的代码,但现在仍然很有用。
Optimized after some VC++ encryption and decryption algorithm to generate encryption types of documents, and then can call the code a couple of years ago, but still very useful.
本文研究了智能计算机辅助教学系统中习题库的实现方法,智能指导方式的设计思想及状态信息数据加密解密的保存。
The implementation of the exercise library design idea of coach approach, and storage of secret information condition in intelligent compuer assistant system are totally studied in the paper.
出于这个原因,在版本1.6和以后,以前的版本文件将不会被删除后,加密解密过程中使用的情况下,是不正确的密码。
For this reason, in version 1.6 and afterward, the previous version file will not be removed after decryption in case the incorrect password is used during encrypting.
最后,本系统经测试表明在安装有本系统的网络内部,网络数据可以像正常传输是一样,用户丝毫感觉不到数据的加密解密过程。
Finally, the system has been tested in the network which installs this system. The network data can be transmitted the same as normal without this system.
使用它,您可以将会话信息存储在数据库中,或者实现一个用于加密和解密你的所有数据的处理器。
With it, you can store session information in a database or implement a handler for encrypting and decrypting all of your data.
离线策略控制备份和恢复命令,以及数据库备份映像的加密和解密。
The offline policy controls backup and restore commands, and the encryption and decryption of database backup images.
使用同一个秘密密钥加密和解密在它们之间交换的消息。
Same secret key is used to encrypt and decrypt the messages exchanged among them.
新的内置函数提供了加密和解密数据的方法。
New built-in functions provide methods for encrypting and decrypting data.
处理程序可以处理加密和解密、日志记录和审计等。
Handlers can manage encryption and decryption, logging and auditing, and so on.
于是,SSL通信各方使用快速的私钥算法来加密和解密通信数据。
SSL parties then use fast private key algorithms to encrypt and decrypt communication data.
由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。
Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.
加密和解密使用相同的密钥。
应用推荐