将AES加密算法应用在双dsp平台上,通过分析处理结果,说明其能够很好地满足系统的实时性和保密性要求。
AES encryption algorithm is applied to the dual - DSP platform, the analysis of the processing results shows that it meets the real-time and secrecy requirements well.
提出一种利用变形分数傅里叶变换和双随机相位编码对图像加密的方法。
A new optical image encryption method using anamorphic fractional Fourier transform and double random phase encoding is proposed.
提出了一种利用不对称分数傅里叶变换和双随机相位编码对图像加密的方法。
A new optical image encryption method using dissymmetrical fractional Fourier transform and double random phase encoding was presented.
另外我们采用多图像中心频谱平移和双随机位相编码提出了一种多图像加密算法。
Also we proposed a multiple image encryption scheme by shifting the multiple central parts of spectra together with the double random phase encodingtechnique.
提出了一种基于双随机相位的图像实值编码方法,该方法可应用于光学图像加密。
The double random phase real-value encryption and decryption method is proposed for the optical image security system.
对双随机相位加密过程进行了计算机模拟,并对该技术的误差容限进行了分析与模拟。
Double random phase encryption technique is simulated, its faulty tolerance is also analyzed and results of simulated experiments are given.
对灰色加密理论中的多用户双锁加密系统进行了改进,提出了一种基于多用户双锁加密系统的密钥分存方案。
The multiuser both-lock encryption system of grey encryption theory is improved and a secret sharing scheme based on both-lock encryption system is put forward.
提出了一种利用不对称分数傅里叶变换和双随机相位编码对图像加密的方法。
A new optical encryption technique based on double random phase computer-generated hologram of asymmetry fractional Fourier transform is presented.
本文论述一个由单片机和双端口存储器构成的加密机,阐述了加密机的工作原理和操作流程。
This paper presents an encryption engine composed of a single chip processor and a dual port RAM.
结合单钥加密和双钥加密的理论,分别给出了纵向的等级安全管理密钥管理方法和横向的协同工作安全管理的工作组密钥管理方法。
With the application of symmetric cipher and asymmetric cipher, a cryptographic key management scheme for hierarchy is presented and a workgroup cryptographic key management scheme is presented.
对该图形进行振幅型双随机相位加密变换,得到原信息的加密灰度图;
Later, using amplitude-based double-random-phase transform, the enciphered gray scale figure is formed .
在另一方面,对于敏感的数据,额外的安全可能需要-如数据加密或双因素认证。
On the other hand, for sensitive data, additional security may be required - such as data encryption or two-factor authentication.
如果你真的偏执,考虑添加密码和公钥认证的实现双因素认证。
If you're truly paranoid, consider adding password and public key authentication to achieve two-factor authentication.
如果你真的偏执,考虑添加密码和公钥认证的实现双因素认证。
If you're truly paranoid, consider adding password and public key authentication to achieve two-factor authentication.
应用推荐