• 将AES加密算法应用dsp平台上通过分析处理结果说明能够很好地满足系统实时性保密性要求

    AES encryption algorithm is applied to the dual - DSP platform, the analysis of the processing results shows that it meets the real-time and secrecy requirements well.

    youdao

  • 提出利用变形分数傅里叶变换随机相位编码图像加密方法

    A new optical image encryption method using anamorphic fractional Fourier transform and double random phase encoding is proposed.

    youdao

  • 提出利用不对称分数傅里叶变换随机相位编码图像加密方法

    A new optical image encryption method using dissymmetrical fractional Fourier transform and double random phase encoding was presented.

    youdao

  • 另外我们采用图像中心频谱平移随机编码提出了一种多图像加密算法

    Also we proposed a multiple image encryption scheme by shifting the multiple central parts of spectra together with the double random phase encodingtechnique.

    youdao

  • 提出了一种基于随机相位图像实值编码方法,该方法可应用于光学图像加密

    The double random phase real-value encryption and decryption method is proposed for the optical image security system.

    youdao

  • 随机相位加密过程进行了计算机模拟技术的误差容限进行了分析模拟。

    Double random phase encryption technique is simulated, its faulty tolerance is also analyzed and results of simulated experiments are given.

    youdao

  • 灰色加密理论中的用户加密系统进行了改进,提出了一种基于多用户加密系统的密钥分存方案

    The multiuser both-lock encryption system of grey encryption theory is improved and a secret sharing scheme based on both-lock encryption system is put forward.

    youdao

  • 提出一种利用不对称分数傅里叶变换随机相位编码对图像加密方法

    A new optical encryption technique based on double random phase computer-generated hologram of asymmetry fractional Fourier transform is presented.

    youdao

  • 本文论述一个单片机端口存储器构成加密阐述了加密机的工作原理和操作流程。

    This paper presents an encryption engine composed of a single chip processor and a dual port RAM.

    youdao

  • 结合单钥加密加密理论,分别给出了纵向的等级安全管理密钥管理方法横向的协同工作安全管理的工作组密钥管理方法。

    With the application of symmetric cipher and asymmetric cipher, a cryptographic key management scheme for hierarchy is presented and a workgroup cryptographic key management scheme is presented.

    youdao

  • 对该图形进行振幅随机相位加密变换,得到信息的加密灰度

    Later, using amplitude-based double-random-phase transform, the enciphered gray scale figure is formed .

    youdao

  • 一方面,对于敏感数据额外的安全可能需要-数据加密因素认证

    On the other hand, for sensitive data, additional security may be required - such as data encryption or two-factor authentication.

    youdao

  • 如果真的偏执考虑公钥认证实现因素认证。

    If you're truly paranoid, consider adding password and public key authentication to achieve two-factor authentication.

    youdao

  • 如果真的偏执考虑公钥认证实现因素认证。

    If you're truly paranoid, consider adding password and public key authentication to achieve two-factor authentication.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定