• 如果用户希望应用程序限制为只使用符合FIPS密码技术TLS可以手工配置每个端点可以使用管理工具启用FIPS遵从性。

    Users wishing to restrict their applications to use FIPS complaint ciphers and TLS can either manually configure every endpoint, or simply enable FIPS compliance using the admin tools.

    youdao

  • 本文论述信息安全威胁密码体制,描述密码技术领域标准化组织机构开发应用出口限制

    This paper discusses information security threats and cryptosystems, and describes standardizations, organizations, development and applications and export restriction in cryptologic technology field.

    youdao

  • 为了保证信息系统安全性密码技术应用于信息系统中。

    Cryptographic technology is applied to information system to ensure its security.

    youdao

  • 目前为止,学术界对于基于门限密码入侵容忍研究几乎都集中门限rsa密码技术应用上。

    Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.

    youdao

  • 信息隐藏技术一门建立数学现代密码、信息处理理论计算机应用技术基础上交叉性学科

    Information hiding is an interlaced subject, which is built on the basis of mathematics, modern cryptography, information processing theory, and computer applied techniques.

    youdao

  • 密码技术信息安全领域核心技术当今社会许多领域有着广泛应用前景。

    Cryptology is the kernel technology in the field of information security, it has extensive commercial prospect in many fields.

    youdao

  • 组合公钥技术门限密码理论结合应用移动自组网的密钥管理方案中。

    Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.

    youdao

  • 量子密钥分配代表量子密码量子信息技术应用经典通信成功典范

    As the representative of quantum cryptography, the quantum key distribution (QKD) is a successful model that the quantum information technique is applied in to the conventional communications.

    youdao

  • 密码技术应用领域不断扩大。

    The application of the cryptographic technology has been increasing.

    youdao

  • 分组密码处理器现已成功的应用到了广州大学信息安全技术实验室研制PCI - FPGA密码中。

    The block cipher coprocessor has been applied in a PCI-FPGA cipher card designed by the Information Security Technology Laboratory of Guangzhou University.

    youdao

  • 提出一种基于数字水印技术应用密码数字产品版权保护认证机制。

    The attacks on digital watermarking increasingly become serious, with the application of digital watermarking on digital copyright protection.

    youdao

  • 文中提出PIC单片机技术密码原理应用防伪包装领域;

    This paper put forward the PIC single chip technology and cryptography theory which were applied in anti-forgery packaging.

    youdao

  • 系统使用公钥密码技术,设计和实现了一身份认证协议和相关应用接口可以更加安全和有效解决网上应用中面临的网络身份认证问题。

    The technology of public key is applied in this system, protocol interfaces of the system which can solve the identity authentication in network effectively are implemented.

    youdao

  • 由于密码技术采用,电子选举协议理论研究实际应用方面取得了一些成果;

    Their purpose is to improve its safety and efficiency. Because of using cryptology, we have maken progress in theoretical research and application.

    youdao

  • 公钥密码技术结合传统对称密码技术信息摘要技术提供信息保密性完整性确认,是多种安全应用的基础。

    Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.

    youdao

  • 信息隐藏数学密码信息论盘算机应用技术相互结合一个交叉性的研讨课题

    Information hiding is an interdisciplinary subject of the combination of mathematics, cryptography, information theory and computer application technique.

    youdao

  • 安全认证密码重要应用方向也是信息安全领域常用技术之一。

    Secure authentication technology is a most important application way. It's one of typic technology in information secure field, too.

    youdao

  • 函数密码基础要素之一主要应用方向是数据完整性校验身份认证技术

    The hashing function is one of the basic foundations of the cryptography. It widely used in data integrality and identity authentication.

    youdao

  • 密码技术广泛应用信息安全领域

    Cryptography is utilized widely in the field of information security.

    youdao

  • 密码作为信息安全技术核心领域,提供多种密码算法应用协议满足人们实际应用需要

    Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need.

    youdao

  • 第二章介绍基本应用密码算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • 目前在软件加/解密技术应用密码体制主要分为对称密码体制非对称密码体制。

    RSA crypto-algorithm is recognized as the most mature and perfect in all asymmetrical key system at present.

    youdao

  • 目前在软件加/解密技术应用密码体制主要分为对称密码体制非对称密码体制。

    RSA crypto-algorithm is recognized as the most mature and perfect in all asymmetrical key system at present.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定