提出了一种新的密钥控制下的分层变换的数字图像置乱算法。
Presents a new technology for scrambling and restoring digital image Based on the hierarchical transformation under the control of secret key.
首先将水印信息进行PDF417编码,并在密钥控制下进行混沌序列置乱后得到二值水印图像;
Firstly, it can be obtained 2-value watermark image by PDF417 coding to watermark information and chaotic sequence scrambling.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
TCS要求控制关键系统资源的分配和释放,包括数据库记录、通信套接字、安全密钥,等等。
The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.
我们前面也提到了,这个抽象层还让先进的安全控制——像是硬件安全模块——的使用更加复杂,结果就可能是蹩脚的密钥管理程序。
As we noted earlier, this abstraction layer also complicates the use of advanced security controls, such as hardware security modules, possibly leading to poor key management procedures.
支持自定义JSSE信任和密钥管理器,从而允许对SSL握手进行更多的控制。
Support for custom JSSE trust and key managers enables more control of the SSL handshake.
在实现时,我们完全信任所有的主机密钥,只是通过返回一个defer . succeed对象,将控制交回给异步反应器(reactor)的核心。
In our implementation, we trust every host key and simply give control back to the asynchronous reactor core by returning a defer.succeed object.
SecureCloud可以让你在云端存储加密数据,同时允许你使用Trend的密钥管理技术来控制自己的密钥。
SecureCloud enables you to store encrypted data in the cloud while controlling your own keys using Trend's key-management technology.
认证密钥在控制器中被设为类变量。
The authentication key is set as a class variable in your controller.
您甚至还可以使用此控制台管理自己的自定义密钥,应用程序也可以使用IBM定义的API对其进行访问。
You can even manage your own custom keys using the console, and applications can access them using IBM-defined APIs.
密钥管理工具已集成到管理控制台,并且将创建密钥所需的步骤几乎缩减了一半。
Key management tools have been integrated into the administrative console, and the steps you needed to take to create a key have been cut almost in half.
对于自动实现,身份验证是使用API密钥来控制的。
For automatic implementations, authentication is governed using API keys.
就象城市公共交通IC卡一样,这些卡在交给公交系统使用前,每张卡的密钥都要进行出厂加密控制。
Like urban public transport as IC CARDS, these CARDS to the public transport system, each card key encryption to have control of the factory.
对于不需要基于角色的访问控制,并且只实现一个加密密钥的简单应用程序,那么可以将一个用户出口用于所有加密和解密函数。
For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.
AMI实例已经预先配置,从而允许您使用安全Shell(SSH)和在创建实例时必须生成和指定的私有密钥来访问UNIX控制台。
The AMI instance is preconfigured to allow you to access the UNIX console using a secure shell (SSH) and the private key you had to generate and specify at the time the instance was created.
然而,由于其集中式访问控制和密钥分配方式,限制了组规模的进一步扩展。
However, the modes of centralized access control and key distribution limit the extension of their group sizes.
本文对基于逻辑密钥树的集中控制方案进行了分析和改进。
This paper analysis the centralized control scheme based on logical key hierarchy and gives an improvement.
由该函数产生的跳频图案不仅有良好的随机性和均匀性,而且具有易于硬件实现和密钥产生控制的特点。
The frequency hopping pattern thus generated has not only good randomicity and uniformity, but also features for easy implementation and encryption key generation easily controlled.
通过数据加密、密钥管理、用户拜访控制等一系列的手腕来维护数据库内部数据的安全。
By database encrypting, and key management and users access control, we can protect the database from destroying.
针对动态对等群组设计了一个具有许可控制功能并且可认证的密钥协商方案。
An authenticated group key agreement scheme with admission control for dynamic peer groups was presented.
完整设计了模型的整个可实现框架:包括各组成模块的功能、相关数据结构和消息编码格式、证书管理库和密钥环的设计,以及具体的访问控制流程等。
Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.
这个量子密钥传输协议在通信节点和控制中心之间通过多个GHZ对构建安全的密码分配系统。
The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers.
查看密钥容器的访问控制列表(acl)。
更改密钥容器的访问控制列表(acl)。
提出了一种适用于多层组播服务的安全架构,介绍了组成员控制、组密钥管理以及数据的安全传输。
We propose a secure framework for multi-layer multicast applications and introduce the control of group members, the management of secret key and the secure transmission of data.
注意,容器存储在常规操作系统文件中,对加密密钥的访问受该文件上的ACL控制。
Note that the container is stored in a regular operating system file and access to the encryption key is being regulated by the ACLs on the file.
通过密钥生成协议解决了由于远端控制主机的更换而导致的密钥更换问题。
Key creation protocol resolves the key replacement problem cause by the replacement of remote control host.
这些被称为“软件发布状态密钥”的公钥控制证书验证过程的行为。
These keys, called the Software Publishing State keys, control the behavior of the certificate verification process.
该方法基于多维空间变换,构造频率转移函数简单方便,而且便于跳频密钥的管理和控制。
The technique is based on multi- dimension space transform, the realizing of this technique is convenience, and it is easy to control the secret key of frequency hopping.
该方法基于多维空间变换,构造频率转移函数简单方便,而且便于跳频密钥的管理和控制。
The technique is based on multi- dimension space transform, the realizing of this technique is convenience, and it is easy to control the secret key of frequency hopping.
应用推荐