• 提出了一种新的密钥控制分层变换数字图像乱算法。

    Presents a new technology for scrambling and restoring digital image Based on the hierarchical transformation under the control of secret key.

    youdao

  • 首先水印信息进行PDF417编码,密钥控制下进行混沌序列置乱得到二值水印图像

    Firstly, it can be obtained 2-value watermark image by PDF417 coding to watermark information and chaotic sequence scrambling.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • TCS要求控制关键系统资源分配释放包括数据库记录通信套接字安全密钥等等

    The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.

    youdao

  • 我们前面也提到了,这个抽象先进安全控制——像是硬件安全模块——使用更加复杂,结果就可能蹩脚密钥管理程序

    As we noted earlier, this abstraction layer also complicates the use of advanced security controls, such as hardware security modules, possibly leading to poor key management procedures.

    youdao

  • 支持自定义JSSE信任密钥管理器从而允许SSL握手进行更多控制

    Support for custom JSSE trust and key managers enables more control of the SSL handshake.

    youdao

  • 实现时我们完全信任所有主机密钥只是通过返回一个defer . succeed对象,将控制异步反应器(reactor)的核心

    In our implementation, we trust every host key and simply give control back to the asynchronous reactor core by returning a defer.succeed object.

    youdao

  • SecureCloud可以云端存储加密数据同时允许使用Trend密钥管理技术控制自己的密钥

    SecureCloud enables you to store encrypted data in the cloud while controlling your own keys using Trend's key-management technology.

    youdao

  • 认证密钥控制变量

    The authentication key is set as a class variable in your controller.

    youdao

  • 甚至还可以使用控制管理自己自定义密钥应用程序也可以使用IBM定义的API进行访问

    You can even manage your own custom keys using the console, and applications can access them using IBM-defined APIs.

    youdao

  • 密钥管理工具集成管理控制并且创建密钥所需步骤几乎缩减了一半

    Key management tools have been integrated into the administrative console, and the steps you needed to take to create a key have been cut almost in half.

    youdao

  • 对于自动实现身份验证使用API密钥控制的。

    For automatic implementations, authentication is governed using API keys.

    youdao

  • 就象城市公共交通IC一样,这些卡在交给公交系统使用前,每张密钥进行出厂加密控制

    Like urban public transport as IC CARDS, these CARDS to the public transport system, each card key encryption to have control of the factory.

    youdao

  • 对于需要基于角色访问控制并且实现加密密钥简单应用程序那么可以一个用户出口用于所有加密解密函数

    For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.

    youdao

  • AMI实例已经预先配置,从而允许使用安全ShellSSH创建实例必须生成和指定私有密钥访问UNIX控制

    The AMI instance is preconfigured to allow you to access the UNIX console using a secure shell (SSH) and the private key you had to generate and specify at the time the instance was created.

    youdao

  • 然而由于其集中式访问控制密钥分配方式限制规模进一步扩展

    However, the modes of centralized access control and key distribution limit the extension of their group sizes.

    youdao

  • 本文基于逻辑密钥集中控制方案进行了分析改进。

    This paper analysis the centralized control scheme based on logical key hierarchy and gives an improvement.

    youdao

  • 由该函数产生图案不仅良好随机性均匀性而且具有易于硬件实现密钥产生控制的特点。

    The frequency hopping pattern thus generated has not only good randomicity and uniformity, but also features for easy implementation and encryption key generation easily controlled.

    youdao

  • 通过数据加密密钥管理用户拜访控制等一系列的手腕维护数据库内部数据的安全。

    By database encrypting, and key management and users access control, we can protect the database from destroying.

    youdao

  • 针对动态对等群组设计一个具有许可控制功能并且可认证密钥协商方案

    An authenticated group key agreement scheme with admission control for dynamic peer groups was presented.

    youdao

  • 完整设计了模型整个可实现框架包括各组成模块的功能相关数据结构消息编码格式证书管理密钥的设计,以及具体访问控制流程

    Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.

    youdao

  • 这个量子密钥传输协议通信节点控制中心之间通过多个GHZ构建安全的密码分配系统

    The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers.

    youdao

  • 查看密钥容器访问控制列表(acl)。

    View the access control list (ACL) for a key container.

    youdao

  • 更改密钥容器访问控制列表(acl)。

    Change the access control list (ACL) for a key container.

    youdao

  • 提出一种适用于多层组服务安全架构介绍组成员控制、组密钥管理以及数据安全传输。

    We propose a secure framework for multi-layer multicast applications and introduce the control of group members, the management of secret key and the secure transmission of data.

    youdao

  • 注意容器存储常规操作系统文件中,加密密钥访问文件ACL控制

    Note that the container is stored in a regular operating system file and access to the encryption key is being regulated by the ACLs on the file.

    youdao

  • 通过密钥生成协议解决了由于远端控制主机的更换而导致密钥更换问题

    Key creation protocol resolves the key replacement problem cause by the replacement of remote control host.

    youdao

  • 这些被称为软件发布状态密钥公钥控制证书验证过程行为

    These keys, called the Software Publishing State keys, control the behavior of the certificate verification process.

    youdao

  • 方法基于多维空间变换,构造频率转移函数简单方便而且便于密钥管理控制

    The technique is based on multi- dimension space transform, the realizing of this technique is convenience, and it is easy to control the secret key of frequency hopping.

    youdao

  • 方法基于多维空间变换,构造频率转移函数简单方便而且便于密钥管理控制

    The technique is based on multi- dimension space transform, the realizing of this technique is convenience, and it is easy to control the secret key of frequency hopping.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定