第三章研究课题是密码技术、数字签名、网络加密技术和安全API。
The third chapter studies cryptology data signature types of network cryptology and secure API.
阿联酋的监管官员称,黑莓的专用网络,和先进的加密技术使该手机经因特网发送的信息安全得过了头。
The UAE's regulators say the BlackBerry's proprietary network and tight encryption make messages the devices send over the Internet too secure.
幸运的是,能够确保邮件从一台无处不在的计算机到另一台以及到存储在网络系统上的保密私人信息的加密技术已经存在。
Fortunately, cryptographic techniques already exist to secure messages from one ubiquitous computer to another and to safeguard private information stored in networked systems.
为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
而加密技术则是网络安全技术中的核心技术。
And encryption technology is the core technology of the network security technology.
数据加密技术是实现网络安全的关键技术之一。
The data encryption technology is one of the key skills to ensure the network security.
本文介绍了作者在全国第一个注册建筑师网络考试系统中所应用的网络安全与加密技术。
The article introduces the network security and encryption techniques applied by the authors in the first examination system for the registered architects in China.
数据加密技术是实现网络安全的关键技术之一。
Data encryption is one of the key technologies in network security.
下面哪种加密技术可以最好的保护无线网络遭受中间人攻击?
Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?
随着数字签名、身份验证、数据加密技术的应用,数据安全问题得到了缓解,尤其是数据加密技术使网络数据传输更加安全。
According to data signature, evidence of identity, data encryption was used, the question of data security was solved, especial technicality of data encryption made data transmit become security.
此外,本系统还利用数据加密技术,实现了数据在网络中的安全传输,利用数字签名技术实现了网上审批功能。
Furthermore, the system USES the data encrypting to come true the data transfers safely, and the digital signature to carry out online approve system.
给出了一种新的信道加密的思想——将混沌加密技术应用于网络传输通信。基于此思想实现了一个密钥文本的P 2 P网络传输系统。
Carrying out a new channel encryption method based on chaotic encryption, and employing this method to develop a key text P2P transmission system.
设计了一种基于指纹加密技术的网络身份认证协议。
The contents of the paper are listed as follow:1. Design an authentication protocol based on fingerprint encryption.
但是,在各类网络安全技术中,加密技术是基础。
But, in technology of security of of all kinds network, adding secret technology is a foundation.
该文提出了一种包含可信任的第三方的网络认证结构,其结合了手形认证技术和加密技术。
This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.
该文提出了一种包含可信任的第三方的网络认证结构,其结合了手形认证技术和加密技术。
This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.
应用推荐