SSL握手过程中的密钥交换和认证算法。
The key exchange and authentication algorithm used during the SSL handshake.
给出了集团签署与集团认证算法。
The algorithm of group signature and group authentication is presented out.
给出了集团签署与集团认证算法。
给出了集团签署与集团认证算法。
实验数据表明,该认证算法是正确有效的。
Experimental data shows the authentication algorithm is correct and effective.
WebSphereMQ 5.3仅支持RSA密钥交换和认证算法。
WebSphere MQ 5.3 supports only the RSA key exchange and authentication algorithms. Details of some of the supported CipherSpecs are listed in the following table.
同时提出了一套针对MPEG视频协议的半脆弱数字水印认证算法。
In addition a digital watermark authentication arithmetic aimed at the MPEG standard is proposed.
同时提出了一套针对MPEG视频协议的半脆弱数字水印认证算法。
In addition a digital watermark authentication arithmetic aimed at the MPEG standard is propose...
文章结合椭圆曲线数字签名,提出了一种基于硬件指纹的电子书认证算法;
Combining with elliptic curve digital signature, the paper forwards ane-book attestation arithmetic which is based on hardware fingerprint.
它规定了RSA密钥交换和认证算法的使用,还规定了RC4_SHA_US密码规范。
This specifies the use of the RSA Key Exchange and authentication algorithm, along with the RC4_SHA_US CipherSpec.
它们都依赖于2.6内核中包含的CryptographicAPI提供的认证算法。
Both rely on authentication algorithms supplied by the Cryptographic API, which also included in the 2.6 kernel.
通常认证卡的速度受限于板卡cpu的总线宽度及MIPS和认证算法的速度。
In general, the speed of authentication card is restricted by the bus width of CPU on card, MIPS and the speed of authentication algorithm.
最后本文还借用数字签名思想提出了一种基于半易损水印的实用的数字图像认证算法。
At last we propose a half frangible watermark algorithm based on the theory of digital signature, which can authenticate the integrity of image.
由于发现了认证算法中存在的缺点,或者由于系统认证需求的变化,有时候需要更改认证框架的组件。
Its components may have to be changed due to deficiencies found in the authentication algorithms or to changes in requirements for system authentication.
在认证阶段,运用相同的技术处理待检测图像,生成影子,用认证算法实现对图像的完整性认证。
In the authentication phase, the same technology is used to the suspect images, then using the image authentication algorithm to achieve integrity certification.
MD 5报文摘要算法是一种应用广泛的身份认证算法,该文首先对数据加密技术进行了简要的概述。
MD5 algorithm is an authentication method used in a broad research field. The data encryption techniques are summarized in this paper.
第三种算法是将前两种空域和变换域算法进行有效融合,从而提出了双重多功能性水印数字图像认证算法。
The third method is effective integrate the former two algorithms, which proposed dual watermarking algorithm for digital image authentication.
针对互联网上图像传播的需要,分析了压缩域中认证算法所应有的特征,并设计了在JPEG压缩域中的安全认证算法。
Analyzing the character of the authentication algorithm in the compression field and designing a secure authentication algorithm in the JPEG compression field.
分析了CGI模式中常见的基于环境变量的认证算法所存在的安全隐患,给出了根源是过分信赖服务端环境变量所致的结论。
This paper describes the security trouble of authentication algorithm based on environment variable in CGI mode and points out it's caused by excessively trust the environment variable of server.
该功能使用LotusMobileConnect所有组件可用的认证方法和算法。
This function USES authentication methods and algorithms available to all components of Lotus Mobile Connect.
LotusMobileConnectclientless选项,即Lotus Mobile ConnectHTTP访问服务,使用与纯vpn客户端同样强大的认证和加密算法。
The Lotus Mobile Connect clientless option, that is, Lotus Mobile Connect HTTP access services, USES the same strong authentication and encryption algorithms as the full VPN client.
组合公钥技术是一种新的认证技术,它是基于标识的公钥算法技术。
This technology is a new authentication technique, and it's an algorithm based on the identity technology.
实验表明该算法可以达到预期的目的,可以满足对新闻图片的认证、医疗图像数字化、网上交易、传输等商业需求的基本需要。
Experiment has indicated that the algorithm can gain its ends and can be used for authentication of news photos, medical digital photos, network business and transmission application.
如果您需要,您还可以导入安全认证,并且用对于Web服务调用和消息返回的安全算法来创建SOAP安全认证。
If you need to, you can also import security certificates and create SOAP security configurations with security algorithms for the Web service calls and message returns.
CA认证系统拥有高强度的加密算法,高可靠性的安全机制及完善的管理及配置策略,提供自动的密钥和证书管理服务。
Ca authentication center provides highly intensive encipher algorithm, highly liable security mechanism and management strategy, automatic generating key and certificate management.
哈希算法在信息安全领域主要应用于验证数据完整性和签名认证。
In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.
经广泛测试、并成为工业界标准的数据加密标准(DES)是远程访问认证产品中最强的加密算法之一。
One of the strongest encryption algorithms used by remote access authentication products is the widely tested and implemented industry-standard Data Encryption Standard (DES).
提出一种新的用于图像认证及恢复的半脆弱水印算法。
This paper presents a novel semi-fragile watermark algorithm for image authentication and recovery.
本文提出一种用于视频产品完整性认证的位域实时视频水印的算法。
This paper proposes a real time watermarking algorithm in the bit domain for complete authentication.
本文提出一种用于视频产品完整性认证的位域实时视频水印的算法。
This paper proposes a real time watermarking algorithm in the bit domain for complete authentication.
应用推荐