• The core of information security is the cryptographic technique.

    信息安全核心密码技术

    youdao

  • The cryptographic computation adopts the cryptographic technique designated by the National Cipher Management Committee Office.

    密码计算采用国家密码管理委员会办公室指定密码技术

    youdao

  • The paper analyzes the secure needs of GPS vehicle monitoring system to guard against theft and designs a secure GPS vehicle monitoring system using cryptographic technique.

    本文分析了用于防盗GPS车辆监控系统安全需求采用密码技术设计了一个安全车辆监控系统。

    youdao

  • The cryptographic technique provides mobile Agent with a defense against attacks from malicious hosts by maintaining the confidentiality of carried messages and safeguarding them against tampering.

    密码应用可使移动代理免受运行主机上恶意软件攻击保持携带信息机密性并不受撺扰

    youdao

  • The cryptographic technique provides mobile Agent with a defense against attacks from malicious hosts by maintaining the confidentiality of carryied messages and safeguarding them against tampering.

    摘要密码应用可使移动代理免受运行主机上恶意软件攻击保持携带信息机密性并不受撺扰。

    youdao

  • Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.

    椭圆曲线密码(ECC)一个基于椭圆曲线理论公钥加密技术可以用来创造更快更小高效加密密钥

    youdao

  • Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.

    椭圆曲线密码(ECC)一个基于椭圆曲线理论公钥加密技术可以用来创造更快更小高效加密密钥

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定