The core of information security is the cryptographic technique.
信息安全的核心是密码技术。
The cryptographic computation adopts the cryptographic technique designated by the National Cipher Management Committee Office.
密码计算采用国家密码管理委员会办公室指定的密码技术。
The paper analyzes the secure needs of GPS vehicle monitoring system to guard against theft and designs a secure GPS vehicle monitoring system using cryptographic technique.
本文分析了用于防盗的GPS车辆监控系统的安全需求,采用密码技术设计了一个安全车辆监控系统。
The cryptographic technique provides mobile Agent with a defense against attacks from malicious hosts by maintaining the confidentiality of carried messages and safeguarding them against tampering.
密码的应用可使移动代理免受运行主机上恶意软件的攻击,保持其携带信息的机密性并不受撺扰。
The cryptographic technique provides mobile Agent with a defense against attacks from malicious hosts by maintaining the confidentiality of carryied messages and safeguarding them against tampering.
摘要密码的应用可使移动代理免受运行主机上恶意软件的攻击,保持其携带信息的机密性并不受撺扰。
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.
椭圆曲线密码(ECC)是一个基于椭圆曲线理论的公钥加密技术,可以用来创造更快、更小、更高效的加密密钥。
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.
椭圆曲线密码(ECC)是一个基于椭圆曲线理论的公钥加密技术,可以用来创造更快、更小、更高效的加密密钥。
应用推荐