This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
This work presents a dual-core two-field elliptic curve cryptosystem supporting several elliptic curve cryptography(ECC) protocols to accelerate signature generation and verification.
为了加快签名和验证的速度,给出了一种支持多种椭圆曲线密码(ECC)协议的双核双域ECC处理器结构。
This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.
文章提供了。NET框架安全性方面的概述,具体讲述基于角色的安全性、代码访问安全性、验证、堆栈审核、隔离存储、加密等方面的核心安全技术。
This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.
该文提出了一种包含可信任的第三方的网络认证结构,其结合了手形认证技术和加密技术。
This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.
该文提出了一种包含可信任的第三方的网络认证结构,其结合了手形认证技术和加密技术。
应用推荐