• This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    安全策略使用非对称加密执行数字签名验证加密解密

    youdao

  • This work presents a dual-core two-field elliptic curve cryptosystem supporting several elliptic curve cryptography(ECC) protocols to accelerate signature generation and verification.

    为了加快签名验证的速度,给出了一种支持多种椭圆曲线密码ECC协议双核双域ECC处理器结构。

    youdao

  • This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.

    文章提供了NET框架安全性方面概述具体讲述基于角色安全性、代码访问安全性、验证堆栈审核、隔离存储、加密等方面的核心安全技术。

    youdao

  • This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.

    该文提出了一种包含可信任第三的网络认证结构结合了手认证技术加密技术。

    youdao

  • This paper presents a trusted third party authentication architecture in which hand shapes verification techniques and cryptography techniques are combined.

    该文提出了一种包含可信任第三的网络认证结构结合了手认证技术加密技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定