This component can be configured to use a specific encryption scheme.
可配置该组件来使用一个特定加密方案。
A novel image encryption scheme based on chaos-sorting technique is proposed.
提出一种新的基于混沌有序化映射的数字图像加密方法。
A novel public key encryption scheme with multiple private keys is presented.
提出了一种新的具有多个私钥的加密方法。
A stream cipher encryption scheme was designed based on piecewise nonlinear chaotic map.
基于分段非线性混沌映射设计了一种流密码加密方案。
In this paper, a signature encryption scheme based on ellipse curve cryptosystem is proposed.
首先提出一个基于椭圆曲线密码体制的签密方案。
Begins by indexing it and encrypting it with a symmetric encryption scheme (e.g., AES) under a unique key.
首先为其建立索引,并使用对称的加密模式(例如aes)以唯一的密钥对其进行加密。
Using an encryption scheme will prevent exposing a user's password if the database ever becomes compromised.
如果数据库暴露了,那么使用加密方案将防止暴露用户的密码。
In this paper, a symmetric image encryption scheme based on composite discrete chaotic system is presented.
提出了一种基于复合离散混沌系统的对称图像加密算法。
Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme.
最后,本文给出了一个基于此混合加密方案的多媒体会议系统的实现。
According to the security of the scalable video stream, an integrated video compression-encryption scheme is proposed.
针对可伸缩性视频流的安全性问题,提出了一套完整的视频压缩加密的方案。
To overcome that, you'd need to use a symmetric encryption scheme and require the key each times you read/write the file.
克服,你需要使用对称加密方案和需要的关键每一次你读/写文件。
A new efficient ID-based authenticated encryption scheme is proposed, in which some characteristics of bilinear map are used.
利用椭圆曲线上的双线性映射的特性,提出了一个新的基于身份体制的安全有效的认证加密方案。
It was demonstrated that the proposed protocol was not only a secure encryption scheme, but also a secure authentication scheme.
证明了给出的协议既是一个安全的加密方案,也是一个安全的认证方案。
He calls this self-refreshing property "bootstrapping," and it was enough to make his homomorphic encryption scheme fully homomorphic.
他称这种自我更新的属性为“自展的”,该属性保证他的同态加密方案是完全同态的。
RS485 remote sale of electricity encryption scheme, the host read data command issued, the current remaining capacity to read the table.
RS485远程售电加密方案,主机发读数据命令,读取表内当前剩余电量。
A new fair exchange protocol with semi-trusted third party is proposed on the basis of a new convertible authenticated encryption scheme.
基于一种可转换的认证加密方法,设计出一种新的包含半可信第三方的公平交换协议。
The problem was a famous one in the field – it had been proposed in the late 1970s by developers of the famous RSA public key encryption scheme.
这是密码学领域一个有名的难题--它于20世纪70年代末由著名的RSA公钥加密方案的开发人员提出的。
In this paper, the symmetric image encryption scheme based on 3-d quasi-affine transformation over limited integer grids and 4-d chaotic map.
本文基于三维整数拟仿射变换和四维混沌系统对图像加密。
Smart card is integrated into authenticated encryption scheme, a new cryptographic scheme based on the discrete logarithm problem is presented.
将智能卡技术引入认证加密体制中,提出了一种基于离散对数问题的认证加密方案。
Using the technologies of DNA synthesis, DNA clone, PCR and DNA chip and the theory of computational complexity, an encryption scheme is formed.
利用DNA合成技术、DNA克隆技术、PCR扩增技术以及DNA芯片技术,结合密码学的计算复杂度理论,提出了一种基于DNA技术的加密方法。
Based on learning the existing security schemes, an encryption scheme supporting secure in-network processing for wireless sensor networks was introduced.
在研究现有的安全方案的基础上,提出了一种支持安全网内处理的无线传感器网络加密方案。
Because of the unavoidable deficiencies of the original software encryption scheme, people pay more and more attention to the hardware encryption technique.
原有采用软件加密的通信方案因其种种的缺陷使人们把目光逐渐转向了采用更加安全快速的硬件加密措施。
It then encrypts the index using a searchable encryption scheme and encrypts the unique key with an attribute-based encryption scheme under an appropriate policy.
然后它会使用可搜索的加密模式对索引进行加密,用基于属性的加密模式以恰当的手段对唯一密钥加密。
Also we proposed a multiple image encryption scheme by shifting the multiple central parts of spectra together with the double random phase encodingtechnique.
另外我们采用多图像中心频谱平移和双随机位相编码提出了一种多图像加密算法。
According to the MOV reduction theory, the identity-based encryption scheme which is based on the bilinear map will lose the high efficiency of elliptic curve.
根据MOV归约理论,采用双线性映射构造的基于身份加密方案使得该方案不具有椭圆曲线高效的优点。
Not only the security of algorithm, but also the compression efficiency and encryption complexity should be taken into consideration when design an encryption scheme.
在这一过程中,不但要考虑加密算法的安全性,还需要考虑加密算法对码率的影响,以及图像传输的实时性要求。
The experiments show that the encryption scheme above can encrypt the flight data efficiently, and it will be primely applied in the flight data storage and management.
实验表明,该方案能够有效对飞行数据进行加密存储,在飞行数据安全管理方面得到了很好的应用。
Proposes an encryption scheme based on ECC and AES, expatiates the process of design, including key agreement, generation of conversation key and choice of encrypt mode.
提出一种基于ECC和AES相结合的加密系统,具体阐述了该系统的设计过程,包括密钥协定、会话密钥的生成及加密模式的选择。
Based on proxy signature and convertible authenticated encryption scheme, Ren et al. (2005) proposed proxy convertible authenticated encryption and threshold proxy signature scheme.
基于代理签名与可转换认证加密方案,任等(2005)提出了一种代理可转换认证加密和门限代理签名方案。
Ring authenticated encryption scheme can be regarded as the combination of message encryption scheme and ring signature scheme, which has both encryption and ring signatures priority.
环认证加密方案是加密方案与环签名方案的融合,具有这两种方案的优点。
应用推荐