• If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.

    如果一种理想的加密技术会有很多法律障碍来限制它的使用。

    youdao

  • We point out the solution of the security problem is based on encryption technique and digital watermark technique.

    数字水印技术正是为了解决问题产生

    youdao

  • Researching some data processing techniques, such as data compression technique, database technique and data encryption techniques.

    研究数据压缩数据库、数据加密网络数据处理技术

    youdao

  • For this purpose, after deeply researched Encryption and comparison, we use combination Encryption technique to optimize cryptography.

    为此我们深入研究加密算法,对多种算法进行了优劣性比较组合密码技术优化和强化加密算法。

    youdao

  • A substitution cypher is a simple encryption technique where every letter of the alphabet is substituted with another letter from the alphabet.

    置换密码一种简单加密技术,采用这项技术将把字母表中的每个字母替换字母表中的其他字母。

    youdao

  • Double random phase encryption technique is simulated, its faulty tolerance is also analyzed and results of simulated experiments are given.

    对双随机相位加密过程进行了计算机模拟技术的误差容限进行了分析模拟。

    youdao

  • A new optical encryption technique based on double random phase computer-generated hologram of asymmetry fractional Fourier transform is presented.

    提出一种利用不对称分数傅里叶变换随机相位编码对图像加密方法

    youdao

  • Because of the unavoidable deficiencies of the original software encryption scheme, people pay more and more attention to the hardware encryption technique.

    原有采用软件加密通信方案种种的缺陷使人们把目光逐渐转向了采用更加安全快速硬件加密措施。

    youdao

  • This paper introduced the functional module, communication mode, information flow, communication standard and encryption technique of Electronic Data Interchange.

    介绍电子数据交换功能模块通信方式信息流程、通信标准加密技术

    youdao

  • An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.

    保证图像数字水印棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法

    youdao

  • The chaotic image encryption technique is Presented in this paper; some advantages with chaotic technique and some valuable Problems for further research were illustrated.

    本文介绍了混沌加密技术利用混沌技术进行图像加密的方法,并阐述了图像混沌加密的特点一些值得进一步研究问题

    youdao

  • Transmission of the radio signal that activates the system is not particularly secure, however. A new encryption technique increases security without draining the key's battery.

    然而无线电传输激活汽车系统方法不是绝对安全,下面介绍一种增加汽车安全性的加密技术。

    youdao

  • Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.

    椭圆曲线密码(ECC)一个基于椭圆曲线理论公钥加密技术可以用来创造更快更小高效加密密钥

    youdao

  • If you provide encryption, then an attacker can generally still attack the technique by modifying your client.

    如果提供加密攻击者通常仍然可以通过修改客户机攻击技术

    youdao

  • Positively because of this, the digital signature is used as a kind of technique having function of the new integrity authentication, identification, non-repudiation and encryption.

    由于数字签名作为具有消息完整性认证可鉴别性、不可否认具有加密功能技术应运而生。

    youdao

  • An information encryption method is proposed based on digital holographic technique and phase retrieve algorithm.

    提出了基于数字全息技术相位恢复算法的信息加密方法

    youdao

  • The security measures to the data in AMRS are analyzed and the scheme that implements point to point encryption to the date of remote network is proposed based on digital signature technique.

    分析了当前国内已应用远程抄表系统数据采取的安全措施提出利用数字签名技术对远程网络数据施行加密

    youdao

  • With the In System Programming technique(ISP), the system reconfiguration, the encryption and decryption for data communication are realized.

    采用系统可编程技术ISP)实现系统重构传输数据加密解密编码。

    youdao

  • The technique devised by Ms Geambasu and her colleagues USES one of the least secure areas of the web to store encryption keys that self-destruct after a certain period.

    Geambasu女士同事们发明这项技术使用种并不安全网络空间,存储一定时期可以自毁加密密钥

    youdao

  • A new technique of optical image encryption and decryption based on the methodology of virtual optics is proposed.

    虚拟光学数据加密理论模型基础上,提出了一种光学图像加密的可视化密码构造算法。

    youdao

  • The hopping code technology is an encryption and decryption technique that data transfer is of high security, and the hopping code mechanism makes each transmission unique.

    滚动技术一种使数据传输具有极高保密性解密技术每次传输代码都是唯一的。

    youdao

  • A novel image encryption scheme based on chaos-sorting technique is proposed.

    提出一种新的基于混沌有序化映射的数字图像加密方法

    youdao

  • The detailed programming method technique and steps of DES encryption algorithm Using BASIC was introduced in this paper.

    具体介绍BASIC语言实现DES算法程序设计方法技巧步骤

    youdao

  • This paper discusses vital technique for secure communication of multimedia. It analyzes some ways for stream data encryption.

    讨论保障多媒体通信安全几个关键技术分析了流媒体加密的几种方式。

    youdao

  • One way of making Internet communications more secure is encryption, the technique for coding messages so they can only be read by someone who has the encryption "key."

    使因特网交流安全方法密码技术,技术编码信息因此他们只能知道密码的读取

    youdao

  • One way of making Internet communications more secure is encryption, the technique for coding messages so they can only be read by someone who has the encryption "key."

    使因特网交流安全方法密码技术,技术编码信息因此他们只能知道密码的读取

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定