In this paper we discuss data encryption techniques.
论述并介绍几种主要的数据加密技术。
Data is encoded before transmission using encryption techniques which scramble the data.
数据传输之前进行编码加密技术的使用争夺数据。
Therefore, chaos-based encryption techniques play an increasing role in information security.
因此,基于混沌的密码技术在信息安全方面具有重要的地位。
The scheme is based on the theory of linear block codes and does not make use of any encryption techniques.
该方案只基于线性分组码理论,而不使用任何加密技术。
In order to protect CATV scrambling system, random number generator and data encryption techniques are used.
为了保护有线电视加扰系统的安全,采用了随机数的产生、数据的加密等技术。
Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?
下面哪种加密技术可以最好的保护无线网络遭受中间人攻击?
Researching some data processing techniques, such as data compression technique, database technique and data encryption techniques.
研究了数据压缩、数据库、数据加密等网络数据处理技术。
MD5 algorithm is an authentication method used in a broad research field. The data encryption techniques are summarized in this paper.
MD 5报文摘要算法是一种应用广泛的身份认证算法,该文首先对数据加密技术进行了简要的概述。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
The article introduces the network security and encryption techniques applied by the authors in the first examination system for the registered architects in China.
本文介绍了作者在全国第一个注册建筑师网络考试系统中所应用的网络安全与加密技术。
Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.
最后,策略规范可能要求加密订单的某些要素,指示要使用的加密技术、要使用的证书等等。
These problems major included problems of the encryption techniques in the process of data transmission, numerical underwrite and safety in the partially component J2EE.
这些安全问题主要包括数据加密传输问题、数字签名问题和部分J2EE组件的安全问题。
SSL USES encryption techniques, digital signatures and digital certificates to provide message privacy, message integrity and mutual authentication between clients and servers.
SSL使用加密技术、数字签名和数字证书,在客户端和服务器之间提供消息隐私、消息完整性和相互验证。
It focuses on the hardware-based encryption techniques are reviewed to introduce the advantages and disadvantages of hardware encryption technology; types and development.
本文重点对硬件加密技术进行了综述,介绍了硬件加密技术的优缺点、种类及发展趋势。
Different portions of the data may be encrypted with different encryption techniques based upon a predetermined level of security assigned to the portions of the stored data.
数据的不同部分可以利用基于指定给该存储的数据部分的预定安全等级的不同加密技术加密。
Other features include high-security, standards-based encryption techniques, both for unidirectional and bidirectional encryption to encrypt passwords, texts, numbers and binaries.
其他性能包括高安全性、基于标准的加密技术、可同时单向和双向加密的加密密码、文本、数字和二进制文件。
Based on the characteristics of electricity bidding and the demands of encryption techniques, the electronic commercial information technology is introduced into electricity bidding system.
文中根据电力市场条件下发电竞价的特点和信息发布对加密技术的要求,将电子商务信息技术应用于发电竞价系统。
There are also further descriptions on the characteristics of the process of basic encryption techniques, technology limitation, the effect on DBMS, encryption mode and encryption for database.
详细描述了数据库加密的基本流程特点、技术限制、加密对DBMS的影响、加密方式以及数据库的加密方法。
The main contents of this dissertation are as follow:Firstly, the dissertation discusses essentiality of information safety, development of encryption techniques and prospect of embedded system.
论文主要内容概括如下:首先,论文阐述了信息安全的重要性、密码学史、密码学在视频领域的应用和嵌入式系统的发展前景。
SSL helps secure e-commerce communications and payments through a variety of techniques such as message encryption and digital signatures.
通过诸如信息加密和数字签名等多种技术,SSL促进安全的电子商务通信和支付。
There is a need in the art for improved techniques for managing expired and active encryption keys for removable storage media, such as tape cartridges.
本领域内需要一种改进的用于管理可更换的存储介质(例如盒式带)的到期和活动加密密钥的技术。
The security of important data has been enforced using encryption and digital signature techniques.
利用加密和数据签名技术保证了重要数据的安全性和不可抵赖性。
SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.
SSL协议采用了对称加密、非对称加密、信息摘要、数字签名、数字证书等密码学技术。
If you are using more advanced techniques (like public key encryption) you'll probably need to brush up on your math a little more.
如果您使用的是更先进的技术(如公共密钥加密)你可能会需要温习你的数学一点。
Confidentiality and integrity are very important to LDAP services, often implemented with encryption and message digest techniques. LDAP does not support these two well.
数据通信的机密性和完整性保护对LDAP目录服务具有重要意义,通常采用数据加密和消息摘要技术来实现,LDAP自身对此的支持还不太完善。
Data encryption is the most core techniques for the safety of the information.
数据加密技术是保障信息安全的最核心的技术。
Encryption and digital signatures are techniques to expand the dynamics of trust into a new territory.
而加密技术和数字签名则正是一种把信任动力学扩展到新领域的技术。
Additionally, we discuss the security problem of PPP protocol, including encryption and authentication techniques, which ensures the safety of packets in transit.
还研究了PPP协议的安全问题,包括协议的加密和认证机制,确保报文转发过程中的高速和安全性。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
应用推荐