Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.
指纹识别器、板载数据加密,以及其他基于硬件的安全功能,现在在笔记本电脑上很普遍,但智能手机和其他“后pc”设备依然有待支持。
The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.
可信计算是在计算和通信系统中广泛使用基于硬件安全模块支持下的可信计算平台,以提高整体的安全性。
As network processor become core hardware in the next generation network device. The research in this paper is security of network information transmission based-on network processor.
因此网络处理器将成为下一代网络设备的核心硬件,本文的研究问题是基于网络处理器的网络信息传输的安全性。
As network processor become core hardware in the next generation network device. The research in this paper is quality and security of network information transmission based-on network processor.
因此网络处理器将成为下一代网络设备的核心硬件,本文的研究问题是基于网络处理器的网络服务质量和网络信息传输的安全性。
Last, the simulations of hardware and software show that the information security system based on chaos algorithm have high security level and high performance-value ratio.
最后,通过硬件及软件的仿真结果,表明了本文所设计的基于混沌算法的信息安全系统能够较好的保障信息安全,且系统的性价比较高。
The thesis describes the framework of the security system based S3C2410 platform in detail, including the design and development process of hardware and software system.
本论文详细描述了基于S3C 2410平台的安防系统的结构框架,主要包括硬件系统以及软件系统的设计和开发过程。
Because of high security, high speed, and good performance advantages, such as hardware-based encryption technology to protect disk data has become the mainstream of current trends and research focus.
由于安全性高、速度快、性能好等优势,硬件加密技术成为了当前保护磁盘数据的主流趋势和研究热点。
Based on the nonuniformity analysis of image in the X-Ray security inspection system, a novel correction method using both software correction and hardware correction is proposed.
首先分析了X射线安检系统应用中图像非均匀性的原因,并在此基础上提出了一种新的软硬件结合的校正方法。
Hard disk encryption card, which is designed based on the IP reuse in this paper, is a kind of hardware encryption device to ensure storage security.
基于IP复用方法实现的硬盘加密卡,是一种用于保障数据存储安全的硬件加密装置。
Based on commonly procedure, with intelligent active security system, computer vision and action image process, we summarized a course to develop and test the DSP hardware and software system.
在DSP系统常规的开发过程基础上,结合汽车智能主动安全系统中的计算机视觉及动态图像处理,总结出了一套行之有效的DSP软硬件系统的开发、调试过程。
Based on commonly procedure, with intelligent active security system, computer vision and action image process, we summarized a course to develop and test the DSP hardware and software system.
在DSP系统常规的开发过程基础上,结合汽车智能主动安全系统中的计算机视觉及动态图像处理,总结出了一套行之有效的DSP软硬件系统的开发、调试过程。
应用推荐