AES is a safety code for the use of information encryption standards.
AES是一种使用安全码进行信息加密的标准。
There are many ways to protect information security, nowadays information encryption is in common use.
现在有很多种保护信息安全的方法,最常用的就是信息加密。
There are two kinds of manners for information encryption: hardware encryption and software encryption.
加密技术的实现方式有两种:分别是硬件加密方式和软件加密方式。
An information encryption method is proposed based on digital holographic technique and phase retrieve algorithm.
提出了一种基于数字全息技术和相位恢复算法的信息加密方法。
The chaotic signal, which possesses natural randomness, can be used for information encryption as sequence cipher.
混沌信号具有天然的随机性,可以作为序列密码应用于信息加密。
The approach to generating digital chaotic sequence can be applied in secret communications and information encryption.
这种产生数字混沌序列的方法可应用于保密通信和信息加密之中。
The article emphasizes on discussing the two measures to protect the datum in the network: accessing control measure and information encryption measure.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.
针对信息与网络安全的重要性及严峻性,提出了一种汉字信息加密、在BMP图像文件中隐藏、恢复及解密的方法。
Based on the features of initial value sensitivity, parameter sensitivity, ergodicity and random similarity, chaotic maps are now widely used in information encryption.
混沌映射因为初值敏感性、参数敏感性、遍历性和类随机性的特点,很适合用于信息加密。
Based on the analyzing of public_key cryptosystem, a practical algorithm of RSA is studied. A network information encryption and decryption system of end to end is developed.
基于对公钥密码体制的分析,研究了RSA密码体制的实现算法,开发了端对端的网络传输信息加密解密系统,在实际网络环境条件下进行的测试证明了其安全性和可靠性。
The purpose of this design is to make the application of information encryption and hiding in real life understood, as well as to describe the principles of the technology on the whole.
该设计旨在理解信息加密与隐藏技术在实际生活中的应用,从总体上阐述了它们的原理。
And then PRI, information encryption and VCS are add to this PLC scheme, and these effective measures improve the home control network characteristics on reliability, security and response time.
该方案由于增加了优先 级机制、信息加密和虚拟载波监听(VCS)等技术,使网络在实际应用中,在可靠性、安全性和满足不同控制 信息对时间的要求等方面,有所改善。
At the present time digital holography is widely used in shape measurement, distortion shaking measurement, micro observation, information encryption, particle measurement, digital watermarking et al.
目前数字全息技术已经广泛应用于形貌测量、变形振动测量、显微观测、信息加密、粒子场测量、数字水印等领域。
Each file entry contains the file name, type, and encryption information.
每个文件条目包含文件名、类型和加密信息。
I start my discussion in this part with an information exchange scenario, which demonstrates the use of XML encryption.
在这一部分中,我以一个信息交换方案开始我的讨论,该方案演示了xml加密的用法。
Encryption: Deals with information hiding.
加密:处理信息的隐蔽。
Notice that unlike in the encryption example, the original entry information is still present; the signature has just been added to it.
注意,与加密的例子有所不同,原始的条目信息仍然会显示出来;签名只是被添加到其中。
The SSL Client initiates the conversation and sends information such as the SSL version, along with the encryption algorithms and hash functions it supports.
SSL客户机开始对话并发送诸如ssl版本之类的信息,同时还发送加密算法以及它所支持的散列函数。
It information security professionals in the medical industry appear to be reluctant to deploy document authentication and encryption for users.
似乎医疗产业的IT信息安全专家们很不情愿为用户提供文档认证和加密功能。
You can also provide user id and password information for database authentication, and you can select the encryption method for the password.
还可以提供用户ID和密码信息,用于数据库身份验证,可以选择密码的加密方法。
See Resources for links to more information on digital certificates and public-key encryption in general.
参见参考资料 获得有关数字证书和公开密匙加密的更多信息的链接。
Encryption keys are a crucial aspect of information security in the delivery of assured communications to military personnel.
加密密钥是信息安全的关键环节,保障军事人员的通信传递。
However, using standard XML encryption, the security information doesn't get lost, because being embedded in the message's body means it's preserved and simply transformed into a JMS payload.
不过,使用标准xml加密,安全信息将不会丢失,这是因为嵌入消息的正文将意味着它将得到保留并只需转换为JMS负载。
The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
Mapping this policy, XML Encryption facilitates the concealment of payment information in the sales department and its disclosure in the accounts department.
通过映射这个策略,xml加密提高了销售部门支付信息的隐密性,也帮助了会计部门对此信息的解密。
The CKG, a reprogrammable encryption-key generator, will work with existing and next-generation information assurance products and equipment used in military vehicles, aircraft and ships.
这种重新编程生成的加密密钥(CKG)将与目前的和下一代信息保障产品和装备共同运行,用于军用车辆、飞机和舰船。
When you use super encryption, you can encrypt just the payment information with the accounts department's secret key to produce an element-encrypted XML file.
使用超级加密时,您可以用会计部门的秘钥只加密支付信息,以产生元素加密的XML文件。
Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.
XML加密只关于加密和解密结构化信息,而不规定密钥交换的任何特定方法。
Information is protected by sophisticated encryption system.
硬盘上的信息被一套复杂的加密系统保护。
Information is protected by sophisticated encryption system.
硬盘上的信息被一套复杂的加密系统保护。
应用推荐