CAJ digital watermark in information security applications.
CAJ数字水印在信息安全中的应用。
Syncing security information for remote service authentication and techniques to consistently brand and personalize applications are just a couple of examples of how best to use the bridge.
为远程服务验证同步安全信息,以及提供品牌一致的技术,以及打造个性化应用程序,这些仅仅演示了桥接的一部分最佳应用。
As the Internet increasingly emphasizes information security, more web applications are using SSL authentication.
随着互联网日益强调信息安全,越来越多的web应用程序在使用SSL身份认证。
The "unlocked" information can be mixed and transformed to meet specific needs and the demands of situational applications, while security and governance are managed to enterprise standards.
“解锁”信息可以混合并转换为符合环境应用程序的特定需求和要求,而安全和控制则通过企业标准进行管理。
It can provide many network applications with all kinds of security service, such as authentication, confidentiality, information integrity and non-repudiation of transaction.
它可以为各种网络应用提供身份认证、信息的机密性和完整性以及交易的不可否认性等安全服务。
This paper discusses information security threats and cryptosystems, and describes standardizations, organizations, development and applications and export restriction in cryptologic technology field.
本文论述信息安全威胁和密码体制,描述密码技术领域的标准化、组织机构、开发应用和出口限制。
Therefore, the research on ECC and its applications are becoming new highlight in information security field.
因此,ECC及其应用正在晋升为信息安全研究领域新的热点。
Detection of Security Vulnerabilities in Applications with Static analysis requires precise context-sensitive alias analysis information.
使用静态分析方法检测应用程序安全漏洞的基础是精确的上下文敏感别名分析信息。
Process audit software on information system applications is effective means in ensuring security of information systems.
信息系统应用过程审计是一种有效的信息系统安全保障手段。
At present, the problem of network security such as information leakage, network viruses, such as a direct impact on the normal computer applications.
目前,网络安全问题如信息泄密、网络病毒等直接影响计算机的正常应用。
SVM applications, such as pattern recognition, function approaching, time series prediction, fault prediction and recognition, information security, power system and power electronics, are described.
归纳了支持向量机在诸如模式识别、函数逼近、时间序列预测、故障预测和识别、信息安全、电力系统以及电力电子领域中的应用。
With the extensive applications of the network and other information technologies, the security of network systems has become critical.
随着网络和其它信息技术的广泛应用,网络系统的安全变得至关重要。
In practical applications, we need to effectively detect these vulnerabilities and avoid the disclosure of security information.
在现实的应用中,我们需要有效地检测测这些漏洞并加以解决,避免安全信息的泄露。
Face detection plays an important role in security, information processing and other applications.
人脸检测在安全、信息处理等应用领域起到很重要的作用。
The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.
数字签名技术在身份认证、数据完整性等方面具有其它技术所无法替代的作用,在信息安全领域得到广泛的应用。
The purpose of the sub-project is to provide a fundamental platform for the upper applications such as national network security and information security.
该实验床为上层国家网络安全与信息安全等应用提供基础性支撑平台。
Four is not sure the absolute security of the WiFi, try not to use payment applications or interactive sensitive information in order to protect the safety of funds and information.
四是在不确定绝对安全的wifi下,尽量不要使用支付类应用或交互敏感信息,以保障资金及信息安全。
Absrtact: Internet banking, online transaction has been widely used in practice, information security has become an important factor in the credibility of network applications.
摘要:网络银行、网上交易在实际中已被广泛应用,信息的安全成为网络应用可信度的重要因素。
In this lecture the speaker will demonstrate sample algebraic and number theory applications in information security, in particular, in the design of cryptosystems.
在此讲座中,报告人将用实例展示代数和数论在信息安全,特别是密码系统设计中的应用。
Digital watermarking technologies have aroused board attention in academy and industry, because of their brand applications, and have been an advanced direction of information security.
数字水印技术,由于其崭新的应用前景,已经受到学术界和工业界的广泛关注,成为了信息安全技术的前沿方向。
Face recognition in computer is a very active research topic nowadays, shows a wide range of applications in the areas of information security, criminal detection, import and export controls etc.
计算机人脸识别是目前一个非常活跃的研究课题,在信息安全、刑事侦破、出入口控制等领域呈现了广泛的应用前景。
Identify several types of security management strategies and defenses, and explain how they can be used to ensure the security of business applications of information technology.
确定几种类型的安全管理策略和防御,并说明如何利用它们,以确保安全,业务应用信息技术。
The benefit of installing an application is lowered security restrictions so that applications may read and write files, and access user preferences and system information.
安装一个应用程序的好处是较低的安全限制,因此应用程序可以读、写文件,并且获得用户参数选择和系统信息。
Please read your mobile provider's terms of service for information about the security of applications stored on your device.
请仔细阅读你移动设备上你与移动服务商的有关信息安全的服务条款。
Signatures of behavioral activity where applications and system resources are modified and might indicate a benign security risk or an attempt to access sensitive system information.
信息级别,已经不算真正意义上的威胁了,对于系统和应用程序资源的修改,对敏感系统信息的读取都属于此类。
Signatures of behavioral activity where applications and system resources are modified and might indicate a benign security risk or an attempt to access sensitive system information.
信息级别,已经不算真正意义上的威胁了,对于系统和应用程序资源的修改,对敏感系统信息的读取都属于此类。
应用推荐