• Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need.

    密码学作为信息安全技术核心领域,提供多种密码算法应用协议满足人们实际应用的需要。

    youdao

  • The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.

    网络信息安全技术一般包括身份认证授权控制审计数据保密数据完整性等几个方面。

    youdao

  • Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.

    信息资源保护需求现状分析了当前网络信息安全通常采用技术以及身份验证技术现状。

    youdao

  • This technique improved the security by separating the user information from the password data.

    这项技术通过用户信息密码数据分离而提高安全性

    youdao

  • Therefore, the research of Internet security technique has been one of focuses in the communication and an important research area of the information science.

    因此网络安全技术研究成为现在计算机通信界个热点,并且成为现在信息科学的一个重要研究领域

    youdao

  • The category of the digital watermarking technique belongs to the information security area.

    数字水印技术属于信息安全范畴

    youdao

  • The TEMPEST technique is a new subject in the information security field.

    TEMPEST技术信息安全领域一个专门研究领域。

    youdao

  • Security control is a key technique problem of finance computerizing information system.

    安全性控制金融电子化信息系统技术关键

    youdao

  • Digital watermarking technique is emerging as a cutting edge research field of information security in recent years.

    数字水印技术近几年来信息安全兴起一个前沿研讨范畴

    youdao

  • BCH codes are a subset of the class of linear block codes that have good error correction capability. Information hiding is a new technique in information security field.

    BCH纠错编码线性分组一种较好的纠错能力信息隐藏近年来信息安全领域出现的技术

    youdao

  • Information hiding is a novel technique in the field of information security in this years, and it is significant to covert communication.

    信息隐藏技术近些年来信息安全领域出现一种技术技术对于隐秘通信有着重要的意义。

    youdao

  • Quantum key distribution technique is a popular research subject in information security field, which is based on Heisenberg's uncertainty principle and no-clone theory.

    量子密钥分配技术信息安全最热门研究课题起源于量子力学中的测不准原理未知量子态的不可克隆定理。

    youdao

  • The intrusion detection technique is an important method to insure the computer network security. It is becoming one of hot research topics in information security field.

    入侵检测技术作为确保计算机网络信息安全一个重要手段成为信息安全领域研究热点之一

    youdao

  • Nowadays, authentication technique is becoming an important research content in computer system security field when information security is more important.

    信息安全日益重要今天身份识别技术研究成为计算机安全领域中的一个重要的研究内容

    youdao

  • The paper brings the theory of IFS into the field of information security and proposes a technique for intrusion detection based on intuitionistic fuzzy reasoning.

    将IFS理论引入信息安全领域提出一种基于直觉模糊推理入侵检测方法

    youdao

  • This paper mainly discusses the watermark technique applied in information security concerning digital image.

    论文主要探讨有关数字图像信息安全中的数字水印技术

    youdao

  • Digital watermark is a new and effective way to protect digital products and to maintain the data security. It is a very practical information hiding technique.

    数字水印新的有效数字产品保护数据安全维护技术是一种十分贴近实际应用信息隐藏技术。

    youdao

  • The core of information security is the cryptographic technique.

    信息安全核心密码技术

    youdao

  • Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.

    信息安全技术主要包括加密技术代表的密码技术、密钥管理技术、数据库加密技术

    youdao

  • Digital watermarking technique is an important research field of multimedia information security.

    数字水印技术多媒体信息安全领域一个重要研究课题

    youdao

  • Access control is a main technique to cope with the security problems in information systems.

    访问控制目前解决信息系统安全问题主要技术

    youdao

  • Now, as an important branch of information security, steganography and steganalysis become a hot spot of information technique field.

    作为信息安全技术重要分支写分析目前成为信息技术领域的大研究热点。

    youdao

  • Since the situation of information security becomes increasingly severe, any single security technique or product cannot completely meet the requirements of users for the network security.

    信息安全日益严峻形势下单一安全技术产品已经不能完全满足用户网络安全。

    youdao

  • In this paper, based on the study and analysis of the information security risk assessment's concept, it explained the method and technique about target system.

    简要介绍风险评估指标体系分析了体系中的指标特征,提出了风险评估指标采集技术评估方法

    youdao

  • Public key cryptography is an important technique to realize network security and information security. But the traditional public key cryptosystems are proved quite slow.

    公钥密码实现网络安全和信息安全重要技术之一,传统公钥密码算法速度慢。

    youdao

  • Currently, the information-hiding technique which serves as a new effectual route for resolving the information safely transferring has become hot topic of researching in information security area.

    信息隐藏技术作为一种解决信息安全传输新的有效途径,近年来已经成为信息安全领域研究热点

    youdao

  • Internet Document filtering is an important technique in the information security.

    网上文件过滤网络信息安全研究重要课题。

    youdao

  • Research Fields: the Theory and Technique of Computer network and Information Security; Parallel Computing etc.

    主要研究方向计算机网络信息安全理论技术并行计算

    youdao

  • Research Fields: the Theory and Technique of Computer network and Information Security; Parallel Computing etc.

    主要研究方向计算机网络信息安全理论技术并行计算

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定