The security components contain IBM implementations of various security algorithms and mechanisms.
安全性组件包含各种安全性算法和机制的IBM实现。
Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.
为SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法的库。
This class is used by derived classes to instantiate security algorithm suites, and contains properties that describe the security algorithms.
派生类使用此类实例化安全算法组,并且此类还包含描述安全算法的属性。
If you need to, you can also import security certificates and create SOAP security configurations with security algorithms for the Web service calls and message returns.
如果您需要,您还可以导入安全认证,并且用对于Web服务调用和消息返回的安全算法来创建SOAP安全认证。
With the appropriate persuasion, increasing the security of your authentication schemes can be as easy as applying these control algorithms to your current password entry code.
通过适当的说服工作,增加身份验证方案的安全性可以像对当前密码输入代码应用控制算法一样简单。
These three security providers may have implemented the algorithms you need.
这三个安全性提供者可能已经实现了您需要的算法。
NET Developers needed to configure security Settings, algorithms, policies in various bindings elements in an often time consuming manner, resulting in a challenge larger than necessary.
NET开发人员通常需要花费大量的时间,在不同的binding中对安全、算法、策略等进行配置,这其中充满了不必要的挑战。
Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.
RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可的数据加密规则,支持改善的安全性能。
A while ago an AD hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least90bits for symmetric algorithms used in commercial security.
不久前,计算机科学家和密码学家专门小组发表了一篇论文,建议用于商业安全的对称算法至少要用90位的钥匙。
The existing algorithms of network security situation prediction depended on the initial training data, and the objectivity of predicting results was insufficient.
现有网络安全态势预测算法对初始训练数据依赖性强,预测结果客观性差。
Using the symmetric algorithms and the asymmetric algorithms together security performance of the application system is improved.
将对称密码算法和非对称密码算法共同使用,增强了应用系统的安全性。
We presented several new algorithms of model checking epistemic logics, and explore their applications in verifications of security protocols.
我们给出了一些新的模型检测算法,并探讨它们在安全协议验证中的应用。
The frangibility, security and location ability of the two algorithms are all validated by computer simulations.
这两种算法的懦弱性、安全性和定位才能都通过了盘算机试验给与验证。
Speed, precision and security of the related algorithms altogether determine the efficiency and safety of the information system.
密码算法的安全、准确和快速的实现决定了信息安全体系的安全性和实用性。
The core problem of information security is encryption algorithms.
本文讨论了有关信息安全的核心问题即加密算法。
RSA security is based on complex problem of large number factoring, and factorization algorithms that attack RSA system in use are introduced simply.
RS A密码系统的安全性是基于大数分解困难问题。文中简要地介绍了目前攻击RSA密码系统的常用大数分解算法。
The algorithms and protocols are the base of modern information security technology.
这些算法和协议构成了现代信息安全技术的基础。
In addition, the scheme also builds conditions for a more sophisticated load-balancing algorithms and security policy.
方案还为构建更加精细的负载均衡算法和安全策略创造了条件。
Block cipher is one of the most important encryption and decryption algorithms in information security.
分组密码算法是信息安全领域中最为重要的加解密技术之一。
As the basis and core of information security, cryptography also attracts more and more attention. Brute force attack on symmetric cipher algorithms is an important direction of cryptography.
密码学作为信息安全的基础和核心,也越来越受到人们的关注,而暴力破解对称密码算法,是密码学研究的一个重要方向。
In these two algorithms, chaotic sequences control some parameters of wavelet transform or decide the hiding location to improve the algorithm itself security.
在这两种算法中,混沌序列控制小波变换的某些参数或决定数据的隐藏位置,提高了算法本身的安全性。
The algorithms have good security and the mean of watermark sequences is close to zero, preparing for following two algorithms.
该算法安全性好,且生成的水印序列均值近似于零,为后面两种水印技术做准备。
The paper also tentatively discusses several related encryption algorithms to improve the security and analyzes the plaintext key space, ciphertext key space and encryption strength.
同时对这种加密算法的明文密码空间、密文密码空间和加密强度等作了初步的分析。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
Kinds of typical algorithms widely used are listed, such as DES, RSA and MD5, and we also discuss the security of them.
本章中还列举了DES、RSA、MD 5,等目前已经得到广泛使用的几种成熟算法,也讨论了这些典型算法的安全性。
Related conception is introduced at first, then the principle and security of conventional cryptology, modern symmetrical encryption algorithms and asymmetrical encryption algorithms are analysed;
首先阐述密码学的相关概念,然后对传统密码技术和现代的对称密码算法与非对称密码算法及其安全性进行分析;
Finally, basing on the core idea of improved association rule learning algorithms, this thesis designs and achieves simple models of network security audit.
最后根据改进的关联规则学习算法的核心思想,对网络安全审计模型进行了设计,并给予实现。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
应用推荐