He manages the security and Cryptography Research group responsible for developing new security capabilities for Intel's products.
他目前管理着“安全以及加密技术研究部”,专门负责为英特尔的产品研发新的安全特性。
Zhang Futai, male, born in 1965, professor, PhD supervisor. His research interests include information security, network security and cryptography.
张福泰,男,1965年出生,教授,博士生导师,研究领域包括信息安全、网络安全、密码学。
The service can be used by remote filesystems or other kernel services to manage cryptography, authentication tokens, cross-domain user mappings, and other security concerns.
远程文件系统和其他内核服务可以使用这个服务来管理密码学、身份验证标记、跨域用户映射和其他安全问题。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
WS-Security provides a comprehensive set of security features for web service applications, building on established industry standards for cryptography and for XML encryption and signing.
WS - Security构建于成熟的密码学以及xml加密及签名的行业标准基础上,为Web服务应用程序提供了一整套的安全特性。
Web developers and web users are still largely ignoring the opportunity offered by browser-based cryptography to bring the privacy and security of traditional software programs to web applications.
大部分Web开发者和用户仍然忽略了基于浏览器的加密算法带来的在Web应用程序引入传统软件的隐私和安全性的机会。
It would have ensured — through using strong cryptography and security tested mechanisms — that the tokens sent to the application were indeed genuine and not forged.
他应该确保——通过使用加强的密码系统和安全测试机制——发送到应用程序的标识确实是真实的,而非虚假的。
The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.
公钥密码启用的安全性服务是基于这样的消息解密机制,即共有密钥只能通过相应的私有密钥才能解密,反之亦然。
Lotus Notes was the first important commercial product to use RSA cryptography, and from that point on, users considered security as a prime feature of Lotus Notes.
LotusNotes是采用rsa加密的第一种重要的商业产品,此后用户将安全看作是Lotus Notes的主要特点之一。
This article first analyzes the security of computer network, introduces basic technology that guarantee the security and emphasizes that cryptography is the core technology.
本文第一章分析计算机网络的安全性,介绍保障计算机网络安全的基本技术,指出密码技术是网络安全技术的核心。
The paper discusses and analyses Cryptography technology and its application in e-commerce security.
论述和分析了加密技术及其在电子商务安全方面的应用现状。
Cryptography is the kernel of the secure communication and information security.
密码技术是保密通信和信息安全的核心技术。
Based on talking about cryptography architecture of RMS, this thesis analyses security of RMS and points out problems that should be noticed for building high-level Rights Management System.
文章在介绍RMS密码架构的基础上,对其安全性进行分析,并指出构建更高强度的权限管理系统应注意的问题。
Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.
密码学是安全技术的核心,其中的加密解密、数字签名、密钥交换等技术是起到保障作用的重要机制。
Cryptography is an important technology of information security. It can guarantees information's confidentiality, integrality and authentication.
密码学作为信息安全的重要技术,能有效保障信息的机密性、完整性和鉴别。
Based on our practice on graduate students' elective course of cryptography, we probe into its teaching organization and information security education in this paper.
本文根据笔者面向计算机专业硕士生开设密码学选修课的实践,探讨了密码学课程的教学组织和信息安全教育。
Some applications try to combine public - and secret-key cryptography to achieve security and performance.
有些应用试图把明钥和秘钥密码术结合起来,以获得安全性和高性能。
Public Key Infrastructure (PKI) utilizes the asymmetrical cryptography technology to lay the security foundation for the electronic commerce, the electronic government and the electronic business.
公开密钥基础设施PKI是一种利用非对称密码技术为电子商务、电子政务和电子事务的开展提供一整套安全保护的基础平台。
This paper introduces the enterprise computer network organization and security requests in our country, and gives security scheme for enterprise network based on cryptography.
该文试图通过对企业网络构成和安全需求的分析,提出基于自主密码技术的企业广域网系统安全方案。
It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key.
现代密码学认为,任何加密体系的加密和解密算法都可以公开,其安全性在于密钥的保密性。
This paper analyzes the security of electronic mail, designs an application scheme based on triple des and elliptic curve cryptography.
针对电子邮件在传输过程中存在的安全问题,提出了一种基于三重des和椭圆曲线密码体制的解决方案。
Cryptography is an important technology to ensure data security, and has been widely utilized to transfer and store information.
加密作为保障数据安全的一种重要的技术,在信息的传输、存储等环节都得到了广泛的应用。
The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.
对该密码安全体制进行安全分析后表明:该体制能有效地抵御网络中的消息重放攻击和中间人攻击,并在实际应用中有较高的可行性。
This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.
文章提供了。NET框架安全性方面的概述,具体讲述基于角色的安全性、代码访问安全性、验证、堆栈审核、隔离存储、加密等方面的核心安全技术。
This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.
这是一个高级示例,假定您熟悉加密、进程间通信和网络安全。
This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.
这是一个高级示例,假定您熟悉加密、进程间通信和网络安全。
应用推荐