• He manages the security and Cryptography Research group responsible for developing new security capabilities for Intel's products.

    目前管理着“安全以及加密技术研究部”,专门负责英特尔的产品研发新的安全特性

    youdao

  • Zhang Futai, male, born in 1965, professor, PhD supervisor. His research interests include information security, network security and cryptography.

    张福泰,1965年出生教授博士生导师研究领域包括信息安全网络安全、密码学

    youdao

  • The service can be used by remote filesystems or other kernel services to manage cryptography, authentication tokens, cross-domain user mappings, and other security concerns.

    远程文件系统其他内核服务可以使用这个服务管理密码学身份验证标记跨域用户映射其他安全问题

    youdao

  • This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    安全策略使用非对称加密执行数字签名验证加密解密

    youdao

  • I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.

    我们安全性加密技术,甚至公钥加密技术介绍了很多,目的是帮助成功开发一个PHP项目

    youdao

  • WS-Security provides a comprehensive set of security features for web service applications, building on established industry standards for cryptography and for XML encryption and signing.

    WS - Security构建成熟密码学以及xml加密及签名行业标准基础上,Web服务应用程序提供一整套安全特性

    youdao

  • Web developers and web users are still largely ignoring the opportunity offered by browser-based cryptography to bring the privacy and security of traditional software programs to web applications.

    大部分Web开发者用户仍然忽略了基于浏览器加密算法带来Web应用程序引入传统软件隐私安全性机会

    youdao

  • It would have ensuredthrough using strong cryptography and security tested mechanisms — that the tokens sent to the application were indeed genuine and not forged.

    应该确保——通过使用加强的密码系统安全测试机制——发送应用程序标识确实真实的非虚假的。

    youdao

  • The security services that public key cryptography enable are based on the fact that a message encrypted using the public key can only be decrypted by the corresponding private key, and vice versa.

    公钥密码启用安全性服务基于这样的消息解密机制,共有密钥只能通过相应私有密钥才能解密,反之亦然。

    youdao

  • Lotus Notes was the first important commercial product to use RSA cryptography, and from that point on, users considered security as a prime feature of Lotus Notes.

    LotusNotes采用rsa加密第一重要商业产品此后用户安全看作是Lotus Notes主要特点之一。

    youdao

  • This article first analyzes the security of computer network, introduces basic technology that guarantee the security and emphasizes that cryptography is the core technology.

    本文第一章分析计算机网络安全性介绍保障计算机网络安全基本技术指出密码技术网络安全技术的核心

    youdao

  • The paper discusses and analyses Cryptography technology and its application in e-commerce security.

    论述分析了加密技术及其电子商务安全方面应用现状

    youdao

  • Cryptography is the kernel of the secure communication and information security.

    密码技术保密通信信息安全核心技术。

    youdao

  • Based on talking about cryptography architecture of RMS, this thesis analyses security of RMS and points out problems that should be noticed for building high-level Rights Management System.

    文章介绍RMS密码架构基础上,安全性进行分析指出构建更高强度的权限管理系统注意问题

    youdao

  • Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.

    密码学安全技术核心,其中的加密解密数字签名密钥交换技术起到保障作用重要机制

    youdao

  • Cryptography is an important technology of information security. It can guarantees information's confidentiality, integrality and authentication.

    密码学作为信息安全重要技术有效保障信息机密性完整性鉴别。

    youdao

  • Based on our practice on graduate students' elective course of cryptography, we probe into its teaching organization and information security education in this paper.

    本文根据笔者面向计算机专业硕士生开设密码学选修课实践探讨了密码学课程教学组织信息安全教育

    youdao

  • Some applications try to combine public - and secret-key cryptography to achieve security and performance.

    有些应用试图秘钥密码术结合起来,获得安全性高性能

    youdao

  • Public Key Infrastructure (PKI) utilizes the asymmetrical cryptography technology to lay the security foundation for the electronic commerce, the electronic government and the electronic business.

    公开密钥基础设施PKI是一种利用非对称密码技术电子商务、电子政务电子事务的开展提供一整套安全保护的基础平台。

    youdao

  • This paper introduces the enterprise computer network organization and security requests in our country, and gives security scheme for enterprise network based on cryptography.

    该文试图通过对企业网络构成安全需求的分析,提出基于自主密码技术企业广域网系统安全方案

    youdao

  • It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key.

    现代密码学认为任何加密体系加密解密算法可以公开安全性在于密钥的保密性。

    youdao

  • This paper analyzes the security of electronic mail, designs an application scheme based on triple des and elliptic curve cryptography.

    针对电子邮件传输过程存在的安全问题,提出基于三重des椭圆曲线密码体制的解决方案。

    youdao

  • Cryptography is an important technology to ensure data security, and has been widely utilized to transfer and store information.

    加密作为保障数据安全一种重要技术,在信息的传输、存储等环节得到了广泛的应用。

    youdao

  • The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks, and is feasible in practice.

    密码安全体制进行安全分析后表明:该体制有效地抵御网络中的消息重放攻击中间人攻击,实际应用中较高的可行性

    youdao

  • This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.

    文章提供了NET框架安全性方面概述具体讲述基于角色安全性、代码访问安全性、验证堆栈审核、隔离存储、加密等方面的核心安全技术。

    youdao

  • This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.

    一个高级示例假定熟悉加密进程间通信网络安全

    youdao

  • This is an advanced example and assumes familiarity with cryptography, inter-process communication, and network security.

    一个高级示例假定熟悉加密进程间通信网络安全

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定