In the tax-controlled system, security of data is the most basic demand of the whole system.
在税控系统中,数据安全是整个系统最基本的要求。
In modern network and communication system, the security of data convey seems important day by day.
在现代的网络和通信系统中,数据传输的安全性日益显得重要。
The SSL protocol is widely used in internet bank and electronic business to insure the security of data.
SSL协议在网上银行、电子商务中得到广泛地应用,主要解决了数据的安全性、保密性。
But often, the concept of security of data is considered only within the context of the SaaS application itself.
但是,数据安全性的概念常常被局限于SaaS应用程序本身的上下文内。
The security of data transmission between the client and the server is the key factor that affects the application of networks.
客户机和服务器之间的数据传输的安全性是影响网络应用的关键因素。
Test results show that T-ECDSA improves the signature speed, saves system resources and ensures the security of data transmission.
测试结果表明,利用T - ECDSA提高了数字签名的速度,节约系统资源,并能够保证数据传输的安全性。
Data security in cloud storage mainly refers to the security of data collection, storage, access, processing and data transaction.
云存储中数据安全主要是指数据的采集、存储、访问、处理及数据交易安全。
Especially, in the field of military, the speed and security of data translated and received are always the front line in the study of military.
尤其是在军事领域,信息的传送、接收的速度和安全性一直是军事信息技术研究的前沿。
SSL and SSH support guarantee the security of data transmission, even if not in the international community to achieve several software such high.
支援SSL和SSH保证数据传输的安全性,目前就算在国际上也没有几款软件能达到这样的高。
In this article, we introduce matrix coding and its application in image data hiding briefly. This algorithm can improve the security of data hiding.
该文通过介绍矩阵编码及其在信息伪装算法中的应用,说明了矩阵编码可以提高信息伪装系统的安全性。
This software is tested in the data transmission of remote Virtual Lab system. It is proved validity and the security of data transmission is improved.
该软件已在远程虚拟实验系统中进行了数据传输测试,证明了该软件设计的正确性,提高了数据传输的安全性。
Security of data in computer system is put forward and system frame design, function design, principle and method of core modules implement are all mentioned.
提出并实现了一种数据安全管理系统,对系统的设计目标、框架设计、功能设计以及核心模块的实现原理及方法进行了详细的论述。
In the third mobile communication systems, access security includes the confidentiality of the subscriber identity, entity authentication and the security of data.
在第三代移动通信系统中,接入安全主要包括身份保密、实体认证和数据的安全三个方面。
The research on security of data hiding can be used as guidance to design a steganography or enhance the statistical imperceptibility of an information hiding system.
信息隐藏安全性研究可用以指导隐写算法设计,对信息隐藏来讲具有重要的意义。
Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.
在计算机网络与通讯技术飞速发展的今天,网络上传输的数据的安全性成为人们日益关注的问题。
However, the privacy and security of data is far more than away from hackers so simple, it also involves the need for businesses to ensure that their brand is trustworthy.
然而,数据的隐私性和安全性远不止远离黑客这么简单,这还涉及到企业需要向消费者保证他们的品牌是值得信赖的。
This is because privacy and security of data are of utmost importance; all data stored in AMEE is anonymized, so you cannot retrieve profile data based on personal information.
这是因为数据隐私和数据安全在今天很重要,存储在AMEE中的所有数据都是匿名的,因此不能根据个人信息检索配置文件数据。
By using the method and the system for transmitting keys, the invention can improve the security of key transmission and further improve the security of data transmission.
采用本发明的密钥传输的方法及系统,能提高密钥传输的安全性,进而提高数据传输的安全性。
Grid data management module should hide the heterogeneity of data resources, provide uniform access interfaces, and make sure of the reliability and security of data access.
网格数据管理模块需要屏蔽底层数据源差异,为用户提供统一访问接口,并且还要保证访问的可靠性和安全性。
In E-teaching platform, H-ECDSA is applied. The hybrid digital signature algorithm can transmit data quickly and safely, guarantee the authenticity and security of data transmitted.
通过在网络教学平台中应用H -ECDSA混合型数字签名算法,达到了快速并安全传输数据的目标,并保证了数据的真实性和完整性。
Distributed storage of magnitude data is a hot issue in research area in recent years. With the increasing of data, how to assure the security of data storage is an important technology.
海量数据的分布式存储是近几年的研究热点,随着数据量的不断增大,如何确保数据存储的安全性是极需解决的技术问题。
On the one side, you have the United States government's mighty legal and security apparatus fighting for data of the most sympathetic sort: the secrets buried in a dead mass murderer's phone.
一方是美国政府强大的法律和安全机构,他们所争夺的是最能引起同情的数据:藏在制造群体谋杀的死者手机里的秘密。
Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly.
涉及保护数据和人员的网络安全正面临多重威胁,尤其是网络犯罪和网络行业间谍,这两种威胁都在迅速增长。
In addition, the ESB can provide transformations between a variety of security, data format, or transactional models between service requesters and providers.
另外,ESB可以提供服务请求者和提供者之间的各种安全、数据格式或事务模型的转换。
What kind of security configuration is needed for the data warehouse?
数据仓库需要哪种类型的安全性配置?
Develop policies and procedures that tell you what to do before, during and after a breach of data security.
制定公司政策及过程,以告诉您平时应该做什么,发现数据安全问题时又应该做什么。
IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.
IDSLBACREADSET:要访问数据,用户安全标签的每个集合组件必须包括数据安全标签的集合组件。
IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.
IDSLBACREADSET:要访问数据,用户安全标签的每个集合组件必须包括数据安全标签的集合组件。
应用推荐