• However, database encryption has a relatively high technical threshold for the majority of users, and even information security practitioners are more mysterious.

    但是数据库加密具有相对较高技术门槛对于广大用户甚至是信息安全从业人员来说比较神秘

    youdao

  • Based on proxy signature and convertible authenticated encryption scheme, Ren et al. (2005) proposed proxy convertible authenticated encryption and threshold proxy signature scheme.

    基于代理签名转换认证加密方案(2005)提出了一种代理可转换认证加密门限代理签名方案。

    youdao

  • Based on proxy signature and convertible authenticated encryption scheme, Ren et al. (2005) proposed proxy convertible authenticated encryption and threshold proxy signature scheme.

    基于代理签名转换认证加密方案(2005)提出了一种代理可转换认证加密门限代理签名方案。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定