DRBD使用Linux加密应用程序编程接口,因此在完整性算法使用方面是比较灵活的。
DRBD USES the Linux crypto application programming interface and is therefore flexible on the integrity algorithm used.
通过提供强大的、基于标准的加密和完整性算法,ssl向系统开发人员和用户保证数据在Internet上不会受到危害。
By providing strong, standards-based encryption and integrity algorithms, SSL provides system developers and users with confidence that data will not be compromised in the Internet.
该系统从入侵检测系统和主机系统等多数据源主动收集数字证据,通过完整性算法保证数字证据传输和存贮过程中的完整性。
The integrity of digital evidences was protected by integrity algorithm, which was collected and stored from intrusion detection systems and host systems.
数据签名和哈希算法是用于提供数据完整性的机制。
Digital signatures and hash algorithms are mechanisms used to provide data integrity.
证书的完整性是使用哈希算法校验的。
The integrity of the certificate is checked using the hash algorithm.
维护机密性和完整性的典型解决方案涉及使用现有的安全协议和加密算法。
Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
变更为更复杂的算法,比方说从MD 5变更为SHA - 2,16对恢复秘密的完整性没什么作用。
Changing to a more complex algorithm, say from MD5 to SHA-2, 16 does little to restore password integrity.
完整性的目的,我们将开发完整的分代算法。
For the purpose of completeness we will develop the complete generational algorithm.
在日益复杂的网络环境下,将多种拓扑算法结合使用才能保证拓扑的完整性、正确性。
In more and more complex network environment only combining multiple topology discovery algorithms guarantees the accuracy and completeness of the topology.
哈希算法在信息安全领域主要应用于验证数据完整性和签名认证。
In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
对告警发生的时间特性进行了分析,给出了一种自动伸缩的关联窗口选择算法,保证了告警集合的完整性。
After analyzing the temporal character of alarm, an auto-flexible correlation window selection algorithm is given to assure the integrity of alarm set.
结果表明该算法能够满足保护需求,初步解决了通信数据的完整性和一致性问题。
Analysis results show that this algorithm satisfied the requirement of protection and solve the consistency and integrity problem of communication data.
对伪距残差最小二乘的接收机自主完整性监测(RAIM)算法进行了分析。
The characters of least squares residuals method belonging to receiver autonomous integrity monitoring(RAIM) were analyzed.
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。
A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication, tamper localization and recovery.
对分割结果的对比分析表明,改进后的算法在分割的完整性和一致性上具有更好的效果。
The result shows that the improved arithmetic works is better in integrality and consistency of image.
在介绍了内存数据库的组织形式之后,本文重点分析了索引HASH算法以及数据完整性和一致性保护。
After introducing the organization form of the memory database, it focuses on the HASH arithmetic of index and protection of integrity and consistence of the data.
仿真试验结果表明,该算法在提高组合导航系统的定位精度及可靠性和完整性方面是有效的。
The experimental results show that this algorithm is effective for the improvement of the locating accuracy, reliability and integrity of automatic vehicle integrated navigation system.
本文提出一种用于视频产品完整性认证的位域实时视频水印的算法。
This paper proposes a real time watermarking algorithm in the bit domain for complete authentication.
在认证阶段,运用相同的技术处理待检测图像,生成影子,用认证算法实现对图像的完整性认证。
In the authentication phase, the same technology is used to the suspect images, then using the image authentication algorithm to achieve integrity certification.
该算法具有伪完整性保护能力。
The algorithm can provide the pseudo integrity protection ability.
众所周知,加密算法是鉴权认证和完整性控制的基础,因此我们还介绍了选用加密算法的原则。
As we know, the encryption is the footstone of authentication and integrity control, so we introduce the principle of choosing encryption algorithms.
针对压缩域视频流的完整性认证问题,提出了一种基于压缩传感(CS)的视频水印算法。
For the problem of integrity authentication about compressed video streams, this paper proposed a video watermarking algorithm based on Compressive Sensing (CS).
实验表明,该算法有较高的视觉质量,同时能对修改进行准确定位,满足完整性认证水印要求。
Experimental results show that this algorithm has high visual quality, at the same time, can exactly localize the alteration, and really satisfies the requirement of complete authentication.
因此,本文算法首先利用累积帧差,弥补了两帧帧差所得边界的不完整性,得到准确的运动对象的定位;
So in this method, Firstly, using accumulating frame difference, we obtain the exact moving object localization which makes up the incompletely of the edge gotten by the frame difference.
通过在网络教学平台中应用H -ECDSA混合型数字签名算法,达到了快速并安全传输数据的目标,并保证了数据的真实性和完整性。
In E-teaching platform, H-ECDSA is applied. The hybrid digital signature algorithm can transmit data quickly and safely, guarantee the authenticity and security of data transmitted.
实验中分析了IC故障类型、一般故障诊断流程和进行扫描链本身完整性测试的方案,并提出了一种外加测试码向量生成的算法。
In the experiments, the fault type of IC test bus, the fault diagnosis flow and the test principles were analyzed, and a fault diagnosis strategy of test bus was proposed.
实验结果表明,在保证流完整性的前提下,该算法的召回率和准确率均达到80%以上。
Experimental results show that the proposed algorithm has recall and accuracy both over 80% under the requirement of complete flows.
实验结果表明,该算法分割效率高,分割的运动对象完整性好、精度较高。
Experimental results show that the segmentation algorithm is efficient and segmented moving object is complete and accurate.
实验结果表明,该算法分割效率高,分割的运动对象完整性好、精度较高。
Experimental results show that the segmentation algorithm is efficient and segmented moving object is complete and accurate.
应用推荐