图像数据的保护日益受到社会的普遍重视,使图像信息加密技术也变得至关重要。
Image data protection has been noticed in the society, that causes the image encryption technology also becomes very important.
本文较详细的介绍了密码通信系统中的信息加密技术原理和算法,以及实现该技术的方法。
This paper discuss principle and count of information secret technique about cipher communicate system , and way to realize this technique.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
幸运的是,能够确保邮件从一台无处不在的计算机到另一台以及到存储在网络系统上的保密私人信息的加密技术已经存在。
Fortunately, cryptographic techniques already exist to secure messages from one ubiquitous computer to another and to safeguard private information stored in networked systems.
可以利用加密技术来使Web服务请求和响应中交换的信息不可读。
Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.
可以借助加密技术和云计算厂商的技能优势,确保信息安全。同时,可以设计一些新的方法,解决这个问题。
There may be cryptographic techniques, skill level of vendors' staff to ensure the security and some new methods may be devised to solve this issue.
阿联酋的监管官员称,黑莓的专用网络,和先进的加密技术使该手机经因特网发送的信息安全得过了头。
The UAE's regulators say the BlackBerry's proprietary network and tight encryption make messages the devices send over the Internet too secure.
同时,传统的加密技术所得到的密文容易被攻击者发现,影响了信息的安全性。
Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.
本文主要介绍了计算机信息的常规加密技术和公开密钥加密技术,并对两者的优缺点和应用环境作了比较。
This paper introduces the routine encryption of computer information and the publicity key encryption mainly, and compares the both and their environment.
介绍了电子数据交换的功能模块、通信方式、信息流程、通信标准和加密技术。
This paper introduced the functional module, communication mode, information flow, communication standard and encryption technique of Electronic Data Interchange.
意识到这个问题之后,支付处理商就部署了许多不同类型的加密技术,让传输的信息变得更难拦截或牟利。
Recognizing the problem, payment processors deployed a number of different encryption technologies, rendering the transmitted information far more difficult to intercept and monetize.
本文分析了电子政务系统的信息安全需求,对数据库加密技术进行了研究和探讨。
This paper analyzes thee-government system of information security needs, does some research and discussion on the database encryption technology.
信息安全技术主要包括以加密技术为代表的密码技术、密钥管理技术、数据库加密技术等。
Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.
信息隐藏优于传统加密技术的地方在于信息隐藏能够不引起攻击者的留意,从而减少被攻击的概率;
What information hiding is prior to encryption is that information hiding causes much less attention of attackers and decreases the probability of being attacked.
文中根据电力市场条件下发电竞价的特点和信息发布对加密技术的要求,将电子商务信息技术应用于发电竞价系统。
Based on the characteristics of electricity bidding and the demands of encryption techniques, the electronic commercial information technology is introduced into electricity bidding system.
最后介绍了加密技术在信息加密保护、身份识别、信息完整性和数字签名中的应用。
The last part introduces the application of encryption protection, (identity) identification, information integrality and figure signature.
但传统的加密技术只能在传输过程中对信息进行有效的保护,不能满足其他新的保护需求。
But the traditional security systems can only guarantee information transmitting process and can't satisfy other requirements of new conditions.
加密技术通过数学公式对传输的数据进行编码加密,从而使信息能够安全地在网上传输。
Encryption technology allows secure transmittal of information along the Internet by encoding the transmitted data using a mathematical formula that scrambles the data.
最后就信息交换加密技术的分类及RSA算法作以分析,并针对PK I技术这一信息安全核心技术,论述了其安全体系的构成。
And last elucidates the structure of the secure system. By aiming at PKI, information secure core technology and analyses the RSA algorithm and sorts of the tech of info exchanging encryption.
从授权访问、加密技术、数字签名技术、使用数据视图等方面论述了校园信息系统中应采用的安全技术和方案。
This paper describes a teleopendion system with geometrical data base technology supported to enhance the capability and efficiency of teleoperation based on some actual problems.
从授权访问、加密技术、数字签名技术、使用数据视图等方面论述了校园信息系统中应采用的安全技术和方案。
This paper describes a teleopendion system with geometrical data base technology supported to enhance the capability and efficiency of teleoperation based on some actual problems.
应用推荐