The key exchange and authentication algorithm used during the SSL handshake.
SSL握手过程中的密钥交换和认证算法。
This specifies the use of the RSA Key Exchange and authentication algorithm, along with the RC4_SHA_US CipherSpec.
它规定了RSA密钥交换和认证算法的使用,还规定了RC4_SHA_US密码规范。
In general, the speed of authentication card is restricted by the bus width of CPU on card, MIPS and the speed of authentication algorithm.
通常认证卡的速度受限于板卡cpu的总线宽度及MIPS和认证算法的速度。
Pointing out the limitation of the image authentication algorithm based on dividing blocks and give the reason why collage attack can be successful.
指出基于分块的图像认证方法存在的缺陷,以及共谋攻击得以成功的原因;
Analyzing the character of the authentication algorithm in the compression field and designing a secure authentication algorithm in the JPEG compression field.
针对互联网上图像传播的需要,分析了压缩域中认证算法所应有的特征,并设计了在JPEG压缩域中的安全认证算法。
In the authentication phase, the same technology is used to the suspect images, then using the image authentication algorithm to achieve integrity certification.
在认证阶段,运用相同的技术处理待检测图像,生成影子,用认证算法实现对图像的完整性认证。
Explore dongle protected software access, call and data access methods to study the dongle query the custom authentication algorithm and authentication interactive software security.
探索加密狗保护软件时的接入、调用及数据存取方式,研究加密狗内自定义算法的查询式认证与交互性认证方式对软件安全的影响。
This paper describes the security trouble of authentication algorithm based on environment variable in CGI mode and points out it's caused by excessively trust the environment variable of server.
分析了CGI模式中常见的基于环境变量的认证算法所存在的安全隐患,给出了根源是过分信赖服务端环境变量所致的结论。
This tutorial does not purport to be an example of security in user authentication; instead, it will demonstrate the usage of XForms in the well-known algorithm for logging in and account creation.
这篇教程的主旨并不是示范用户身份验证的安全性。取而代之,本文将演示如何在众所周知的登录和创建帐户的算法中使用Xforms。
This technology is a new authentication technique, and it's an algorithm based on the identity technology.
组合公钥技术是一种新的认证技术,它是基于标识的公钥算法技术。
Experiment has indicated that the algorithm can gain its ends and can be used for authentication of news photos, medical digital photos, network business and transmission application.
实验表明该算法可以达到预期的目的,可以满足对新闻图片的认证、医疗图像数字化、网上交易、传输等商业需求的基本需要。
Ca authentication center provides highly intensive encipher algorithm, highly liable security mechanism and management strategy, automatic generating key and certificate management.
CA认证系统拥有高强度的加密算法,高可靠性的安全机制及完善的管理及配置策略,提供自动的密钥和证书管理服务。
The construction of a provable hash algorithm is developed based on the operations from various groups, also, a safety message authentication code is presented by the result.
本文利用来自不同群的运算,构造一种能证明其安全性的杂凑算法,并应用已证明的结果构造安全的消息认证码。
This paper presents a novel semi-fragile watermark algorithm for image authentication and recovery.
提出一种新的用于图像认证及恢复的半脆弱水印算法。
This paper proposes a real time watermarking algorithm in the bit domain for complete authentication.
本文提出一种用于视频产品完整性认证的位域实时视频水印的算法。
The system USES AES algorithm to realize the identity authentication of vehicle and the security of the geographic information of vehicle.
该系统采用AES算法来实现对于车辆的身份认证和地理位置信息的保密。
This paper designs a kind of mutual authentication scheme, which is based on the improved algorithm of HARN digital signature. Then it is proved by using BAN Logic.
本文设计了一种基于改进的HARN数字签名算法的双向认证方案,并利用BAN逻辑对此方案进行了验证。
Face recognition system USES the world's leading recognition algorithm with advantages of high accuracy, high-speed authentication, strong ability to adapt to the environment and so on.
人像识别系统采用国际领先的识别算法,具有高准确度、高速度的身份认证,对环境适应能力强等优点。
This paper proposes a authentication and access control scheme which USES modified threshold DSA algorithm in P2P network.
在P 2 P网络中应用门限DSA算法,提出一种适应网络动态性强等特点的节点认证和访问控制方案。
Using information dispersal algorithm we propose a new multicast authentication protocol on the base of research in TESLA which can provide authentication for multicast in lossy channels.
在组播认证协议TESLA的基础上引入消息分散算法,提出一个全新的组播认证协议,它能够为不稳定信道上的组播通信提供实时认证。
Experimental results show that this algorithm has high visual quality, at the same time, can exactly localize the alteration, and really satisfies the requirement of complete authentication.
实验表明,该算法有较高的视觉质量,同时能对修改进行准确定位,满足完整性认证水印要求。
A new image blind watermarking algorithm based on adaptive quantization step in discrete wavelet transform (DWT) is proposed, which can be used in copyright authentication.
提出了一种可用于版权认证的基于小波变换域自适应量化步长的图像盲水印算法。
These security protocols used different authentication methods and encryption algorithm.
这些安全协议使用不同的认证方法和加密算法。
The authors analyzed the principle of the MD5 algorithm in details, and discussed a improved method that the application of MD5 algorithm in distanced-identity authentication.
作者详细分析了MD5算法的实现原理,然后提出MD 5算法在远程身份认证的实际应用和实现。
A dual authentication mechanism is provided within GE's algorithm because the information passed is also encrypted or scrambled to prevent unauthorized viewing.
因为通过的信息也被加密或被扰乱防止未批准的观察,双重认证机构在GE的算法之内提供。
A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication, tamper localization and recovery.
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。
The third method is effective integrate the former two algorithms, which proposed dual watermarking algorithm for digital image authentication.
第三种算法是将前两种空域和变换域算法进行有效融合,从而提出了双重多功能性水印数字图像认证算法。
This method makes HSS choose a key drive algorithm based on its requirement during the authentication.
该方法使得在认证过程中HSS能够根据需要选择不同的算法推衍密钥。
A novel algorithm for image authentication in ridgelet domain is presented.
提出了一种在脊波变换域上进行图像认证的新算法。
A difference histogram-based reversible data hiding algorithm was proposed for authentication and covert communications of vector maps.
提出一种基于差值直方图的可逆数据隐藏算法,用于矢量地图的认证和隐秘通信。
应用推荐