Both the Edge and the Guardian use a different encryption method to send E-mail and other forms of data.
Edge和Guardian都使用了一种不同的加密方式来发送电子邮件和其他形式的数据。
This encryption method can prevent the loss of disk and file replication caused by sensitive data leakage.
这种加密方式能防止磁盘丢失和文件被复制导致的敏感数据泄漏。
Another feature provides an efficient encryption method that safeguards the security of encrypted symbols.
另一个特征提供了一种保护加密符号安全的有效加密方法。
This encryption method uses quantum state as the key used for the encryption and decryption of information.
这种加密方法是用量子状态来作为信息加密和解密的密钥。
The element content encryption method is invoked, which encrypts only the textual content of the CardNo element.
调用元素内容加密方法,它只对 CardNo 元素的文本内容加密。
The processes for key creating and managing in radar network are given based on common key encryption method.
用户控制权管理方面,本文根据项目实践经验,给出一种高效的用户控制权管理结构及方式。
This all assumes that the original VFP developer did it properly and used an non-reversible encryption method.
这一切都假定原始vfp开发商也不当,使用不可逆的加密方法。
The encryption method has been used in a number of sensitive sectors in the country to achieve a certain effect.
该加密手段在国内某些敏感部门曾进行了小范围的应用,达到了一定的效果。
An information encryption method is proposed based on digital holographic technique and phase retrieve algorithm.
提出了一种基于数字全息技术和相位恢复算法的信息加密方法。
Based on the encryption method, a pirate tracing scheme is proposed for the copyright protection of digital data.
根据所提的加密算法,给出了一种适用于数字数据版权盗版跟踪方案。
In the SOAP header, message can be used saved the information of call direction, signature method and encryption method.
在此标头中,消息可以存储关于调用方、消息的签名方法和加密方法的信息。
Is there a way to determine which encryption method (WEP, WAP, WAP2,...) is used just by analyze the traffic data of WiFi?
有没有一种方法,以确定哪些加密方法(wep,wap,WAP2。)通过分析无线网络的流量数据使用吗?
A new optical image encryption method using anamorphic fractional Fourier transform and double random phase encoding is proposed.
提出一种利用变形分数傅里叶变换和双随机相位编码对图像加密的方法。
Comparing with the encryption method only using magic transformation, the new method has two controlling factors and is more secure.
相比单纯使用幻方变换的加密方法,新方法有双重因素控制,有更高的安全性。
A new optical image encryption method using dissymmetrical fractional Fourier transform and double random phase encoding was presented.
提出了一种利用不对称分数傅里叶变换和双随机相位编码对图像加密的方法。
You can also provide user id and password information for database authentication, and you can select the encryption method for the password.
还可以提供用户ID和密码信息,用于数据库身份验证,可以选择密码的加密方法。
Moreover, the encryption method is based on the extended index mechanism of database system, and can not be implemented on all databases.
而且这种加密方式依赖于数据库系统的扩展索引机制,并不能在所有数据库上实现。
This paper presents an image encryption method that combines disturbances of pixel addresses with the encryption technology of RSA systems.
本文提出了图象加密的一种方法,即把扰乱象素地址和RSA体制的加密技术相结合的方法。
Carrying out a new channel encryption method based on chaotic encryption, and employing this method to develop a key text P2P transmission system.
给出了一种新的信道加密的思想——将混沌加密技术应用于网络传输通信。基于此思想实现了一个密钥文本的P 2 P网络传输系统。
Disclosed are a contents encryption method, and a system and method for providing contents through a network using the contents encryption method.
本发明公开内容加密方法和系统,以及利用该内容加密方法通过网络提供内容的方法。
The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.
本发明属于计算机信息安全处理系统,尤其属于一种外置式计算机硬盘数据加密方法及其装置。
According to ATA protocol, PHES used hardware encryption method in FPGA to achieve the transparent data encryption and high data throughput rate by pipeline operation.
根据ATA协议,该系统利用FPGA硬件加密方法实现数据透明加密和流水线操作来达到高吞吐率。
In this paper the order preserving encryption for numeric data is analyzed. An order preserving encryption method for character data in relational databases is proposed.
对数值型数据保持顺序加密方法进行了分析,在此基础上提出了一种在关系数据库中针对字符数据的保序加密方法。
A chaotic image encryption method based on control word is designed to improve the chaotic perturbation model and solve the finite precision problem in chaotic encryption.
论文设计了基于控制字的混沌图像加密方法,完善了混沌扰动模型,更好地解决了混沌加密有限精度问题。
Scientists have devised an encryption method that thieves may not be able to stomach - messages written using genetically engineered bacteria normally associated with food poisoning.
科学家发明了一种加密的方法,能使已经成型的在细菌中的胃癌信息和食物中毒相结合。
It seems that every month, some hacker kid and his friends tie together 1,000 machines and crack the newest encryption method in a few days of raw, brute-force computational battering.
大概每隔一个月,一些黑客及其朋友就会集合1,000台计算机,在最初的几天里强力进行计算破坏,从而使最新的加密方法崩溃。
This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.
这种加密方式可以控制应用系统的用户对数据的访问权限,并且真实数据对所有数据库用户都是不可见的,是最安全的一种加密方式。
An example of this would be a service provider that asks for a particular type of encryption method, for which the service requester doesn't have the security infrastructure to support.
例如服务提供方要求采用一种特殊的加密方法,而服务请求方没有支持这种加密方法的安全基础架构。
An example of this would be a service provider that asks for a particular type of encryption method, for which the service requester doesn't have the security infrastructure to support.
例如服务提供方要求采用一种特殊的加密方法,而服务请求方没有支持这种加密方法的安全基础架构。
应用推荐