CAJ digital watermark in information security applications.
CAJ数字水印在信息安全中的应用。
Degree required: Associate's or bachelor's degree in computing or certifications in information security.
文凭要求:计算机学士学位或大专学位,或信息安全认证。
Therefore, the research on ECC and its applications are becoming new highlight in information security field.
因此,ECC及其应用正在晋升为信息安全研究领域新的热点。
This paper mainly discusses the watermark technique applied in information security concerning digital image.
本论文主要探讨有关数字图像信息安全中的数字水印技术。
In this paper, using SSL protocol we mainly research on the application of PKI in information security on network.
以PK I技术为基础,应用ssl协议,研究PK I技术在保障网络信息传输安全上的应用。
Those factors are leading to a crisis in information security that will demand new solutions from the security specialists.
这些因素导致了信息安全危机,从而需要来自安全专家的新的解决方案。
Play in information security Cryptography plays an important role in information security has become an important part.
在信息安全中起着举足轻重作用的密码学也就成为信息安全中不可或缺的重要部分。
The network information security defensive system is a important problem in information security domain for recent years.
网络信息安全防御体系是近年来信息安全领域探讨的一个重要问题。
After current problems being solved, encrypted file system will have broad application prospect in information security field.
加密文件系统如能克服现有的一些缺点,将来必能在信息安全领域有广阔的应用前景。
This research is helpful to the application of stream cipher algorithm in information security and modern secure communication equipment.
该研究结果有助于序列密码算法在信息安全及现代保密通信设备中的应用。
Personal identity authentication is a key part in information security architecture and also the premise of the integral information security.
个人身份认证是信息安全体系中一个非常关键的环节。
Grading protection is an important tenet in information security technology. This tenet is also applicable to the network disaster-tolerant system.
等级保护是信息安全技术的重要原则之一,作为信息安全重要组成部分的网络容灾系统同样要遵循这一原则。
Intentional delete or accidental delete always leads to computer data loss. Data recovery plays an important role in information security protection.
恶意删除或数据误删现象时常发生,数据恢复的成败关系到信息的安全。
Quantum key distribution technique is a popular research subject in information security field, which is based on Heisenberg's uncertainty principle and no-clone theory.
量子密钥分配技术是信息安全中最热门的研究课题,它起源于量子力学中的测不准原理和未知量子态的不可克隆定理。
BCH codes are a subset of the class of linear block codes that have good error correction capability. Information hiding is a new technique in information security field.
BCH纠错编码是线性分组码的一种,有较好的纠错能力,信息隐藏是近年来信息安全领域出现的新技术。
The intrusion detection technique is an important method to insure the computer network security. It is becoming one of hot research topics in information security field.
入侵检测技术作为确保计算机网络信息安全的一个重要手段正成为信息安全领域的研究热点之一。
This method can be used in other continuous chaotic system and the application of chaotic system in information security and secure communication field will be accelerated.
该法可应用于其他连续混沌系统中,有助于加快混沌系统在信息安全及保密通信网络领域中的应用。
If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.
如果你现在正在(或曾经在)信息产业工作,你可以参加在线信息安全的培训,获得在线学位或证明。
Random number is always chosen by the participant in information security protocol, which can not be verified by other participants, so that the fairness of protocol is affected.
信息安全协议中使用的随机数通常由协议参与者任意选取,其他参与方无法验证,从而影响协议的公平性。
Therefore, the access control becomes one of the essential functions in information security and is to protect the storage and handling of information in enterprise information system.
因此,访问控制成为信息安全必不可少的功能之一,其目的是为了保护企业在信息系统中存储和处理的信息的安全。
The ASIP, which features the high efficiency of ASIC co-processor and the flexibility of General Purpose Processor, has and will have popular application in information security domain.
专用指令集处理器(ASIP)结合了ASIC协处理器的高效性与通用处理器的灵活性,在信息安全领域具有广泛的应用前景。
The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.
阐述了信息安全风险评估所要解决的问题,介绍了目前在信息安全风险评估领域的主要方法,并对这些方法进行了分析和评价。
Program security is gradually becoming an active field in information security technology. It mainly includes program vulnerabilities analysis and program security protection technologies.
程序安全是信息安全研究的一个重要方向,主要研究程序缺陷分析和安全保护技术等。
Disaster backup and recovery technology can efficiently ensure the information system to work normally when the disaster occurs, so it becomes a very important field in information security.
灾难备份与恢复技术能够充分保证灾难发生时,信息系统仍能正常工作,目前已成为信息安全领域一个备受瞩目的研究方向。
Currently, the information-hiding technique which serves as a new effectual route for resolving the information safely transferring has become hot topic of researching in information security area.
信息隐藏技术作为一种解决信息安全传输的新的有效途径,近年来已经成为信息安全领域的研究热点。
The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.
数字签名技术在身份认证、数据完整性等方面具有其它技术所无法替代的作用,在信息安全领域得到广泛的应用。
The presumption is that you can make security decisions based on the information in these tokens.
这种方法假设您可以根据这些令牌中的信息做出安全性决策。
The presumption is that you can make security decisions based on the information in these tokens.
这种方法假设您可以根据这些令牌中的信息做出安全性决策。
应用推荐