• CAJ digital watermark in information security applications.

    CAJ数字水印信息安全中的应用

    youdao

  • Degree required: Associate's or bachelor's degree in computing or certifications in information security.

    文凭要求计算机学士学位大专学位,或信息安全认证

    youdao

  • Therefore, the research on ECC and its applications are becoming new highlight in information security field.

    因此ECC及其应用正在晋升为信息安全研究领域新的热点

    youdao

  • This paper mainly discusses the watermark technique applied in information security concerning digital image.

    论文主要探讨有关数字图像信息安全中的数字水印技术

    youdao

  • In this paper, using SSL protocol we mainly research on the application of PKI in information security on network.

    PK I技术为基础,应用ssl协议研究PK I技术保障网络信息传输安全上的应用

    youdao

  • Those factors are leading to a crisis in information security that will demand new solutions from the security specialists.

    这些因素导致信息安全危机,从而需要来自安全专家新的解决方案

    youdao

  • Play in information security Cryptography plays an important role in information security has become an important part.

    信息安全中起着举足轻重作用密码学也就成为信息安全不可或缺的重要部分

    youdao

  • The network information security defensive system is a important problem in information security domain for recent years.

    网络信息安全防御体系近年来信息安全领域探讨的一个重要问题

    youdao

  • After current problems being solved, encrypted file system will have broad application prospect in information security field.

    加密文件系统如能克服现有一些缺点,将来信息安全领域广阔的应用前景

    youdao

  • This research is helpful to the application of stream cipher algorithm in information security and modern secure communication equipment.

    研究结果有助于序列密码算法信息安全现代保密通信设备中的应用

    youdao

  • Personal identity authentication is a key part in information security architecture and also the premise of the integral information security.

    个人身份认证信息安全体系一个非常关键环节。

    youdao

  • Grading protection is an important tenet in information security technology. This tenet is also applicable to the network disaster-tolerant system.

    等级保护信息安全技术重要原则之一,作为信息安全重要组成部分网络容灾系统同样遵循一原则。

    youdao

  • Intentional delete or accidental delete always leads to computer data loss. Data recovery plays an important role in information security protection.

    恶意删除数据现象时常发生,数据恢复成败关系信息安全

    youdao

  • Quantum key distribution technique is a popular research subject in information security field, which is based on Heisenberg's uncertainty principle and no-clone theory.

    量子密钥分配技术信息安全最热门研究课题起源于量子力学中的测不准原理未知量子态的不可克隆定理。

    youdao

  • BCH codes are a subset of the class of linear block codes that have good error correction capability. Information hiding is a new technique in information security field.

    BCH纠错编码线性分组一种较好的纠错能力信息隐藏近年来信息安全领域出现的技术

    youdao

  • The intrusion detection technique is an important method to insure the computer network security. It is becoming one of hot research topics in information security field.

    入侵检测技术作为确保计算机网络信息安全一个重要手段成为信息安全领域研究热点之一

    youdao

  • This method can be used in other continuous chaotic system and the application of chaotic system in information security and secure communication field will be accelerated.

    该法应用其他连续混沌系统中,有助于加快混沌系统信息安全保密通信网络领域中的应用。

    youdao

  • If you are (or were) already working in information technology, you can pursue career training specifically in information security through online degree and certification programs.

    如果现在正在(曾经)信息产业工作,你可以参加在线信息安全培训,获得在线学位证明

    youdao

  • Random number is always chosen by the participant in information security protocol, which can not be verified by other participants, so that the fairness of protocol is affected.

    信息安全协议使用随机数通常协议参与者任意选取其他参与方无法验证从而影响协议公平性

    youdao

  • Therefore, the access control becomes one of the essential functions in information security and is to protect the storage and handling of information in enterprise information system.

    因此访问控制成为信息安全必不可少功能之一,其目的为了保护企业信息系统存储处理的信息的安全。

    youdao

  • The ASIP, which features the high efficiency of ASIC co-processor and the flexibility of General Purpose Processor, has and will have popular application in information security domain.

    专用指令集处理器ASIP)结合ASIC处理器高效性通用处理器灵活性信息安全领域具有广泛的应用前景

    youdao

  • The information security risk evaluation question is elaborated, the major methods in information security risk evaluation fields are introduced, and the methods are analyzed and studied.

    阐述信息安全风险评估所要解决的问题介绍了目前信息安全风险评估领域主要方法这些方法进行了分析和评价

    youdao

  • Program security is gradually becoming an active field in information security technology. It mainly includes program vulnerabilities analysis and program security protection technologies.

    程序安全信息安全研究一个重要方向主要研究程序缺陷分析安全保护技术等

    youdao

  • Disaster backup and recovery technology can efficiently ensure the information system to work normally when the disaster occurs, so it becomes a very important field in information security.

    灾难备份恢复技术能够充分保证灾难发生信息系统正常工作目前已成为信息安全领域一个备受瞩目的研究方向

    youdao

  • Currently, the information-hiding technique which serves as a new effectual route for resolving the information safely transferring has become hot topic of researching in information security area.

    信息隐藏技术作为一种解决信息安全传输新的有效途径,近年来已经成为信息安全领域研究热点

    youdao

  • The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.

    数字签名技术身份认证、数据完整性等方面具有其它技术无法替代作用,在信息安全领域得到广泛的应用

    youdao

  • The presumption is that you can make security decisions based on the information in these tokens.

    这种方法假设可以根据这些令牌中的信息做出安全性决策

    youdao

  • The presumption is that you can make security decisions based on the information in these tokens.

    这种方法假设可以根据这些令牌中的信息做出安全性决策

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定