• Ensure that a sufficiently robust encryption algorithm, such as triple DES or AES, is used to encrypt all confidential information stored on the system.

    确保充分健全加密算法比如三重DES或者AES用来加密所有存储在系统机密信息

    youdao

  • All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.

    XML加密标记存在解密需要所有信息:加密算法名称加密数据类型以及加密密钥的名称。

    youdao

  • An information encryption method is proposed based on digital holographic technique and phase retrieve algorithm.

    提出了基于数字全息技术相位恢复算法的信息加密方法

    youdao

  • According to the complexity of key generation and management process, this paper presents an encryption algorithm based on fingerprint to enhance the security of the digital information.

    根据密钥产生管理过程复杂性增强数字信息安全性提出一种基于指纹的数字信息加密算法

    youdao

  • Not changing the Video Conference protocols in existence, we embed a good encryption algorithm (Permutation Code) in the system to safeguard the information of Multimedia.

    改变现有协议前提下嵌入性能良好加密解密算法排列算法)保障信息安全

    youdao

  • An encryption algorithm based on data-scrambling is presented. Firstly, we extract odd number bits of the important information to form a new information.

    提出基于数位置乱的加密体制,该方案中首先采用置乱算法将明文信息奇数提取出来组成新的信息;

    youdao

  • The drawback is that anyone can have access to the information written on them, unless you protect the documents with a strong encryption algorithm.

    缺点任何人都可以访问他们除非保护加密算法,文件中的信息

    youdao

  • This paper describes a new method in which a non-linear successive-displacement can be produced, and provides an algorithm of information bit-moving encryption.

    本文研究提出一种统计规律不明显的非线性随机序列的发生方法及其信息作非线性移位加密算法可以有效地提高密文的安全性。

    youdao

  • And last elucidates the structure of the secure system. By aiming at PKI, information secure core technology and analyses the RSA algorithm and sorts of the tech of info exchanging encryption.

    最后信息交换加密技术分类RSA算法分析,并针对PK I技术信息安全核心技术,论述了安全体系构成

    youdao

  • MD5 algorithm is used to implement the authentication process. DES algorithm combined with asymmetric encryption and digital signature to ensure the safety of information transmission.

    MD 5算法用来实现身份认证过程DES算法结合非对称加密数字签名技术保证信息安全传输。

    youdao

  • Based on the analyzing of public_key cryptosystem, a practical algorithm of RSA is studied. A network information encryption and decryption system of end to end is developed.

    基于公钥密码体制的分析研究RSA密码体制实现算法开发对端的网络传输信息加密解密系统实际网络环境条件下进行的测试证明了其安全性可靠性。

    youdao

  • Based on the analyzing of public_key cryptosystem, a practical algorithm of RSA is studied. A network information encryption and decryption system of end to end is developed.

    基于公钥密码体制的分析研究RSA密码体制实现算法开发对端的网络传输信息加密解密系统实际网络环境条件下进行的测试证明了其安全性可靠性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定