Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need.
密码学作为信息安全技术的核心领域,提供了多种密码算法与应用协议以满足人们实际应用的需要。
The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.
网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。
Based on the demand status of the information resource, analyses the network information security technique and the current status of authentication system.
就信息资源保护的需求现状,分析了当前网络信息安全通常采用的技术以及身份验证技术现状。
This technique improved the security by separating the user information from the password data.
这项技术通过将用户信息与密码数据分离而提高了安全性。
Therefore, the research of Internet security technique has been one of focuses in the communication and an important research area of the information science.
因此,网络安全技术的研究已成为现在计算机和通信界的一个热点,并且成为现在信息科学的一个重要研究领域。
The category of the digital watermarking technique belongs to the information security area.
数字水印技术属于信息安全的范畴。
Digital watermarking technique is emerging as a cutting edge research field of information security in recent years.
数字水印技术是近几年来信息安全界兴起的一个前沿研讨范畴。
BCH codes are a subset of the class of linear block codes that have good error correction capability. Information hiding is a new technique in information security field.
BCH纠错编码是线性分组码的一种,有较好的纠错能力,信息隐藏是近年来信息安全领域出现的新技术。
Information hiding is a novel technique in the field of information security in this years, and it is significant to covert communication.
信息隐藏技术是近些年来信息安全领域出现的一种新技术,该技术对于隐秘通信有着重要的意义。
Quantum key distribution technique is a popular research subject in information security field, which is based on Heisenberg's uncertainty principle and no-clone theory.
量子密钥分配技术是信息安全中最热门的研究课题,它起源于量子力学中的测不准原理和未知量子态的不可克隆定理。
The intrusion detection technique is an important method to insure the computer network security. It is becoming one of hot research topics in information security field.
入侵检测技术作为确保计算机网络信息安全的一个重要手段正成为信息安全领域的研究热点之一。
Nowadays, authentication technique is becoming an important research content in computer system security field when information security is more important.
在信息安全日益重要的今天,身份识别技术的研究成为计算机安全领域中的一个重要的研究内容。
The paper brings the theory of IFS into the field of information security and proposes a technique for intrusion detection based on intuitionistic fuzzy reasoning.
将IFS理论引入信息安全领域,提出一种基于直觉模糊推理的入侵检测方法。
This paper mainly discusses the watermark technique applied in information security concerning digital image.
本论文主要探讨有关数字图像信息安全中的数字水印技术。
Digital watermark is a new and effective way to protect digital products and to maintain the data security. It is a very practical information hiding technique.
数字水印是一种新的有效的数字产品保护和数据安全维护技术,它是一种十分贴近实际应用的信息隐藏技术。
Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.
信息安全技术主要包括以加密技术为代表的密码技术、密钥管理技术、数据库加密技术等。
Digital watermarking technique is an important research field of multimedia information security.
数字水印技术是多媒体信息安全领域的一个重要研究课题。
Access control is a main technique to cope with the security problems in information systems.
访问控制是目前解决信息系统安全问题的主要技术。
Now, as an important branch of information security, steganography and steganalysis become a hot spot of information technique field.
作为信息安全技术的一个重要分支,隐写和隐写分析目前已成为信息技术领域的一大研究热点。
Since the situation of information security becomes increasingly severe, any single security technique or product cannot completely meet the requirements of users for the network security.
在信息安全日益严峻的形势下,单一的安全技术和产品已经不能完全满足用户的网络安全。
In this paper, based on the study and analysis of the information security risk assessment's concept, it explained the method and technique about target system.
简要介绍了风险评估指标体系,分析了体系中的指标特征,提出了风险评估的指标采集技术与评估方法。
Public key cryptography is an important technique to realize network security and information security. But the traditional public key cryptosystems are proved quite slow.
公钥密码是实现网络安全和信息安全的重要技术之一,而传统的公钥密码算法速度较慢。
Currently, the information-hiding technique which serves as a new effectual route for resolving the information safely transferring has become hot topic of researching in information security area.
信息隐藏技术作为一种解决信息安全传输的新的有效途径,近年来已经成为信息安全领域的研究热点。
Research Fields: the Theory and Technique of Computer network and Information Security; Parallel Computing etc.
主要研究方向:计算机网络与信息安全理论与技术、并行计算等。
Research Fields: the Theory and Technique of Computer network and Information Security; Parallel Computing etc.
主要研究方向:计算机网络与信息安全理论与技术、并行计算等。
应用推荐