The paper introduced how a security algorithm be implemented on all menu-items of MIS.
本文介绍了如何在管理信息系统的菜单项上实现加密的算法。
With the improvement of hardware and software technologies, people make a new requirement for the research on Security algorithm.
随着软硬件技术的提高,人们对安全算法提出了新的要求。
This class is used by derived classes to instantiate security algorithm suites, and contains properties that describe the security algorithms.
派生类使用此类实例化安全算法组,并且此类还包含描述安全算法的属性。
In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods.
基于网络的数据传输安全问题是信息安全领域的重要课题之一,本文在分析现有数据加密方法的基础上,在数据传输系统中应用一种基于分组密码新概念的新算法—排列码加密算法。
Security researchers have recently demonstrated exploits against the MD5 algorithm which allowed them to forge usable certificates.
安全调查人员最近证明,利用MD5算法允许他们伪造可用的证书。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
The problem in this case was that the policy used different algorithm suites for the bootstrap message exchange with the Security Token service (STS) and the actual conversation with the service.
在这种情况下问题是,对于与SecurityTokenService (STS)的引导程序消息交换和与服务的实际会话,策略使用不同的算法套件。
Although WS-I is still working on finalizing the Basic Security Profile, there is one aspect of the BSP that we felt needed to be further constrained — the choice of encryption algorithm.
尽管WS - i仍在进行BasicSecurityProfile的收尾工作,但我们认为需要对BSP的一个方面进行进一步的约束:即加密算法的选择。
This tutorial does not purport to be an example of security in user authentication; instead, it will demonstrate the usage of XForms in the well-known algorithm for logging in and account creation.
这篇教程的主旨并不是示范用户身份验证的安全性。取而代之,本文将演示如何在众所周知的登录和创建帐户的算法中使用Xforms。
The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.
MD 5密码加密算法支持更为可靠的密码,从而进一步提高了安全性。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
Today, Google cracked an old encryption algorithm called SHA-1, although this does not sound like the most significant milestone in the network security.
今天谷歌破解了一种名为SHA-1的老式加密算法,尽管此事听起来不像是网络安全界最重大的里程碑。
Through searching the problem of network security evaluation, this paper presents an algorithm to evaluate network security.
对网络系统安全评估问题进行了研究,提出了一种评估网络系统安全的新算法。
The thought of network security situation prediction based on cloud and an algorithm of network security situation prediction based on cloud were proposed.
提出了基于云的网络安全态势预测思想和基于云的网络安全态势预测规则挖掘算法。
Ca authentication center provides highly intensive encipher algorithm, highly liable security mechanism and management strategy, automatic generating key and certificate management.
CA认证系统拥有高强度的加密算法,高可靠性的安全机制及完善的管理及配置策略,提供自动的密钥和证书管理服务。
Numerical result from IEEE-14 test system shows that the presented algorithm reflects the relationship of security and economy and is helpful to construct reasonable pricing system in power market.
在IEEE - 14测试系统的计算结果表明,算法反映了安全因素和经济因素的关系,有助于建立电力市场中合理的用户电价体系。
The experimental results show that both of them can resist signal distortions such as JPEG compression, Gauss noise, and the improved algorithm has better robustness and security.
从试验结果看,两种算法能够抵抗JPEG压缩以及高斯噪声等信号处理的攻击,且改进后的算法水印鲁棒性及保密性得到了增强。
An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
This algorithm has been applied successfully in the Postal Saving Security Communication System.
该算法已在绿卡安全通信系统中成功应用,效果良好。
It is not the only option which to increase the key length of encryption algorithm in order to enhance security.
仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。
In this paper, we present a new match protocol. It is of semantic security: there exists no probabilistic polynomial time algorithm to distinguish two guessed inputs.
本文给出了一个新的匹配协议,该协议是语义安全的,不存在概率多项式时间算法区分对两个输入的猜测值。
Of course, the security rendered by such an antiquated algorithm is nil.
当然,这过时的算法提供的安全是毫无价值的。
This research is helpful to the application of stream cipher algorithm in information security and modern secure communication equipment.
该研究结果有助于序列密码算法在信息安全及现代保密通信设备中的应用。
Experimental results show that the algorithm is robust and security to some watermarking attacks.
实验表明,该算法对诸多攻击具有很好的鲁棒性和安全性。
The critical techniques such as data processing, design of reviewing algorithm and security control strategy are discussed.
讨论了系统的关键技术,包括数据的处理、阅卷算法的设计和安全控制策略等。
This paper describes the security trouble of authentication algorithm based on environment variable in CGI mode and points out it's caused by excessively trust the environment variable of server.
分析了CGI模式中常见的基于环境变量的认证算法所存在的安全隐患,给出了根源是过分信赖服务端环境变量所致的结论。
As dynamic changes of topology, position-based routing algorithm and security routing are focuses and key points in this field.
由于拓扑结构的动态变化,位置路由算法和安全路由是其研究的热点和重点。
Based on trapdoor one-way function, this paper presents a RSA -based probabilistic public-key algorithm with security and efficiency and the correctness of algorithm was proved.
根据单向陷门函数的陷门性质,文章设计了一种安全有效的基于RSA的概率公钥密码算法,并对其正确性进行了证明。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
应用推荐