cryptogram 中文意思是什麼

cryptogram 解釋
n. 名詞 密碼(文件);暗號。

  1. 100 prizes : an infantile epistle, dated, small em monday, reading : capital pee papli comma capital aitch how are you note of interrogation capital eye i am very well full stop new paragraph signature with flourishes capital em milly no stop : a cameo brooch, property of ellen bloom born higgins, deceased : 3 typewritten letters, addressee, henry flower, c o p. o. westland row, addresser, martha clifford, c o p. o. dolphin s barn : the transliterated name and address of the addresser of the 3 letters in reserved alphabetic boustrophedontic punctated quadrilinear cryptogram vowels suppressed n. igs. wi. uu

    三封打字信,收信人為:亨利弗羅爾,韋斯特蘭橫街郵政局轉交發信人為:瑪莎克利弗德,海豚倉巷郵政局收轉。三信的發信人住址姓名被改寫為字母交互逆綴式附有句號分作四行的密碼母音字母略之如下: nigs wiuuoxwoksmhyim 296英國周刊現代社會297的一張剪報:論女學校中的體罰。一截粉紅色緞帶,這是一八九九年系在一顆復活節彩蛋上的。
  2. Structure of cryptogram is deeply investigated in this theme

    對密文文件格式作了深入研究。
  3. Implementation of trusted computing in commercial cryptogram based on hardware

    基於硬體系統的商用密碼可信計算實現方法
  4. Cryptogram residue class

    密報剩餘類
  5. The security program builds largely upon sound cryptogram arithmetic and secure key management

    密碼演算法的安全性很大程度上依賴於密鑰的安全性。
  6. Cryptogram programming of confidential information is an effective tool for ensuring information security

    機密信息的密碼化是保證信息安全的一種有效手段。
  7. Chapter 3, introduces the cryptogram technology which the e - signature stamper system will use

    其中,數字簽名技術尤為重要,它是提供信息完整性、機密性、不可抵賴性的基礎。
  8. High performance cryptogram server provides a safe, highly effective platform of cryptogram programming of information

    高性能密碼服務器提供了一個安全、高效的信息密碼化平臺。
  9. Meanwhile, ideas in research toward standardization of cryptogram form is provided to information security researching staff of inland and overseas

    也為國內外信息安全工作者對密文格式標準化研究提供了思路。
  10. Stamper and signature is very important in the affair of tradition work in government and enterprise. this article according to the characteristic of traditional signature and stamper, combinic the demands of signature and seal in e - government - affair work information system, inosculates the technology of middleware and e - government - affair security, makes use of object oriented and component technology, integrates correlation knowledge of compositive cryptogram, pki, seal digital image, activex etc, studies and achieves digital e - signature - seal middleware based on web which is used in internet / intranet environment

    印章和簽名在傳統的政府辦公和企業事務處理中起著十分重要的作用。本文根據傳統簽名、蓋章的特點,結合電子政務辦公信息系統中的蓋章簽名需求,把電子政務安全技術和中間件技術相融合,利用面向對象和組件技術,集成密碼學、 pki 、印章數字圖像、 activex控制項等相關知識,研究並實現了一個應用於internet intranet環境中的基於web的電子簽章中間件。
  11. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。
  12. The traditional means, such as key, password, cryptogram, id card and even ic card, have fallen behind the needs of economic activity and social security. this is because that they would be forgeable, falsifiable, stolen or decodable

    傳統的個人身份鑒別手段如鑰匙、口令、密碼、身份證件,甚至ic卡等識別方式,由於它們具有可假冒、可偽造、可盜用、可破譯的弱點,已不能完全滿足現代社會經濟活動和社會安全防範的需要。
  13. On the other hand the information cryptogram technology and card identification of 1c appl ication system are also introduced. a novel fingerprint image preprocessing method is studied based on the trend of fingerprint veins, and some feature extraction and fingerprint matching methods based on fingerprint minutia based on a novel multi - fitness genetic algorithm ( mfga ) are also studied

    在分析了國內外指紋識別理論研究的基礎上,研究了一種基於指紋紋線趨勢的指紋圖象預處理方法並取得了較好的模擬效果;研究了遺傳演算法在指紋模式匹配中的應用,針對遺傳演算法在模式匹配的局限性,提出了一種多適應度遺傳演算法( mfga ) ,並在此基礎上對原遺傳匹配演算法做了進一步的改進。
  14. After particularly researched the cryptogram algorithm of des, rsa, ecc, with which the virtue and shortcoming of performance in practice using is analysed. through which a hybrid ecryptogram system based on the des and ecc is designed, and also the flow of this cryptogram is provided. with this cryptogram, the problems of conservation of key and velocity of operation which aroses from using des, rsa algorithm singly is it resolved, and the securities of the system is improved

    然後論文在詳細研究des 、 rsa 、 ecc等加密演算法的前提下,分析了它們在實際應用中性能上的優缺點,進而,設計了一種基於des和ecc的混合加密體制,給出了演算法的實現流程,解決了單獨使用des 、 rsa演算法所帶來的密鑰保存不方便和運算速度較慢等問題,有效地提高了系統的安全性能。
  15. A design scheme of cryptogram transmission system based on fpga is presented, which is used to implement the simulation of the quantum transmission channels. furthermore, a circuit of fpga power - on configuration is realized

    提出了基於fpga的密碼傳輸系統的設計方案,用於模擬高斯密鑰在量子通道上的傳輸,並完成了fpga上電配置電路的設計。
  16. The capacity of encryption / decryption operation and the category of cryptogram - supported algorithms are the important indicator of cryptogram server

    加解密運算的性能和支持的密碼演算法的種類是密碼服務器的重要指標。
  17. Then a draft is given. with this draft, the problems of various products of region and the system structure unmatching is resolved, and the security of system is improved by u sing the mix cryptogram

    接著文章給出了一種基於lon總線的小區智能卡系統集成方案。該方案解決了小區產品協議多元化和面向各種應用的體系結構不匹配等問題,並使用混合密碼體制提高了系統安全性。
  18. Considering the compatibility, the system of security environment is designed and realized by corba technology. at present, security environment is composed of cryptogram base system, certificates base system and interface base system

    考慮到系統的通用性,作者採用corba技術初步實現了安全平臺的加密演算法庫系統、證書管理庫系統利介面庫系統。
  19. After analyzing the advantages and the disadvantages of dse arithmetic and rsa arithmetic, which are both representatives of the traditional cryptogram systems, put forward a model of network data safety system combined two arithmetic

    在分析對稱密碼體制和公開密鑰體制的代表dse和rsa演算法的優缺點后,提出將兩種演算法結合的網路數據安全系統的模型。
分享友人