encryption 中文意思是什麼

音標 [-'kripʃɚn]
encryption 解釋
編成密碼
  1. The realization of encryption system based on ecc and aes

    相結合的加密系統的實現
  2. Data encryption scheme of network based on aes and rsa

    的網路數據加密方案
  3. Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured

    操作系統是唯一緊靠硬體的基本軟體,其安全職能是其他軟體安全職能的根基,缺乏這個安全的根基,構築在其上的應用系統以及安全系統,如pki 、加密解密技術的安全性是得不到根本保障的。
  4. Secure e - commerce means expanding e - commerce with secure techniques and measures of encryption and digital signature to resist the anticipative risk

    安全電子商務是指運用加密和數字簽名等安全技術與手段來開展電子商務,抵禦預期的風險。
  5. The adoption of electronic commerce technology - encryption, electronic authentication and electronic signature of authorized personnel, in the banking supervision system had allowed electronic submission of banking returns in the stet system

    銀行監管系統採用電子商業技術加密電子方式確認身分和由獲授權人士以電子方式簽署,讓認可機構使用以電子傳送方式提交申報表系統電子傳送系統來提交銀行申報表。
  6. The encryption method is n ' t considered the characteristic of the video signal, regard the image data file as the general binary scale data file to encrypt

    一是用純密碼演算法加密技術,將圖像數據文件當作一般的二進制數據文件進行加密。
  7. Data encryption standard cipher block chaining packet encryption

    數據加密標準密碼分組鏈接分組加密
  8. Cipher block chaining mode is the default cipher mode for xml encryption

    密碼塊鏈接( cbc )模式是xml加密的默認密碼模式。
  9. These appliances, available from companies such as decru, neoscale, and vormetric, implement very fast encryption - they typically claim to operate at or close to " wire speed. " they also usually include sophisticated key management facilities for controlling the creation and distribution of cipher keys, cycling of keys, and disposition of keys, besides handling general data encryption

    Decru 、 neoscale和vormetric等公司都能提供這些器件,它們實現了非常快的加密通常被聲稱速度達到或接近「線速」 。它們還常常包括高級的密鑰管理設施,除了用於處理一般的數據加密外,還可用於控制密鑰的創建和分發、密鑰的循環和密鑰的銷毀。
  10. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  11. As an effectively complemental way for traditional encryption means, with the development of information, high attention has been given to the digital watermark technology by international corporations and the academic community

    隨著信息化建設的加快,數字水印作為傳統加密方法的有效補充手段,已受到國際企業界和學術界的高度關注。
  12. According to the analysis and comparison for existing wireless data traffics, a wireless bonding mode is adopted to realize mobile ticketing. the thesis also researches the safety issue on railway wireless ticketing system and put forwards the corresponsive solution. a series of safety techniques, for example data encryption, are adopted to ensure the safety of transaction between the wireless ticketing terminal and railway ticketing system

    本論文圍繞無線接入技術展開討論,通過對現有無線數據業務的分析比較,確定無線接入方式,實現移動方式的鐵路售票系統;研究鐵路無線售票系統所面臨的安全問題並提出相應的解決方案,在軟硬體結構設計中採用了一系列安全技術,並輔以科學的管理方法,使無線售票系統具備一定的安全防護能力。
  13. The public - key cryptography of data encryption

    基於配對函數的對稱加密演算法
  14. Double - click encryption has been declassified as long as the target easily get input a password

    解密只要雙擊已加密對象輸入密碼即可輕松搞定。
  15. After saving the file, an encryption dialogue box will appear, you can choose

    儲存后,當有加密對話框顯示時,你可選擇是或否。
  16. According to the research, the major work done is as following : < 1 > analyzes the symmetric - key encryption algorithm des and dissymmetric - key encryption algorithm rsa, and makes them easy to realize in hardware. < 2 > according to the algorithms and the thought of reconfigurable computing, the dissertation accomplishes the design of 64 - bit des system architecture and the design of 256 - bit ~ 1024 - bit rsa system architecture. < 3 > using the top - down high level design methodology and the hdl language, accomplishes the description of the des / rsa designs, the simulation and the synthesis

    本論文主要的研究工作: < 1 >對現有的對稱加密演算法des演算法和非對稱加密演算法rsa演算法進行分析,使其易用硬體實現; < 2 >基於可重構思想和特點,完成64位des演算法和256位1024位模長rsa演算法的可重構硬體的設計; < 3 >採用自頂向下的設計方法,利用hdl語言對des / rsa設計進行功能描述,並完成軟體模擬,綜合和布線; < 4 >在可重構計算驗證平臺上進行演算法驗證,並對設計的可重構和設計的進一步優化進行討論。
  17. The watermark algovithm can resist the physical transfer of printing and scanning by applying techniques such as fixation normalization mutually which can secure the embedding position, chaotic encipher encryption, multipassage embedding and so on. what ’ s more, the watermark designed in this essay is binary image. it can bear a large amount of information

    本文綜合運用了歸一化相關確定嵌入位置、混沌加密、多通道嵌入等技術,使得本文所設計的水印演算法能夠抵抗印刷和掃描的物理轉換過程,同時本文所採用的水印是二值圖像,能夠承載大量的信息。
  18. Based on the fact project that the development of the self - help bank " s fontal - machine system of beijing lianyintong company, this paper introduces the centralization and the network of the fontal machine ; designs the software systematical framework of fontal - machine system and functional model ; analysizes the fontal machine system " s safe strategy, the framework of encryption / decryption and its net framework

    本論文結合實際課題? ?北京聯銀通自助銀行前置機系統開發,介紹了大集中數據中心建設,前置機系統拓撲:設計了前置機系統的軟體體系結構,功能模塊:分析了前置機系統的安全策略,加解密體系結構及其網路架構。
  19. Using encryption takes a bit of forethought

    使用加密功能就必須要事先做些準備工作。
  20. The paper discussed the following four points : the security of java, the implemention of mvc pattern and the principle and implemention of the send and incept of e - mail based on java ; the principles and implemention of smtp, pop3 and imap, and the characteristic of the e - mail server sendmail, qmail and postfix ; the principles and implemention of symmetrical encryption and unsymmetrical encryption technology, and the advantages and disadvantages of them ; the characteristic of rubbish e - mail, and the principles and implemention of anti - rubbish e - mail technology

    本文研究的主要內容包括: java技術安全性, java對mvc模式的實現,以及java技術解決電子郵件發送和接收問題的原理和實現方法;電子郵件相關協議smtp , pop3和imap的原理和實現方法,以及電子郵件服務器sendmail 、 qmail和postfix的特點;對稱加密與非對稱加密技術的原理和實現方法,以及兩者的優點和缺點;典型垃圾郵件的特徵,以及反垃圾郵件技術的原理和實現方法。
分享友人