encrypt 中文意思是什麼

音標 [in'kript]
encrypt 解釋
奪寶生死戰
  1. To encrypt an xml element with an asymmetric key

    用非對稱密鑰對xml元素進行加密
  2. How to : encrypt xml elements with asymmetric keys

    中描述的技術加密的xml元素。
  3. The encryption method is n ' t considered the characteristic of the video signal, regard the image data file as the general binary scale data file to encrypt

    一是用純密碼演算法加密技術,將圖像數據文件當作一般的二進制數據文件進行加密。
  4. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  5. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  6. If we use exponentiation to encrypt or decrypt, the adversary can use logarithm to attack

    如果我們運用求冪運算來加密和解密,對手就可以運用對數進行攻擊。
  7. Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on

    研究了公鑰加密系統中的橢圓曲線加密理論,詳細闡述了有限域上橢圓曲線的結構及其基本運算; 3
  8. This thesis is composed of following parts : the fundamental theory of the modern cryptology is briefly researched, in which the mathematic model of cryptology, data encrypt principle and galois field theory related with elliptic curve crypto is discussed

    論文的主要內容為: 1研究了現代密碼學相關的基本理論,介紹了密碼系統的數學模型、數據加密原理和與橢圓曲線加密密切相關的有限域理論; 2
  9. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條件下,保護數據和信息最行之有效的方法就是將它們加密后再存儲在數據庫中,因為加了密的數據和信息,即使被竊取、被拷貝、被截獲,獲取者因無法破解竊取的密文而無從知曉它們對應的機密數據。
  10. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號加密處理,將指令碼載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  11. Typically, secret - key algorithms, called block ciphers, are used to encrypt one block of data at a time

    通常,私鑰演算法(稱為塊密碼)用於一次加密一個數據塊。
  12. Encrypt. aes - also known as the rijndael usually pronounced something like " rhine doll " algorithm, after its developers joan daemen and vincent rijmen - is rapidly becoming the most popular symmetric key cipher used to develop new applications

    . aes來訪問,該演算法也稱rijndael (其發音常常類似於" rhine doll " )演算法,以它的開發者joan daemen和vincent rijmen命名,它正迅速成為用於開發新應用程序的最流行的對稱密鑰加密演算法。
  13. Digital certificates bind owners to a pair of electronic keys that can be used to encrypt and sign information, assuring that the keys actually belong to the person or organization specified

    數字證明把擁有者與一對能用於對信息加密和簽名的電子鑰匙捆綁在一起,保證了這對鑰匙真正屬于指定的個人或機構。
  14. Does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files

    並沒有提供使用私鑰對文件進行簽名或解密的權限,但它允許用戶驗證文件簽名並加密文件。
  15. This design implements the data encrypt card and the image compress flatform and grounds for the cipher and compress arithmetic

    設計實現了數據加解密卡和圖像壓縮平臺,為加解密演算法和壓縮演算法的實現打下物質基礎。
  16. Class to encrypt the authentication ticket

    類的加密方法來加密身份驗證票證。
  17. Eds., spinger - verlag, 1998, pp. 26 - 45. 17 bellare m, rogaway p. optimal asymmetric encryption - how to encrypt with rsa

    無論解密者多少,該方案只需計算一次甚至零次配對,並且密文只有固定的3個群元素。
  18. When you use super encryption, you can encrypt just the payment information with the accounts department s secret key to produce an element - encrypted xml file

    使用超級加密時,您可以用會計部門的秘鑰只加密支付信息,以產生元素加密的xml文件。
  19. The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use

    論文主要論述了pki基礎技術的一般知識和概念;討論了現代密碼學的基本知識和基本原理;對各種加解密演算法的主要特點、速度、加密強度進行了簡要的介紹和比較;論述了公開密鑰體制在pki體系中的應用:數字信封、數字簽名,以及數字證書定義、格式及用途。
  20. Encrypts a file so that only the account used to encrypt the file can decrypt it

    將某個文件加密,使得只有加密該文件的帳戶才能將其解密。
分享友人