encrypting 中文意思是什麼

encrypting 解釋
加密術
  1. Authority procedure in dedicate mode checks the ms ' s validity, and if it is valid, a safe cipher key for the use of channel encrypting is given

    專用模式下的鑒權過程用於網路檢查ms提供的識別是否真實,並給ms一個安全的密鑰。
  2. Be especially cautious before encrypting data in files close to maximum file size

    所以在加密已經接近最大文件大小的文件中的數據時,要特別小心。
  3. Encrypting digital holography with aberrated phase of the object wavefront

    物光相位畸變加密數字全息圖
  4. This arithmetic divides the wavelet coefficients of carrier image into 27 - classes by the background luminance, the texture and the edge mask character of visual system ; then after encrypting watermark image with magic cube transformation, the ycbcr model is employed, it embeds the watermark sequences in the carrier image with different intensity according to the coefficients " classes of carrier image in y channel

    首先,將載體rgb圖像轉換到ycbcr顏色空間,然後提取亮度通道y ,將其進行小波變換,然後利用人眼視覺模型對載體圖象分解后的小波系數進行分類。其次,對有意義的水印圖像分別進行3次不同的魔方置亂,得到3個隨機水印序列。
  5. These information - exchanging technologies mainly include the pos handset integrating barcode scanning, cpu card ' s storing and encrypting, double - card interlocking, the pos handset integrating modem and flashrom storing. this system integrates these information - exchanging technologies to gather, transmit and query information about civil explosive products " management expediently, swiftly and exactly. this system can lock responsibility for the civil explosive products in every their lifecycle and help supervising civil explosive products legally, strictly, exactly, syllabify and integrally

    系統地研究了民爆產品管理系統中的信息交互技術,主要包括便攜式pos集成條形碼掃描採集信息、 cpu卡存儲加密、 cpu卡雙卡鎖定、便攜式pos集成modem傳輸數據、 flashrom存儲技術等信息交互技術,民爆產品管理系統集成了這些信息交互技術,能夠滿足信息採集方便快捷、信息上報及時迅速、信息查詢方便準確等需求,能夠對民爆產品在每一個環節鎖定責任單位和責任人,能夠對民爆產品進行"合法、嚴密、準確、清晰、完整"地管理。
  6. For an antivirus program, it is important to hide this database of signatures somehow - e. g. by encrypting it

    作為一個殺毒程序,隱藏這個簽名數據庫是非常重要的-通過對其加密
  7. After the investigation of the general technology of hardware implementation, how to implement the kasumi algorithm using field programmable gate array ( fpga ) device is discussed in detail, and the author develops the cipher chip of kasumi algorithm, the kasumi cipher card based on 32 - bits pci bus, the wdm device driver that used in windows2000 / xp, and the software to demostrate encrypting data link. finally, an application demostration is constructed with all the above implementation

    在此硬體實現的結果晶元基礎上,設計了32位的基於pci總線的kasumi加密卡,編寫了windows2000 xp下的windows驅動程序模型( wdm )驅動程序和鏈路加密應用程序,由此構成一個應用演示系統,作為研製結果的應用評估,為進一步進行第三代移動通信系統相關安全技術研究和開發提供了基礎條件。
  8. When it comes to encrypting network connections, stunnel is admirably close to the click - to - secure ideal, allowing you to plug security into an otherwise completed application

    在對網路連接加密時,值得稱贊的是stunnel接近了「單擊安全」的理想境界,允許我們向在其它方面已經完整的應用程序添加安全性。
  9. In order to prevent encrypting system from being broken, the variant non - super increasing sequence is used as the trapdoor knapsack vector to improve the security of public key cryptosystems

    為防止破譯,本文採取變形的非超遞增序列作為陷門背包向量,來提高背包公鑰密碼體制的安全性。
  10. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點的不同安全區之間採用防火墻、隔離裝置等邊界防護設備進行橫向隔離以抵禦非法訪問、拒絕服務等類型的攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。
  11. This method obtains structure types and strokes of chinese characters through chinese characters mathematic expression, and then the whole document is divided into two blocks by utilizing structure types of chinese characters. in each block, the position selected to embed is chose by chinese character ’ s strokes and the watermarking bit. watermarking bits with a robust structure is generated by chaos encrypting and hamming checkout coding ; embedding is implemented through setting underline to font

    該方法通過漢字數學表達式,獲取漢字的結構類型和筆畫數,利用漢字的結構類型將整個文檔分成兩塊,在各塊中由漢字筆畫數和水印比特位共同確定水印加載的位置,通過混沌加密和海明校驗編碼將水印生成一種具有魯棒性的水印結構,然後通過設置字體下劃線將水印按對稱性的嵌入策略分別嵌入文本的兩塊中。
  12. This paper used complex encrypting algorithm, and used the method of software encryption at the mobile terminal to certificate the security of data delivering, at the same time, by setting the rule of data delivering between the wap gateway and the server, it solved the problem efficiently

    摘要使用混合加密演算法,同時在移動終端使用軟體加密方法來保證數據傳輸的安全性,並且在wap網關和服務器間設置數據傳輸規則,從而有效地解決了此問題。
  13. Through encrypting and decrypting information, the system guarantees the secret and dependability of the information

    通過對傳輸信息的加密與解密,保證了信息的秘密性和可靠性。
  14. Parts easy to attack in the system are lan and communication link, which need to take link encrypting and point - to - point encrypting

    系統易受攻擊的環節是局域網與通信鏈路,需採取鏈路加密和端到端加密措施。
  15. Considering regional characteristic and involved equipments, mpls vpn is a huge system actually. this paper focuses on its mechanism, implementing process of encrypting data at the customer edge ( ce ) router and encapsulating at provider edge ( pe ) router. some particulars are implemented with c + + builder 5. 0 : creating and sending of ip package, encrypting of ip packet, encapsulating of encrypted ip packet, sending encapsulated ip packet to mpls backbone

    不管是從其地域特性、還是從其所涉及到的設備來看, mplsvpn實際上是一個比較龐大的系統,本文主要側重於討論其系統結構以及數據在客戶路由器端加密和在服務提供商邊緣路由器端封裝的實現過程,並用c + + builder5 . 0實現了其中的幾個細節: ip數據包的產生與發送, ip數據包的加密,加密后ip數據包的封裝,封裝后數據包發送至mpls骨幹網。
  16. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。
  17. Of course, nothing prevents you from encrypting any other partitions that might be of interest

    當然,這不影響您加密任何其他的分區。
  18. Conditional access ( ca ) is a technology used to control access to digital television ( dtv ) services to authorized users by encrypting the transmitted programming. an emm provides general information about the subscriber and the status of the subscription. the emm is sent with the ecm

    數字電視用戶管理系統通過對用戶訂購信息的記錄與處理,形成用戶數據庫,並經由與條件接收系統的介面,向條件接收系統發送用戶授權管理信息的基本數據,條件接收系統據此實現對用戶收看數字電視節目的控制。
  19. The functions of the smc, such as authentication, accessing the database, commucation between the sever and the client, the encrypting information transmission between clients, have almost all been realized, and the algorithm has passed the compiling and linking and proved to be practical in function

    安全管理中心的各項功能,如認證,訪問,保密通信等均得到了實現。加密演算法程序以動態連接庫的形式實現,通過編譯和連接,能夠完成文件的加密和解密。
  20. Analysis on two kinds of chaotic encrypting modes

    兩種混沌加密方式的計算分析
分享友人