information encryption 中文意思是什麼

information encryption 解釋
信息加密
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • encryption : 編成密碼
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. As an effectively complemental way for traditional encryption means, with the development of information, high attention has been given to the digital watermark technology by international corporations and the academic community

    隨著信息化建設的加快,數字水印作為傳統加密方法的有效補充手段,已受到國際企業界和學術界的高度關注。
  3. The watermark algovithm can resist the physical transfer of printing and scanning by applying techniques such as fixation normalization mutually which can secure the embedding position, chaotic encipher encryption, multipassage embedding and so on. what ’ s more, the watermark designed in this essay is binary image. it can bear a large amount of information

    本文綜合運用了歸一化相關確定嵌入位置、混沌加密、多通道嵌入等技術,使得本文所設計的水印演算法能夠抵抗印刷和掃描的物理轉換過程,同時本文所採用的水印是二值圖像,能夠承載大量的信息。
  4. The government is encouraging businesses that use the national information highway to use a special encryption program

    政府鼓勵使用國家信息高速公路的工商企業採用一種專門的加密程序。
  5. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  6. Encryption technology allows secure transmittal of information along the internet by encoding the transmitted data using a mathematical formula that scrambles the data

    加密技術通過數學公式對傳輸的數據進行編碼加密,從而使信息能夠安全地在網上傳輸。
  7. Ssl encryption is designed to make the information unreadable by anyone but us

    使用ssl加密是為了讓我們之外的任何其他人都無法讀取這些信息。
  8. 4. the web database information encryption algorithms are studied

    研究了網路環境下web數據庫的信息加密方法。
  9. Using information encryption technology is more direct and more available to users

    對于廣大用戶來說,更為直接、也更為有效的辦法,就是使用信息加密技術。
  10. Finally, vhdl is used to descript the algorithm upwards. multimedia information encryption / decryption system is designed then

    最後,本文使用vhdl對上述演算法進行描述,設計了以fpga為核心的多媒體信息加密系統。
  11. The technology of image information includes information encryption and information hiding two parts. the video information encryption is mainly researched in this paper

    信息安全主要包括信息加密技術和信息隱藏兩部分,本文主要研究視頻信息加密技術。
  12. The database information encryption algorithms based on the theory of private homomorphism is structured based on the mathematic theory of polynomial homomorphism

    以數學中多項式同志理論為基礎,研究了秘密同態加密演算法。提出了基於秘密同態理論的數據庫信息加密演算法。
  13. Provide reliability and security. parallel servers, hardware redundancy, fail - safe technology, information encryption, and firewalls can enhance this requirement

    提供可靠性和安全。并行服務系統,硬體冗餘,故障自動保險的技術,信息加密,並且防火墻都可能會提高對這方面的要求。
  14. This article describes the situation of information security theory and technology, and discusses the theories of ca, information encryption, and public key system

    本文介紹了目前信息安全理論和技術發展狀況,對ca認證理論、信息加密以及公共密鑰管理等方面的技術進行了分析和論述。
  15. Due to the properties of chaotic system such as the sensitivity to initial parameters, the ergodicity and the statistics property of white noise, it is used in multimedia information encryption in this paper

    本文利用混沌系統的初值敏感性、稠密性和偽隨機性等諸多優點,將其應用於多媒體信息加密。
  16. The design thoughts of the cdsp is seen through the development process. the user ' s requirements are met by the implementation of the information encryption, concealing and secure transmission.

    在開發過程中,充分運用了信息保密安全平臺的設計思想,從信息保密、信息隱藏和信息安全傳輸等幾個方面實現了用戶的需求,具有較高的實用價值。
  17. With the ground of information encryption technology, this paper analyzes network security architecture and makes deep research on user authentication on network application layer, especially on otp ( one - time password )

    本論文從網路安全體系結構分析入手,以信息加密技術為基礎,對網路應用層的身份認證技術,特別是一次性口令認證( otp )技術進行了深入研究。
  18. Used properly - with a key of sufficient length and an encryption mode that doesn t leak information about the plaintext - most modern algorithms are reasonably safe against cryptanalytic attacks

    如果使用得當使用足夠長的密鑰和不會泄漏關于明文的信息的加密方式大多數現代演算法在密碼分析攻擊面向都有一定的安全性。
  19. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱加密演算法、 rsa非對稱加密演算法、 md5數字簽名演算法實現了一套適合電力市場信息安全傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  20. With the development of computer technology and the advancement of digital media storage and transmission, it is a serious challenge that protecting the copyright of digital media. and at the same time, it is easy to break through information security system. the tradition information encryption technology is easy to be cracked under the open network environment

    近年來隨著計算機技術的飛躍發展,數字媒體存儲與傳輸技術的進步,數字媒體的版權保護正受到日益嚴重的挑戰,信息安全系統正變的不堪一擊,傳統的信息加密技術在開放的網路面前,極易被破解。
分享友人