security bit 中文意思是什麼

security bit 解釋
安全位
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • bit : n 1 少許,一點兒,一些;(食物的)一口,少量食物。 〈pl 〉 吃剩的食物;小片。2 〈口語〉一會兒,一...
  1. This dissertation is supported by the following projects : the project of " the development and commercial usage of embedded 32 - bit mcu " from mii and the project of " the development of security chip based on pci ip " from the institute of vlsi design, hefei university of technology

    本文基於國家信息產業部項目「嵌入式32位微處理器開發及產業化」 (項目編號:信運部[ 2001 ] 900號)和合肥工業大學微電子設計研究所承接的設計服務項目「 pci介面信息安全晶元開發」 。
  2. Resemble with the digital watermark methods of the other media such as still image and video, digital audio watermark must account for some problems which consist of perceptual transparency, data bit rate, robustness, security and real - time etc. the robustness of watermark is vital to the practical application, which requires the watermark providing with significant data since it suffered from some intended attacks or unintended revisal

    與靜態圖像、視頻等數字水印方法類似,音頻水印的研究主要須解決感知透明性、數據嵌入率、魯棒性、安全性以及實時性等問題。水印演算法的魯棒性對于實際應用來說是至關重要的,它要求數字水印在遭受有意的攻擊或無意的修改後,仍能提供有意義的數據,這一性能對版權保護的應用顯得尤為突出。
  3. The guys on security say you ' re a bit of a ioner. um

    安全警衛說,你一向獨來獨往
  4. The guys on security say you ' re a bit of a ioner. um.

    安全警衛說,你一向獨來獨往. .
  5. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒性非常好的參數,因而選擇色度dc系數作為水印信息載體,同時,採用可變的步長選擇部分系數,保證了水印的隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,根據用戶輸入的id號和密碼,利用本文構造的混沌系統產生的混沌序列對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽隨機序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。
  6. You could compare this to governmental deep security, which uses different levels of fingerprints and imprints to access the final bit of information

    你可以與政府多重復雜安保做比較,使用不同的指紋標準和留下烙印來訪問信息的最後比特。
  7. Even just a little bit will help you understand more about how software architecture plays a major role in overall system security

    就是一丁點也將幫助你更能理解軟體體系結構如何在全體系統安全中扮演主要角色。
  8. Those readers who need to share computers over the public internet should worry a bit more security matters than i do

    (需要在因特網上共享計算機的讀者應該比我更擔心安全性問題。
  9. Those readers who need to share computers over the public internet should worry a bit more about security matters than i do

    需要在公共因特網上共享計算機的讀者應該比我更擔心安全性問題。
  10. Optical code division multiple access ( ocdma ) is a communication mode which introduces the code division multiple access ( cdma ) technology into optical fiber communication system. besides providing asynchronous communications access, ocdma system has many advantages, such as high capacity, security against interception, suppression of narrow band disturbances, capability in forming variable bit rate networks and multi - rate networks. it implies a great challenge for the development of future communication networks, especially all optical networks

    光碼分多址( ocdma )是將碼分多址( cdma )技術與大容量的光纖通信技術相結合的一種通信方式,其主要優點表現在如下幾個方面:允許多個用戶隨機地接入同一通道:可構成真正「透明」的全光通信網路;具有良好的安全性;允許可變速率或多速率傳輸,並可同時提供多種業務支持;具有優良好的抗干擾能力,並能夠充分地利用石英光纖的可用帶寬。
  11. In december, repressive security and media laws were eased a bit

    2007年12月,強制的安全與媒體法有了些放鬆。
  12. Information technology - security techniques - modes of operation for an n - bit block cipher

    信息技術安全技術n位塊密碼演算法的操作方式
  13. Information technology - security techniques - hash - functions part 2 : hash - functions using an n - bit block cipher

    信息技術安全技術散列函數第2部分:採用n位塊密碼的散列函數
  14. Information technology - security techniques - hash - functions - part 2 : hash - functions using an n - bit block cipher

    信息技術.安全技術.散列函數.第2部分:使用n位塊密碼的散列函數
  15. Information technology. security techniques. hash - functions - hash - functions using an n - bit block cipher algorithm

    信息技術.保密技術.信息函數.第2部分:使用一個n -位數據塊密碼演算法的信息函數
  16. Developed giga - bit - firewall, and successfully passed on - line test in national chiao tung university, and became the pioneer of network security in taiwan

    臨通科技成功研發出國內第一臺giga bit防火墻,更于交通大學測試通過,成為國內資訊安全防護先鋒
  17. Meanwhile, a 128 - bit encryption communication channel is established between ssl security authentication gateway and the clients to guarantee the information security

    同時,在進行訪問時, ssl安全認證網關和客戶端之間建立了128位加密的通信通道,保證用戶訪問信息的安全。
  18. Elliptic curve cryptography ( ecc ) was proposed independently in 1985 by victor miller and neal koblitz. it is a cryptography with the highest security intensity of each bit up until now

    橢圓曲線密碼體制( ecc )最早是在1985年分別由v . s . miller和nealkoblitz獨立提出的,它是迄今為止每比特具有最高安全強度的密碼體制。
  19. This paper explores the research work on how to design a giga - bit firewall based on intel ' s network processor ixp1200, which presents both high - performance and security functionality. during the developing period, the author and his friends solved many critical problems, including multiple layer architecture, working modes, allocation of micro - engine, attack defence policies and web uuser interface. also new ideas of improvement on both future network processors and firewall products have been well presented

    本文的核心是設計和實現基於ixp1200網路處理器( networkprocessor , np )的千兆硬體防火墻,在開發過程中,解決了多層體系結構、防火墻工作模式、微引擎分配、攻擊防範策略、圖形用戶界面等多方面的問題,在今後網路處理器應用的推廣和防火墻產品開發方面都提出了獨特的見解。
  20. The result shows that the new one could run as fast as the old, while offering much hight security insurance. the output bit flow of the new has a good randomicity that is quite useful for preventing hacking. due to the scarcity of technologies and reference, the new protocol has its shortcomes

    模擬的結果顯示,新的網路交易安全協議的運行效率和原有的ssl協議非常接近,卻能提供比後者更高的安全性,黑客所能監聽到的只是高度隨機的bit流,從通信原理上來講,對其進行破解具有相當難度。
分享友人