查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Finally, the way of the optical image encryption with chaotic sequence based on joint transform correlator is proposed.
最后,本文提出了利用混沌序列相位对图象在联合变换相关器中进行加解密的方法并作了计算机模拟分析。
-
The traditional optical encryption methods are classified into two kinds, one is based on the joint transform correlator, the second is based on the matched filter.
传统的光学加密方法分为两类,一种是基于联合变换相关器的加密方法,第二种是基于
-
Some novel methods and techniques of optical image encryption based on joint transform correlator were put forward ,and simulation results were demonstrated.
提出了几种基于联合变换相关器的光学图像加密方法,并进行了计算机仿真与验证,对这些方法进行了分析比较研究。
-
Firstly, this paper puts forward an improved authentication and key distribution scheme for internet environment, in which we adhibit multilevel authentication center, encryption technology of DES, RSA and one-way function to actualize the safety of communication among the different user on network and reduces the workload of the authentication institution; at the same time, this scheme can also assure the security of network. Besides, it use the temporary symbol and the responds" sign of both-side correspondent to replace time stamp and applies them to internet communication to countercheck "rebroadcast attack and accordingly resolves the problem that it needs synchronization for network clock.
本文在首先提出一种改进的Internet网络环境下的认证及密钥分配方案,该方案考虑采用了多级认证中心,DES、RSA和单向函数加密机制,实现了网络上不同用户间的安全通信,降低了网上认证机构的工作量,同时也能够保证网络的安全性;并用通信双方的临时标志和响应者标识来代替时间戳应用于Internet通信中以防止"重播"攻击,从而解决了以往需要网络时钟同步这一难题。
-
Encryption wins because it is the necessary counterforce to the Net's runaway tendency to link.
加密技术之所以会成为赢家,是因为它是对网络失控的连接倾向的必要的反作用力。
-
To address the latter issue, security analyst Bruce Schneier, chief technologist for BT Counterpane , uses whole-disk encryption on his laptop and then a second layer: He encrypts individual files on the machine separately, with a different password.
BT Counterpane 首席技术专家,布鲁斯 Schneier 安全分析师为了解决后面的问题,在他的笔记本电脑上进行整盘加密,然后进行第二个层次:他在机器上分别用不同的密码加密个人文件。
-
Password encryption algorithm is the antithesis of cryptanalysis, that is, deciphering the technical studies.
密码加密算法的对立面就是密码分析,也就是破译技术研究。
-
Cryptanalysis and encryption system are related to national security and financialsecurity.
密码分析和密码设计是信息安全领域最重要的组成部分,它的发展关系到国家安全、经济安全和金融安全等多个方面。
-
We show that unless a cryptanalyst can completely break the RSA encryption ,any heuristic oracle he uses to determine the least significant bit of the cleartext must have an error probability greater than 1/2-ε.
证明了,对于任意用于确定RSA明文的最后一个有效位的启示,必须有大于1/2-ε的出错概率,否则密码分析人员能够完全破译RSA。
-
In principle, the methods of modern cryptogram system are suitable for the digital image encryption.
数字图像置乱加密技术及其效果分析:置乱加密是数字图像加密技术中的热点问题。
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。