查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
An Integer Wavelet Transform with parameters is firstly constructed and the transmutative Rijndael code is used to construct a Hash function, and then a visible digital watermark algorithm based on the Integer Wavelet Translation with parameters, Discrete Cosine Transform and the Transmutative Rijndael encryption algorithm are presented.
构造出了带参数的整数小波,应用变型的Rijndael密码构造出了Hash函数。提出了一种基于带参数整数小波变换、离散余弦变换及变型Rijndael加密算法的可见数字水印算法。
-
The main features of this paper is: nothing to do with the platform, this system can be compatible with the majority of software and hardware used by the platform, as well as various database platform, shielding the differences of hardware and software platform such as network, operating systems, databases, application systems and so on, so that enterprises and institutions could achieve seamless, transparent data exchange through data exchange system; Java technology used to develop the system transplantability; using data exchange center to achieve centralized data processing, different data format conversion, increased system scalability; from data transmission, authentication, access control, encryption and more news content log-class areas enhanced data exchange system security; using DES and RSA algorithm , increased the confidentiality of data transmission; create WrapperTimer category achieved data transmission timing implementation and reduce the dependence on artificial.
设计的系统与平台无关,能兼容企业所用的大多数软硬件平台,以及各种数据库平台,屏蔽网络、操作系统、数据库、应用系统等软硬平台的差异,使企事业单位通过数据交换系统实现无缝的、透明的交换数据;采用数据交换中心来实现数据的集中处理、不同数据格式的转换,增加了系统的可扩展性;从数据传输、身份认证、权限控制、消息内容加密和多级日志等多方面增强数据交换系统的安全性;用DES和RSA算法对XML文件或XML文件中的元素进行加密,增加传输数据的保密性;创建WrapperTimer类实现了数据传输的定时执行,降低了对人工的依赖性。
-
In a point to point encryption of the TETRA system, the trunking system does not participate in the key generation and management, and only provides the clear channel for transportation.
在TETRA 系统的端到端加密中,集群系统不参与密钥的产生和管理,也不规定加密算法,只提供透明传输通路。
-
The paper is focused on voice encryption sub-system development for the police trunking communication of Wuhan, Hubei province.
本文针对湖北省武汉市公安系统集群通信加密子系统进行了深入研究。
-
Privacy in the form of personal encryption and unforgeable digital signatures are being rapidly developed.
保护隐私的个人加密术或防伪数字签名的形式快速发展。
-
Privacy in the form of personal encryption and unforgeable digital signatures are being rapidly developed.
保护隐私的个人加密术或防伪数字签名的形式便快速发展。
-
Privacy in the form of personal encryption and unforgeable digital signatures are being rapidly developed.
于是,保护隐私的个人加密术或防伪数字签名的形式便快速发展起来。
-
Privacy in the form of personal encryption and unforgeable digital signatures are being rapidly developed.
维瑟出生于芝加哥,于密歇根州立大学研读通信科学专业,1977年获硕士学位,1979年获博士学位。
-
The investigations in this thesis focus on several aspects as follows: We investigate the method that how to produce permutation matrix by using chaotic map, and get the method of image permutation based on chaotic map. This method can make original image to unorderly image to protect the true content of image. We investigate gray level mix function, and put forward a gray level mix function based on chaotic map. Because this function has chaotic characteristics, the image dealed with this function has very uniform histogram. Aiming at the contradiction between error robust and security on image encryption, we put forward a kind of gray level mix function including diffusion mechanism.
本文的研究工作主要集中在以下几方面:研究了如何利用混沌映射产生置乱矩阵的方法,给出了基于混沌的数字图像置乱方法,该方法能够将原始图像变成面目全非的杂乱图像,从而保护了数字图像的真实内容;研究了灰级混合函数,提出了基于混沌的灰级混合函数,由于该函数具有混沌特性,所以经过该函数处理后的图像具有非常均衡的灰级直方图;针对图像加密的错误鲁棒性与安全性之间的矛盾,提出了一种含有扩散机制的灰级混合函数。
-
But at the same time, the problems of security are given more and more attention by all kinds of organizations, society teams and the masses. With the development of the infomation security tenologies,all kinds of solutions appear.such as firewall.defence hacker, encryption and scanning to unsafely factors in a whole system,detection,alarm,prevention.
随着信息安全技术的进一步发展,各种安全解决方案,如防火墙技术、防黑客技术、加密技术以及对整个系统不安全因素的扫描、检测和警报、防治等等相继涌现和发展,这些技术总体看来,可划分为两种:静态和动态安全技术。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。