英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

The configuration of ID-based Encryption is analyzed. A new ID-based Encryption is realized with the Elliptic curve over the residue class ring.

分析了基于身份加密体制的构造框架,利用剩余类环上的椭圆曲线密码实现了一种新的基于身份的加密机制。

According to the requirement of network to video encryption, this paper proposed a new scalable encryption scheme.

为了满足网络对视频加密的要求,设计了一种可伸缩性视频加密的方案。

One concern with encrypting data on a tape cartridge is maintaining and managing copies of encryption keys for numerous tape cartridges encrypted with different encryption keys.

与加密盒式带上的数据相关的一个问题是为用不同加密密钥加密的多个盒式带保持和管理加密密钥的拷贝。

And with regard to these deficiencies, the author of this paper puts forward: 1 nesting encryption technologies to improve the poor security, flexibleness and adaptability of SET protocol caused by multi-encryption algorithms; 2 enhancing the mediation function of the banks issuing cards to solve the dissension between the cardholders and the merchants, as well as the storage of the information in transaction.

针对存在的不足提出了采用嵌套加密方来解决SET协议受加密算法限制所造成的安全强度不够高、加解密不够灵活以及适应性差的缺点;提出了增加发卡银行的仲裁功能来解决持卡人与商家之间的纠纷问题以及交易信息的保存问题。

Harn and Kiesler proposed a public-key cryptosystem, digital signature and authentic encryption scheme based on Rabin's cryptosystem, in this chapter, we will analyze the security of H-K digital signature scheme and H-K authentic encryption scheme, and point out that these cryptosystem are insecure.

Shao设计了两种数字签名方案,并称这两种数字签名的安全性建立同时在离散对数和素因子分解问题之上。

A method of the optical image encryption based on the frequency splitting domain and Fresnel domain is proposed, after the analysis of the fractional Fourier transform and Fresnel transform, by synthesizing the advantages of multi keys and lensless feature of the fractional Fourier transform and Fresnel transform in the optical image encryption system.

结合分数傅里叶变换及菲涅耳变换,在光学图像加密系统中分别具有多密钥性和无透镜性的优点,提出了基于分频域和菲涅耳域的光学图像加密方法。

This paper presents a new method of digital image sharing.Firstly,construct a reversible matrix,decompose a secret image into several scrambling and encryption images at one time by matrix operation,then camouflage them into several megascopic and meaningful carrier images to store or transfer.This algorithm combines the scrambling technique,encryption technique,information hiding and sharing technique,but with much simpler algorithm,less computation time,smaller pixel expansion,better recovery effect.The results show that the algorithm has application value in the field of secret image storage and transmission.

提出一种数字图像分存方法,首先构造可逆矩阵,并通过矩阵运算直接将秘密图像分解成几幅等大小的置乱加密图像,然后分别将它们伪装在几幅经过放大且有意义的载体图像中,实现了图像分存,文中将置乱加密、信息隐藏、分存技术三者有机结合,整个算法实现简单,运算量小,数据膨胀率低,安全性高,秘图恢复效果较好,大量实验也验证了算法的有效性。

In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.

本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。

If your company is trying to understand tokenization and end-to-end encryption (E2E) you could do a lot worse than purchasing a copy of the Forrester research paper, Demystifying Tokenization and Transaction Encryption .

如果你的公司正在试图了解记号化和终端到终端的加密,你可以做很多事情不如购买副本 Forrester的研究报告,加密解密断词与交易。

It also encrypts the message using the RSA Triple-DES data encryption standard, which is a 168 bit encryption technology.

它也利用rsatriple-des数据加密标准对报文加密,此标准是168位的加密技术。

第5/60页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。