英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Engrafting L.A.Zadeh one branch fuzzy decision theory with RSA algorithm in information security, this paper gives concepts of multi-cooperation encryption and multi-cooperation sharing fuzzy decision; innovatively gives mathematical structures of group encryption and multi-group sharing fuzzy decision; finally gives safe fuzzy decision algorithm and its applications; safe fuzzy decision is a new direction of fuzzy decision research.

将L.A.Zadeh单枝模糊决策理论与信息安全中的RSA算法相互嫁接,相互渗透,提出了多合作加密与多合作共享模糊决策的概念;创新性地给出了集团加密与多集团共享模糊决策的数学结构;最后给出安全模糊决策算法以及它的应用;安全模糊决策是模糊决策研究的一个新的方向。

This paper creatively engrafts elliptic curve encryption algorithm with fuzzy recognition theory, puts forward t-order iteration encryption and t-order iteration decryption algorithm of fuzzy recognition based on elliptic curve.

本文别具心裁地将椭圆曲线加密算法与模糊识别理论相互嫁接,提出基于椭圆曲线的模糊识别t-阶迭代加密与t-阶迭代解密算法。

For avoiding information filched, CAS guarantees that the encryption mechanism is very difficult to be decrypted. Further more, encryption algorithms must operate in short calculating time.

条件接收系统为了防止信息被窃,密钥应及时更新,使得加密算法不能轻易被破译;同时还要节省带宽,减少算法的计算时间。

In order to extend the effect and security of image encryption algorithm.An image encryption algorithm is presented based on three-dimension chaotic system and bit-computation.The permutation sequences and binary sequences are generated using three-dimension chaotic system.Firstly,the image is pretreated using chaotic system and permutation transformation,then the pixel's gray value's bit sequences are permuted using the permutation sequences generated before,at last,the pixel's gray value's bit sequences are computed by using XOR operating and the binary sequences.

为了改进图像加密算法的安全性和效率,提出了一种基于三维混沌系统和位运算的数字图像加密算法,利用三维混沌序列的坐标分量分别产生置换序列和二值序列,在对待加密图像进行预处理的基础上,先应用混沌置换序列对预处理的结果图像进行基于灰度值位序列的置换操作,然后再应用产生的二值序列对结果图像的灰度值位序列进行位异或加密运算。

4 Data Encryption 9.3.4 Encryption is a process that scrambles data to protect it from being read by anyone except the intended receiver.

19.3.4 数据加密 9.3.4 加密是对数据进行编码,防止数据被目标接受者以外的人读取的过程。

This is a simple encryption and decryption procedures, which have encryption and decryption function of the 1, to call the ...

这是一个简单的加密解密程序,其中有加密和解密函数各一个,注意其中的文件调用,特别是它的路径。

EPE series: ordinary EPE, rehabilitation PO BAG EPE film anti-static, non-wax EPE, EPE Turpin, EPE encryption, encryption hardware add EPE, anti-static EPE, rehabilitation PO membrane Antistatic EPE, PO EPE laminating, PE EPE¤the one hand, PO composite aluminum composite film side of EPE, single / double-sided foil EPE review the one hand, while aluminum complex rehabilitation EPE color film, one side of complex aluminum complex of textile fabrics EPE, EPE composite of different materials, plating color film laminate EPE, EPE composite of various special materials, PS board, pearl board, KT board, advertisement board, fire EPE, EPE bridge, all kinds of special EPE Products.

珍珠棉全系列:普通珍珠棉、复PO膜防静电珍珠棉袋、无蜡珍珠棉、特平珍珠棉、加密珍珠棉、加密加硬珍珠棉、防静电珍珠棉、复PO膜防静电珍珠棉、PO复膜珍珠棉、PE淋膜珍珠棉、一面复合PO膜一面复合铝膜珍珠棉、单/双面覆铝箔珍珠棉、一面复铝膜一面复彩膜珍珠棉、一面复铝膜一面复纺织布珍珠棉、复合不同材料珍珠棉、镀彩膜贴合珍珠棉、复合各种特殊材料珍珠棉、PS板、珍珠板、KT板、广告板、防火珍珠棉、珍珠棉架桥、各种特殊珍珠棉产品。

As compared to Hsu and Wu 's authenticated encryption scheme withshared verification,the proposed scheme has the following advantages:it is more efficient for signature generation and encryption; it can detect malicious verifiers cheating others.

该方案与Hsu和Wu提出的具有门限共享验证的认证加密方案相比,签名加密效率更高,可以检测恶意的接收组成员。

To increase the security of the watermark, a new binary image encryption algorithm based on TD-ERCS map is presented. The watermark is encrypted by a chaos sequence generated by TD-ERCS map; A novel color image watermarking algorithm is proposed based on discrete chaotic map and 2-dimensions discrete wavelet transform. The watermark is encrypted by the new binary image encryption algorithm, and the encrypted watermark is embed into four sub-bands of the most deep level of blue branch of host image by three-level wavelet transform, and the embedded positions are determined by general cat cha otic map; A novel color-image blind detection watermarking algorithm is proposed based on integer wavelet transform and subsampling. The scrambled watermark is encrypted and embed into the low sub-bands after four sub-images of the Y branch of host image is transformed by two-level wavelet transform, and the embedded positions are determined by Logistic chaotic map, this watermarking scheme can realize blind extraction.

为了提高水印图像的安全性,提出了一种基于TD-ERCS混沌映射的二值水印图像的加密算法,该算法利用TD-ERCS映射产生的混沌序列加密水印图像;将离散混沌映射和二维离散小波变换相结合,研究了彩色图像水印新算法,该算法先对混沌序列加密后的水印图像进行小波变换,再嵌入到宿主图像的蓝色分量的最深层的四个子带中,嵌入位置则由广义猫映射确定;将整数小波变换和图像子采样技术应用于数字水印,提出了一种彩色图像盲提取水印算法,水印嵌入时,先对宿主图像在YIQ色彩空间中的Y分量进行子采样,并对得到的四个子图像分别进行二级离散小波变换,然后将置乱并加密后的水印图像嵌入到小波变换后的低频子带中,其嵌入位置由Logistic混沌映射产生的混沌序列确定,实现了水印的盲提取。

Start with the network application in bank ,this article introduced the database safe and encryption technical, defined the safety of database, analysed the basic roll-over protective structure of database system and offered data safe major means, discussed the range and characteristic of database encryption technology .

本文从网络在银行业中的应用入手,就数据库安全与加密技术介绍了数据库安全的定义,分析了数据库系统的基本安全架构及其提供数据安全的主要手段,讨论了数据库加密技术的特点、范围以及对数据库管理系统原有功能的影响。

第6/60页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。