英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

The software was developed at IBM-PC machine in pascal language.It follows the DESand has powerful encrypting ability.

该软件遵循美国数据加密标准,采用菜单式结构,加密性能强,使用方便、灵活。

And with regard to these deficiencies, the author of this paper puts forward: 1 nesting encryption technologies to improve the poor security, flexibleness and adaptability of SET protocol caused by multi-encryption algorithms; 2 enhancing the mediation function of the banks issuing cards to solve the dissension between the cardholders and the merchants, as well as the storage of the information in transaction.

针对存在的不足提出了采用嵌套加密方来解决SET协议受加密算法限制所造成的安全强度不够高、加解密不够灵活以及适应性差的缺点;提出了增加发卡银行的仲裁功能来解决持卡人与商家之间的纠纷问题以及交易信息的保存问题。

This paper proposes an extended image encryption algorithm, which is used to encrypt the confidential binary images into non-confidential garnished image.

文章提出了一种延拓的图像加密算法,该算法用于将机密的二值图像加密成非机密的伪装图像。

The theoretical analyses and experimental results are presented to prove it.And the result has all-important guidable meaning for us to use these sequences as keys for data m...

该结论的提出对用混沌二值序列作为密钥对数据流进行简单的异或加密时,是否可使用多重加密来增强效果具有非常重要的意义。

And the result has all-important guidable meaning for us to use the se sequences as keys for data multiple encryption based on simple XOR operation.

该结论的提出对用混沌二值序列作为密钥对数据流进行简单的异或加密时,是否可使用多重加密来增强效果具有非常重要的意义。

Third, FFAC sets the refinement cells and coarse cells through the inlaying way, which can decrease the number of grids strongly and need smaller storage.

第三,FFAC对各加密网格层和未加密的网格层是用嵌套的方法来处理,减少了网格总数,可以大大节约内存。

A method of the optical image encryption based on the frequency splitting domain and Fresnel domain is proposed, after the analysis of the fractional Fourier transform and Fresnel transform, by synthesizing the advantages of multi keys and lensless feature of the fractional Fourier transform and Fresnel transform in the optical image encryption system.

结合分数傅里叶变换及菲涅耳变换,在光学图像加密系统中分别具有多密钥性和无透镜性的优点,提出了基于分频域和菲涅耳域的光学图像加密方法。

This paper presents a new method of digital image sharing.Firstly,construct a reversible matrix,decompose a secret image into several scrambling and encryption images at one time by matrix operation,then camouflage them into several megascopic and meaningful carrier images to store or transfer.This algorithm combines the scrambling technique,encryption technique,information hiding and sharing technique,but with much simpler algorithm,less computation time,smaller pixel expansion,better recovery effect.The results show that the algorithm has application value in the field of secret image storage and transmission.

提出一种数字图像分存方法,首先构造可逆矩阵,并通过矩阵运算直接将秘密图像分解成几幅等大小的置乱加密图像,然后分别将它们伪装在几幅经过放大且有意义的载体图像中,实现了图像分存,文中将置乱加密、信息隐藏、分存技术三者有机结合,整个算法实现简单,运算量小,数据膨胀率低,安全性高,秘图恢复效果较好,大量实验也验证了算法的有效性。

Although the discipline of cryptography is at least two thousand years old, its algorithmic and mathematical foundations have recently solidified to the point where there can now be talk of provably secure cryptosystems.

虽然纪律加密至少二千年岁,它的算法和数学基础,最近凝固点那里现在可以谈的可证明安全加密系统。

第17/100页 首页 < ... 13 14 15 16 17 18 19 20 21 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。