英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

Researched asymmetric key encryption algorithm basic idea , as well as elliptic curve encipher fundamentals , explorated investigation Elliptic Curve Encryption algorithm performance , corrected in some respects about improved elliptic curve encryption algorithm.

研究非对称密钥加密算法的基本思想,以及椭圆曲线加密原理。探讨了椭圆曲线加密算法的性能,对改进的椭圆曲线加密算法在某些方面进行了修正。

Aimed at the safety requirement of WAP, the disadvantange of WAP's application model is analyzed, a new end-to-end safe model, named Double Encrypt's model, is developed. Its DES and IDEA algorithm are realized by the compiling language based on delphi 6.0, the most excellent IDEA algorithm that is suitable to encipher the algorithm in WAP application system is selected to transmit data safely.

为解决无线应用协议在应用中存在的安全隐患,探讨了WAP应用模型漏洞产生的原因,分析了目前WAP应用的3种实现模型及存在的不足,提出了一种新的端到端安全模型——双加密模型,并使用面向对象的编程语言DELPHI6.0实现了数据加密标准和国际数据加密算法两种对称加密算法,选择了适用于WAP应用的最优的IDEA算法。

For the unsuitabihty of the Tag-KEM/DEM to be used as multi-message hybrid encryptions, a new hybrid paradigm, KEM/Tag-DEM, is proposed with its security proof. For the corresponding multi-message hybrid paradigm, KEM/Tag-SKE, security is also proved. Two constructions for IND-CCA secure Tag-DEMs are proposed with the security proof.

6鉴于Tag-KEM/DEM不宜用作多消息混合加密,提出一种新的混合加密范例KEM/Tag-DEM,证明了它作为一次混合加密时的安全性,以及对应的多消息混合加密KEM/Tag-SKE的安全性,给出了两种构造Tag-DEM的方法并证明了安全性。

Through the quite symmetrical key encryption system and the public key encryption system good and bad points,summarize should use the mix key encryption system in the electronic commerce, both guarantee data security, and may enhance encrypts and deciphers the speed.

通过比较对称密钥加密体制和公开密钥加密体制的优缺点,总结出在电子商务中应采用混合密钥加密体制,既保证数据安全,又可提高加密和解密速度。

Considering both performance of enciphering and degree of complexity of realization , steam cipher algorithm is used

对数据通信安全性起决定作用的加密模块所采用的加密算法进行了深入的分析,综合加密性能和实现的复杂度的考虑,采用了流密码的加密算法。

With the development of digital image enciphering techniques,there appeared a lot of methods including those based on Arnold transformation and affine transformation and those based on theories of Hilbert curve,knight-tour problem,Gray code and etc.However,there are few criteria to measure the merits and demerits of these methods.

随着图像加密技术的发展,出现了各种各样的加密方法,其中有基于Arnold变换、仿射变换、Hilbert曲线、幻方、骑士巡游、Gray码、混沌序列和基于频域的置乱加密技术,但是却缺少一种能有效衡量这些方法的置乱程度及反映加密次数与置乱程度关系的标准。

In order to extend the effect and security of image encryption algorithm.An image encryption algorithm is presented based on three-dimension chaotic system and bit-computation.The permutation sequences and binary sequences are generated using three-dimension chaotic system.Firstly,the image is pretreated using chaotic system and permutation transformation,then the pixel's gray value's bit sequences are permuted using the permutation sequences generated before,at last,the pixel's gray value's bit sequences are computed by using XOR operating and the binary sequences.

为了改进图像加密算法的安全性和效率,提出了一种基于三维混沌系统和位运算的数字图像加密算法,利用三维混沌序列的坐标分量分别产生置换序列和二值序列,在对待加密图像进行预处理的基础上,先应用混沌置换序列对预处理的结果图像进行基于灰度值位序列的置换操作,然后再应用产生的二值序列对结果图像的灰度值位序列进行位异或加密运算。

Firstly,two chaotic maps are suggested and their statistic characteristics are also analyzed.Secondly,to accomplish a controllable visual effect of encrypted image,a visual quality control model is presented,and on the basis of which,a chaotic image encryption scheme is constructed by chaotically adjusting the randomly selected approximate coefficients at the coarsest level in wavelet domain.Then,the security and efficiency of the algorithm are analyzed.

首先给出了两个混沌映射,并分析了其统计特性;为实现基于质量可控的图像加密,构建了加密的视觉质量控制模型;在此基础上,通过对随机选取的最粗级小波近似系数进行深度可控的混沌调节,实现了图像加密;最后,对加密算法进行了有效性分析。

An integrity and security e-mail system resolution is provided, which is encrypted by user finger mark.

提出并实现了一种采用指纹加密的、安全的、完整的电子邮件解决方案,包括指纹加密电子邮件服务器、指纹加密电子邮件客户端、指纹加密电子邮件用户管理和一个遵循X.509v3规范的三级CA证书认证体系等4个部分。

To increase the security of the watermark, a new binary image encryption algorithm based on TD-ERCS map is presented. The watermark is encrypted by a chaos sequence generated by TD-ERCS map; A novel color image watermarking algorithm is proposed based on discrete chaotic map and 2-dimensions discrete wavelet transform. The watermark is encrypted by the new binary image encryption algorithm, and the encrypted watermark is embed into four sub-bands of the most deep level of blue branch of host image by three-level wavelet transform, and the embedded positions are determined by general cat cha otic map; A novel color-image blind detection watermarking algorithm is proposed based on integer wavelet transform and subsampling. The scrambled watermark is encrypted and embed into the low sub-bands after four sub-images of the Y branch of host image is transformed by two-level wavelet transform, and the embedded positions are determined by Logistic chaotic map, this watermarking scheme can realize blind extraction.

为了提高水印图像的安全性,提出了一种基于TD-ERCS混沌映射的二值水印图像的加密算法,该算法利用TD-ERCS映射产生的混沌序列加密水印图像;将离散混沌映射和二维离散小波变换相结合,研究了彩色图像水印新算法,该算法先对混沌序列加密后的水印图像进行小波变换,再嵌入到宿主图像的蓝色分量的最深层的四个子带中,嵌入位置则由广义猫映射确定;将整数小波变换和图像子采样技术应用于数字水印,提出了一种彩色图像盲提取水印算法,水印嵌入时,先对宿主图像在YIQ色彩空间中的Y分量进行子采样,并对得到的四个子图像分别进行二级离散小波变换,然后将置乱并加密后的水印图像嵌入到小波变换后的低频子带中,其嵌入位置由Logistic混沌映射产生的混沌序列确定,实现了水印的盲提取。

第3/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。