-
In 2009, there was a patent invention of database encryption technology.
2009年已有数据库加密技术的专利发明出现。
-
And encryption technology is the core technology of the network security technology.
而加密技术则是网络安全技术中的核心技术。
-
This paper presents an image encryption method that combines disturbances of pixel addresses with the encryption technology of RSA systems.
本文提出了图象加密的一种方法,即把扰乱象素地址和RSA体制的加密技术相结合的方法。
-
So the digital image compression technology and the digital image encryption technology have been born and applied in many field, such as multimedia, communication, medicine and so on.
数字图像压缩技术和数字图像加密技术应运而生,并且被广泛应用到多媒体、通讯、医学等等各个领域。
-
It puts forward a novel approach to discover privacy-preserving sequential patterns based on secure multi-party computation by using commutative encryption and homomorphic encryption technology.
利用可交换加密技术和同态加密技术,提出一个新颖的基于安全多方计算的私密保持序贯模式挖掘算法。
-
This new scheme has some disadvantages, but the author expects that it can be a propeller for the development of the XML's secure encryption technology.
这种新型方案尽管还有不足之处,但是希望对XML安全加密技术的发展有一定的推动作用。
-
The Secure Ether Network Card, which is a sort of safety, integrates the data encryption technology into the network card and provides the encryption and the authentication services to the link layer.
保密以太网卡是将数据加密技术集成到网卡上,对链路层数据提供加密和认证服务的安全设备。
-
Because Apple declined to voluntarily provide, in essence, the "keys" to its encryption technology, federal prosecutors said they saw little choice but to get a judge to compel Apple's assistance.
由于苹果公司拒绝自愿提供手机加密技术的“钥匙”,联邦检察官说,他们别无选择,只能让法官迫使苹果提供援助。
-
Abroad one-commerce security technology, although its structure or encryption technology is good, but is limited by the foreign password policy, so the strength of the common enough.
国外有关电子商务的安全技术,虽然其结构或加密技术等都不错,但受到了外国密码政策的限制,因此强度普遍不够。
-
Grid security as the first line of defense, and it is also the most important line of defense, so encryption technology generally a cause for concern.
作为网格安全的第一道防线,某种水平上也是最主要的一道防线,加密技术普遍受到关注。
-
Encryption technology and system are introduced in this article and also the difference between ECC and other encryption methods is analysed.
本文主要介绍了无线网络中密码技术及体制,分析了椭圆曲线加密算法与其他加密算法的性能差别。
-
This paper first introduces the background of database encryption technology, as well as domestic and foreign research status, and discusses the necessity for database encryption.
本文首先介绍了数据库加密技术的研究背景,以及国内外研究现状,讨论了数据库加密技术的必要性;
-
Among these, data encryption technology is said to be the critical one.
其中数据加密技术被誉为信息安全的核心技术。
-
Hardware encryption technology solves the problem that the software encryption may cause the key computed in the memory or system resources occupied.
硬件加密技术解决了软件加密在加密运算时的密钥出现在内存和占用系统资源两个不足之处。
-
Superiority of hiding information to the traditional encryption technology is that the hiding information is able not to attract the attacker's notice, thereby reducing the probability of attack.
信息隐藏优于传统加密技术的地方在于信息隐藏能够不引起攻击者的注意,从而减少被攻击的概率。
-
After repeated demonstrations and innovation constantly, and ultimately Biometric Encryption are invariably tend to multi-feature, multi-modal integration of biometric encryption technology.
经过反复论证和不断地创新,最终生物特征加密的发展趋势之一是多特征、多模态融合的生物特征加密技术。
-
NuCrypt's proprietary "AlphaEta" quantum-noise randomized, physical-layer encryption technology represents a new paradigm in ultra-secure, high data-rate optical communications.
NuCrypt公司专有的“AlphaEta”量子噪声随机物理层加密技术代表了超安全高数据速率光通信的新模式。
-
In addition, we should popularize the encryption technology as soon as possible, and change the computer cryptographic system to have to rely on the import the aspect.
此外,还应尽快普及计算机加密技术,改变电脑加密系统必须依赖进口的局面。
-
At present, the encryption technology is maturer and maturer, and new algorithm is created every day.
当前的加密技术日趋成熟,加密算法层出不穷。
-
This paper presents a model of PTSSO. In the model, asymmetric encryption technology is brought in to ensure the security of information exchange between third-party applications and portal;
本论文提出的单点登录模型PTSSO通过非对称加密技术保证了门户网站与第三方应用组成的系统中各个子系统通信的安全性;
-
In this dissertation, summary is first given briefly on the current situation of the information security and the basic notion as well as mathematical model of data encryption technology;
本文首先对目前信息安全的现状和数据加密技术的基本概念及数学模型作了简单综述;
-
It is currently illegal to export this encryption technology from the US.
从美国出口这种加密技术在当前是违法的。
-
The encryption technology is the kernel of security.
加密技术是信息安全的核心技术。
-
Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.
同时,传统的加密技术所得到的密文容易被攻击者发现,影响了信息的安全性。
-
At last, we discuss the limitation of database encryption and field level encryption technology.
最后讨论了数据库加密的局限性和属性级加密方案。
-
At the same time, the application of encryption technology and development trends described.
同时对加密技术的应用和发展趋势进行了描述。
-
It prompts you for certificate identification and file information and uses RSA or elliptic-curve encryption technology.
它向您提示证书标识和文件信息,并使用RSA或椭圆曲线加密技术。
-
At present, the company has mastered the smart card operating system technology, all kinds of smart card terminal technology, smart security chip technology and encryption technology developed.
目前,公司已掌握了智能卡操作系统技术,智能卡各类终端技术、智能安全芯片开发技术及密码技术等。
-
Using PKI technology, the XML encryption technology is applied to the electronic document, the electronic document security is guaranteed.
利用公钥基础设施PKI技术,把XML加密应用于电子公文,保证了电子公文的安全。
-
The dissertation, at first, introduced the basic principles of VPN technology and its main technology tunnel technology and encryption technology.
本文首先介绍了VPN的基本原理及其主要技术:隧道技术和加密技术。