encryption technique

英 [ɪnˈkrɪpʃ(ə)n tekˈniːk] 美 [ɛnˈkrɪpʃən tekˈniːk]

加密技术

计算机



双语例句

  1. A substitution cypher is a simple encryption technique where every letter of the alphabet is substituted with another letter from the alphabet.
    置换密码是一种简单的加密技术,采用这项技术将把字母表中的每个字母替换为字母表中的其他字母。
  2. If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.
    如果有一种理想的加密技术,将会有很多法律障碍来限制它的使用。
  3. Hardware Encryption Technique of Mechatronics Products Controlled by Single Chip Microcomputer
    性是可贩售的产品,是购物单上的下一项。单片机控制的机电一体化产品硬件加密技术
  4. Because of the unavoidable deficiencies of the original software encryption scheme, people pay more and more attention to the hardware encryption technique.
    原有采用软件加密的通信方案因其种种的缺陷使人们把目光逐渐转向了采用更加安全快速的硬件加密措施。
  5. Research and implementation of data encryption technique for the Internet based examination system
    网络考试系统中数据加密技术的研究与实现
  6. The encryption technique of the digital video based on embedded system
    基于嵌入式系统的数字视频信号加密技术
  7. A Digital Image Encryption Technique Based on RSA and Its Fast Implemention
    一种基于RSA的数字图象加密技术及其快速实现
  8. New Blind Watermarking Algorithm Based on Spread Spectrum and Chaotic Encryption Technique
    一种基于混沌的新型扩频盲水印算法研究
  9. The Research of Speech Encryption Technique Based on Chaos Synchronization Theory
    基于混沌同步理论的语音加密技术研究
  10. In order to provide a more effective encryption technique, the concept of random chaotic dynamical systems group was given.
    为提供更有效的加密方法,提出了随机混沌动力系统组的概念。
  11. Color image encryption technique based on double random phase encoding
    基于双随机相位的彩色图像加密隐藏技术
  12. Transmission of the radio signal that activates the system is not particularly secure, however. A new encryption technique increases security without draining the key's battery.
    然而靠无线电传输来激活汽车系统的方法并不是绝对安全的,下面介绍一种增加汽车安全性的新加密技术。
  13. However, the Chaos-based image encryption technique has some deficiencies, such as the limited accuracy problem.
    然而,混沌图像加密技术仍存在有限精度等问题。需要人们进行进一步研究和完善。
  14. By using bits-stream encryption technique, the encrypted multimedia information will have strong security.
    所采用的比特流加密技术,使得加密的多媒体信息具有很强的保密性;
  15. A new optical encryption technique based on computer-generated hologram of asymmetry fractional Fourier transform is presented.
    提出了不对称分数傅里叶变换计算全息,并给出了相应算法。
  16. This paper mainly introduces a kind of alterable encryption technique for database.
    本文主要介绍一种可变的数据库的加密方法。
  17. Study of a Dual Encryption Technique Based on RSA in Software Registration
    基于RSA的双重加密技术在软件注册中的应用研究
  18. This method can be used as encryption technique in other applications.
    此方法可以推广至其他加密技术。
  19. We study the digital signature, encryption technique and cipher analys I s of cipher technology.
    本文重点研究了密码技术中的数字签名技术、并对网络加密方式和密码分析技术进行了探讨。
  20. For this purpose, after deeply researched Encryption and comparison, we use combination Encryption technique to optimize cryptography.
    为此,我们深入研究加密算法,对多种算法进行了优劣性比较,用组合密码技术来优化和强化加密算法。
  21. This paper introduces and compares the merits and demerits of some key techniques including network firewall technique, data encryption technique and identity certification system adopted for the network security in implement of e-governmental affairs and bring forward a multi-tier network security system.
    本文中介绍和比较了网络安全所采用的若干关键技术的优势和缺陷,包括防火墙技术、数据加密技术和身份认证体制,提出了多层次网络安全体系结构。
  22. It brings forward an effective encryption technique and algorithm for protecting E-mail information's safe network transmission.
    提出了一种有效地保护E-mail信息安全传递的加密技术和算法。
  23. An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
    为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
  24. This paper introduced the functional module, communication mode, information flow, communication standard and encryption technique of Electronic Data Interchange.
    介绍了电子数据交换的功能模块、通信方式、信息流程、通信标准和加密技术。
  25. Net's forms authentication, and of the data encryption technique and the digital signature technique.
    NET的Forms身份验证相结合的认证技术,以及数据加密和数字签名技术,实现了其安全机制。
  26. This paper points out the security threats existed in ATM networks, addresses the data encryption technique and integrity service etc which are involved in implementation and management of the network security.
    指出了ATM网络存在的安全威胁,讨论了ATM网络的数据加密技术、完整性服务等ATM网络安全技术的实现和管理。
  27. Applying encryption technique is a valid and economical means of protecting important information in modern society.
    采用加密技术是现代社会保护敏感信息的一种较为有效和经济的手段。
  28. Application of Encryption Technique in Security Login of MIS System
    MIS系统安全登录中加密技术的应用研究
  29. Data encryption technique is one of mostly used information security techniques.
    其中数据加密技术又是信息安全技术的核心。
  30. To remove the security risk in network transmission caused by session key of symmetric key cryptographic algorithm, the AES algorithm and RSA algorithm are combined as encryption technique in system design.
    为了消除对称密钥加密算法的会话密钥在网络传输中的安全隐患,系统设计中采用了AES加密算法和RSA加密算法相结合的混合加密技术。