您要查找的是不是:
- Network Encryption System 网络加密系统
- This paper presents a new encryption system of H.320 videoconference on DDN network. 本文基于DDN通信网络,提出了一种H.;320视频会议加密系统。
- Secure Socket Layer. A method for end-to-end network encryption. 端到端的网络加密方法。
- If you have a public-key encryption system,you can have it add an electronic signature to a document. 如果有了公开密钥加密系统,就可以对文档加上电子签名。
- Once a secret key encrypt system in VC++6.0 environment is designed and realized. 文中在VC++6.;0环境下设计并实现了一次一密文件加密系统。
- A special form of symmetric-key encryption system was proposed by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA ). (美国)国家标准与技术局和国家安全局提出了一种特殊形式的对称钥匙加密系统。
- If you have a public-key encryption system, you can have it add an electronic signature to a document. 如果有了公开密钥加密系统,就可以对文档加上电子签名。
- The XML encryption system is accomplished by combining the C#,XML encryption specification based on. NET platform. NET平台,通过把C%23语言和XML加密规范有机地结合起来,实现了XML加密系统。
- Encryption systems and their ilk are technologies of disconnection. 加密系统还有它们的同类都是隔离的技术。
- At the same time it discusses public key encryption system, digital signature, Fair Non Repudiation Protocol, Certified Electronic Mail Protocol etc. 同时讨论了公开密钥加密体制、单项散列函数、数字签名、FNP、CMP等技术
- Secure Sockets Layer is an encryption system used on servers to ensure that data transferred between a client and a server remains secure and private. 安全套接字层是用于服务器之上的一个加密系统,它可以确保在客户机与服务器之间传输的数据仍然是安全与隐密的。
- This paper proposes an end-to-end encryption system with frame stealing technique for voice, and frame insertion for video. 介绍的TETRA端-端加密系统,使用帧挪用实现语音信号的同步,使用帧插入技术实现视频信号的同步。
- The traditional encryption system is introduced. A new reconfigurable key encryption system is proposed. The features of this new system are analyzed. 摘要在介绍传统保密系统的基础上,提出了基于密钥重构保密系统的设计思想。分析了这种系统的特点。
- Conventional optical information encryption system can be divided into three kinds: double random phase encryption, iterative phase retrieve algorithm and digital holography. 常见的光学信息加密系统可以分为三类,一类是典型的双随机相位加密;
- Will Wilgus,a security consultant,says that,as with any encryption system,information technology managers must evaluate IPsec on its technical strengths and determine how well it fits into their organizations. Will Wilgus是一名安全顾问,他说,像任何一种加密系统那样,信息技术(IT)经理必须鉴定IPsec的技术优势,并确定它怎样才能适应其组织。
- One of the most popular secret-key encryption schemes is IBM's Data Encryption System (DES),which became the U.S. federal standard in 1977.The standard form uses a 56 bit key to encrypt 64 bit data blocks. IBM的数据加密系统(DES)是最流行的秘钥加密方案之一。1977年,该方案成为美国联邦标准,该标准形式采用一个56位的钥匙对64位的数据块进行加密。
- One of the most popular secret-key encryption schemes is IBM's Data Encryption System (DES), which became the U.S. federal standard in 1977.The standard form uses a 56 bit key to encrypt 64 bit data blocks. IBM的数据加密系统(des)是最流行的秘钥加密方案之一。1977年,该方案成为美国联邦标准,该标准形式采用一个56位的钥匙对64位的数据块进行加密。
- Chaotic key stream generators are of importance in re-entry telemeter data encryption systems. 摘要混沌密钥序列的实现对遥测数据加密系统有着极其重要的意义。
- In the concept of Identity-Based Encryption System, users just need know each one's Identity information such as email address and public parameters provided by Private Key Generator. 基于身份的公钥加密系统的概念是指在该体系中,用户在相互通信时,一方只需要知道另一方的诸如电子邮件地址这样的用户身份信息以及由私钥发生器所提供的公共参数即可。
- After analyzing and summarizing the problem of key design in JTC encryption system,an Iterative Algorithm based on Fuzzy Control Theory(IAFC) in place of G-S was proposed,and the comparison with G-S and Sleek Revise(SR) algorithms was given. 分析总结了基于JTC的光学加密系统密钥设计问题,提出了采用模糊控制迭代算法来代替G-S算法生成密钥,并与利用G-S算法和平滑修正法所得密钥进行了对比。