您要查找的是不是:
- encrpytion tachniques 加密技术
- The paper presents encrpytion techniques of double random phase based on anamorphic fractional Fourier transform. 提出变形分数傅里叶变换双随机相位编码技术。
- Basing on the encrpytion techniques, PKI (Public Key Infrastructure) provide modules and services for deploying certificate system. PKI公钥基础设施已逐渐得到社会的公认,目前正处于一个不断完善的阶段。 它以加密技术为基础,提供了实际实施和运作使用证书的系统所需的组件和服务。
- The encrpytion techniques of early videoconferencing system based on H.320 protocol can not satisfy requirement of security in modem society. 摘要早期H.;320视频会议系统所提供的加密技术已不能满足当今社会的安全需求。
- The encrpytion techniques of early videoconferencing system based on H.320 protocol can not satisfy requirement of security in modern society. 早期H.;320视频会议系统所提供的加密技术已不能满足当今社会的安全需求。
- In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer. 该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
- Firstly, data mining of association rules, data mining of association rules on distributed databases and distributed encrpytion techniques are introduced. 首先,本文介绍了关联规则挖掘、分布式关联规则挖掘和数据的分布式加密技术的基本知识。
- The encrpytion techniques and authentication techniques adopted in the system assure the authenticity, confidentiality and integrality of information when users are authenticated. 认证服务器设计中采用的加密技术和认证技术保证了用户在认证时信息的真实性、机密性、完整性。
- Encrpytion techniques of database was analyzed in this paper and a few of applied encrpytion arithemtic of database were offered. These arithmetic would be valu-able for encrpytion of database. 摘要本文就小型数据库的加密技术进行了分析,提供了几种实用的数据库加密算法,对小型数据库的加密有一定的实用价值。
- Encrpytion Algorithm and Cryptograph Key Management 加密算法和密钥管理
- The Design of USB Encrpytion Key and It's Software USB密码钥及其软件设计
- A Bit of Experience on the Trouble Processing of up Municipal Encrpytion Message 地市级加密报上行故障处理经验点滴
- Encrpytion technique of double random phase based on anamorphic fractional Fourier transform 变形分数傅里叶变换双随机相位加密技术
- Design and Implement of a COM Component Which Encrpyt and Sign Data in Web FORMS Web表单数据加密和签名组件的设计与实现
- s: The concept of E-Business safety was elucidated and the core technology (symmetric and unsymmetric encrpytion techniques) were analyzed as well. 阐述电子商务安全概念,分析电子商务安全的核心技术(对称与非对称加密技术)。
- database encrpytion 数据库加密
- encrpytion dictionary 加密字典
- encrpytion machine 加密机
- encrpytion software 加密软件
- Data encrpyt 数据加密