您要查找的是不是:
- software encryption technique 软件加密技术
- Software encryption has been realized by using EEPROM in the paper. 本文采用EEPROM串行存储器件设计软件狗来实现软件加密。
- Software and data’s safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique. 软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。
- Software encryption is a very special professional area, which requires rich hardware knowledge as well as an in-depth analysis and research. 可见软件加密是一个非常专业的领域,不仅需要掌握丰富的计算机硬件知识,而且需要对各种操作系统进行深入的剖析和研究。
- As application field of cryptography, nonreversible algorithm and hardware encryption technique will also be the essential technology in future. 作为密码学的应用领域,不可逆算法以及硬件加密技术也将是今后必不可少的技术辅助。
- The keyboard encryption technique bypasses the keyboard hooks of the cockhorses by setting bottom keyboard hooks and delivers the massage directly to the optional code window. 随意密的键盘加密技术,通过建立底层键盘钩子,绕过木马的键盘钩子,直接传送给随意密窗口,从而让木马无法拦截到键盘数据。
- Based on the practical experience,a software encryption method for fire control systems is proposed,This method is also useful for the encryption of other utility programs which is carried on ROM. 根据实际工作的需要,提出了对火控软件加密的方法,该方法对载体为ROM的其它应用程序的加密也有一定的价值。
- Apply encryption techniques to protect sensitive data transmitted over public networks and the Internet. 要先以加密技术保护敏感的数据,然后才透过公共网络及互联网进行传送。
- A Implementation of Software Encryption 一种软件加密技术的实现
- Software Encryption By The Help of System Design 借助系统设计的软件加密方法及其实现
- In order to ensure the security and confidentiality of personal data we collect, encryption techniques have been applied for data transmission. 为了确保个人资料的保安及保密,我们采用了加密法传输所收集的资料。
- Encryption techniques have been applied to ensure secured data transmission in certain cases as specified in our website. 在某些于我们网站明示之情况下,保密技术将被使用以确保资料传送之安全。
- Application of encryption technique in data safety 加密技术在数据安全中的应用
- Research on the passivity encryption technique 非主动加密技术方案的研究
- Date Encryption Technique and SET Protocol 数据加密技术与SET协议
- The Elliptic Curve Encryption Technique 椭圆曲线密码加密技术
- unsymmetrical encryption technique 非对称加密技术
- Software Encryption and Protection Based on Dynamic Register Code 基于动态注册码的软件加密保护
- The Design of a Software Encryption Card Based on USB Interface 利用USB总线接口的软件加密卡设计
- Authentication technique is one of the core techniques of VPN, it is the safeguard of VPN together with encrypt technique, these two techniques make the name-VPN mathes the reality. 认证技术是虚拟专网的核心技术之一,它和加密技术是虚拟专网的安全保障,正是有了它,虚拟专网才名副其实。