信息加密技术
- 网络encryption technology;Information Encryption Technology
-
基于RSA的电子商务信息加密技术研究
Research of information encryption technology of electronic commerce based on RSA
-
最后结合了ERP系统的特点、系统体系结构,通过分析比较,提出了ERP系统上应用的信息加密技术的实施方案,以达到保护网络传输中信息的目的。
At last combined with the pattern characteristics and system structure of ERP system , an implementing plan of information encryption technology used in ERP system is put forward , to protect the transmission security of information in ERP system .
-
Java密码体系结构及中文信息加密技术
Java Cryptography Architecture and Encrpytion Techniques of Chinese Characters
-
E-mail信息加密技术与算法分析
An Encryption Technique and Algorithm Analysis for Information Protection of E-mail
-
本文对移动Agent系统的一些关键技术,如移动Agent的任务模式、通信方式、移动方法、移动Agent系统的身份认证和信息加密技术等进行了论述和设计实现。
The thesis discuss some key skills during implementing the system , such as Mobile Agent task pattern , communication model , mobile methods , Agent authentication and information encryption .
-
通过WebServices远程通信技术和通信信息加密技术,实现了远程数据交换的安全和可靠,并通过设计数据库操作接口,实现数据的快速、准确导入。
By using the technology of Web Services and information encryption , safe and reliable data exchange is achieved , and by designing the database interface , the rapid and accurate data input is realized .
-
基于JCE的网络数据库敏感信息加密技术与实现
Sensitive Information Encryption of Network Database Base on JCE
-
并进一步详细讨论了信息加密技术、认证技术、时间认证、安全级别、安全需求分析、电子商务支付模式选择标准及SET、SSL安全技术等。
Beside it farther expounds and analysis the information encrypting technique , certification authority technique , time certification , security levels , security requirement analysis , the criterion of E-commerce payment , security technique of SET and SSL , and so on .
-
本论文从网络安全体系结构分析入手,以信息加密技术为基础,对网络应用层的身份认证技术,特别是一次性口令认证(OTP)技术进行了深入研究。
With the ground of information encryption technology , this paper analyzes network security architecture and makes deep research on user authentication on network application layer , especially on OTP ( One-Time Password ) .
-
传统的信息加密技术存在密钥管理的问题。
The traditional encryption has the problem of the manage of key .
-
网络信息加密技术及电子邮件的安全传输
Network Information Encryption Technology and Security Transmission of E-mail
-
基于混沌的多媒体信息加密技术研究
Research on Multimedia Encryption Technology Base on Chaotic Theory
-
C~3I系统信息加密技术研究
Research into c ~ 3i data encryption techniques
-
电子商务中的主要信息加密技术分析及其应用
Analysis and Application of Cryptography Technology in E-Commerce
-
计算机网络信息加密技术的研究
The research of computer network information secret technique
-
浅析信息加密技术及应用
Brief Analysis Information Encryption Technology and Application
-
基于B/S的电子政务系统中信息加密技术的设计与实现
Design and Implementation of Encryption Technique in E - Government System based on B / S
-
本文较详细的介绍了密码通信系统中的信息加密技术原理和算法,以及实现该技术的方法。
This paper discuss principle and count of information secret technique about cipher communicate system , and way to realize this technique .
-
入侵检测技术和信息加密技术、病毒防御技术以及防火墙技术一起成为了保护网络安全的卫士。
Intrusion detection technique , information encryption , virus defends technology and fire wall technology has become a bodyguard protecting network security .
-
数字水印作为一种在原始数字产品中嵌入水印验证产品所有权的信息加密技术,为版权保护提供了一种新的解决途径。
Digital watermarking is a process of embedding watermark into digital products to prove the copyright , it provides a new valid solution to copyright protection .
-
入侵检测技术是一种提高网络安全的重要手段,与信息加密技术、防火墙技术、病毒防御技术等一起共同保卫我们的计算机及网络系统。
Intrusion detection , together with the other technologies in information encryption technology , firewall , and viral defense technology is an important means to improve Internet safety .
-
基于角色的用户管理、用户信息加密技术为系统安全做了有效防护,系统功能根据用户登录的身份而确定。
Based on the Role management and user information system security encryption technology to make the effective protection , the system functions according to the user log to determine the identity .
-
本文所研究的是基于混沌密码的信息加密技术,主要涉及以下两个方面:混沌密码在语音加密方面的应用;混沌密码在图像加密方面的应用。
This article is about the research of encryption technology based on chaotic ciphers , involving the following two aspects : the applications of chaotic ciphers to audio encryption and image encryption .
-
防火墙技术、信息加密技术、信息认证技术、防病毒技术的信息转移安全对策以及建立一套健全的安全管理制度的措施等。
Information transformation security strategies on firewall technology , information encrypting technology , information authentication technology and virus prevention technology are put forward . Also is suggested the measures of establishing a set of sound security administration system .
-
网络安全的基本技术目前有:防火墙技术、访问控制技术、网络反病毒技术、网络安全漏洞扫描技术、入侵检测技术、信息加密技术、信息确认技术等。
Recently , network security technologies include : firewall technology , access control technology , network anti-virus technology , network security hole scan technology , intrusion detection technology , information encryption technology , information confirmation technology and so on .
-
在视频等数据量大的信息加密技术研究中,序列密码算法正逐步取代传统高强度的密码算法,在安全性得以保证的前提下可获得更高的实时性。
Research in the video and other large quantity of data information encryption technology , the sequential cipher is gradually replacing traditional cryptography algorithms which are high strength , to ensure safety in the premise of the real-time get higher .
-
数字水印为数字产品提供了一种有效的保护措施,不同于信息加密技术仅仅在初始获取上做限制,对于数字作品的保护从后期应用中的修改以及非法传播上都进行了抵御。
Digital watermarking provides the digital products with effective protection . Different from the information encryption technology which just restricts the acquisition , the protection watermarking brought the digital products with can resist both the illegal transmission and the modification during the application .
-
目前基于视频传输的流式媒体信息加密技术一般无外乎信息加密、信息隐藏、信息伪装夹带及内容数字版权加密保护等.其中数字水印技术是研究热点之一。
Now the stream media information encryption technologies based on the video transference include nothing but information encryption , information hiding , information camouflage and secret carrying , digital right management etc , among which the digital watermark is one of the hot topics .
-
通过对网络通信中的加密技术的分析和对目前信息加密技术中的常见几种方法的研究,说明数据保密变换,或密码技术,是对计算机网络信息进行保护的最实用和最可靠的方法。
Through analyzing encryption technology in network correspondence and researching the several present common methods of information encryption technology , the data security transformation and the password technology obtain , which are carries on the protection to the computer network information to be most practical and the most reliable method .
-
影响网络安全的因素有很多,相应地关于网络安全技术也有多种措施,本文主要论述了防火墙技术,信息交换加密技术,及针对PKI技术这一信息安全核心技术,论述了其安全体系的构成。
Many elements have influenced on Network security Accordingly the measures have been made now . The text main discusses a firewalls technique , information exchange encryption and security core technique about the PKI . The same time discusses the comprise of security system .