加密技术

  • 网络encryption technology;Cryptography
加密技术加密技术
  1. 这项命令本质上是要求苹果公司入侵自己的设备,一旦这样做了,那么在那些并未涉及国家安全威胁的调查中,这个先例就会绕过加密技术的执法行动提供正当理由。

    The order essentially asks Apple to hack its own devices , and once it is in place , the precedent could be used to justify law enforcement efforts to get around encryption technologies in other investigations far removed from national security threats .

  2. 数据加密技术与SET协议

    Date Encryption Technique and SET Protocol

  3. 航空专用网环境Web数据库加密技术的研究

    Research of web database encrypt technology by aeronautical private network environment

  4. 加密技术是用于构建安全Web应用程序的重要技术。

    Encryption technique is an important technique used in setting up security Web application .

  5. GIS空间数据水印信息隐藏与加密技术方法研究

    Technical Methods for Encrypting and Hiding Digital Watermark in GIS Spatial Data

  6. 对XML数据安全加密技术的研究

    The Research of XML Data 's Encryption Technology

  7. Java密码体系结构及中文信息加密技术

    Java Cryptography Architecture and Encrpytion Techniques of Chinese Characters

  8. 现有的Internet技术、软件技术及加密技术是实现该系统的技术基础。

    Existing Internet technology , software technique and encrpytion techniques are the basis for the implementation of such a system .

  9. E-mail信息加密技术与算法分析

    An Encryption Technique and Algorithm Analysis for Information Protection of E-mail

  10. 基于Logistic序列的数字图像加密技术研究

    Research on the Digital Image Encryption Technology Based on the Logistic Sequence

  11. 基于Logistic映射的小波域图像加密技术

    Image encryption technology based on Logistic mapping in wavelet domain

  12. 将COM及硬件校验加密技术运用于B/S系统

    Application of COM and hardware encryption to B / S system

  13. 基于TripleDES算法和RSA算法的Java代码加密技术实现

    Java Code Encrypt Technology Base on Triple DES and RSA Algorithm

  14. 利用软件加密技术增强MIS系统的安全性

    Using software encryption technology to enhance the security of management information system

  15. 对电子邮件常用的两类加密技术进行了介绍,并讨论了IDEA加密算法的原理。

    Two techniques of encryption about E - mail are introduced in this paper . The principle of IDEA encryption algorithm is also discussed .

  16. 从PKI体系结构出发,介绍RSA理论和在此基础上的非对称加密技术和数字签名技术。

    Firstly , it explains PKI infrastructure and asymmetric encryption theory .

  17. 基于RSA的电子商务信息加密技术研究

    Research of information encryption technology of electronic commerce based on RSA

  18. Oracle数据库加密技术分析

    The Analysis of Encryption Technology of Oracle Database

  19. 基于超混沌加密技术的RFID系统的信息保护

    Hyper-chaotic Encryption Based RFID System Information Security

  20. 基于RSA的双重加密技术在软件注册中的应用研究

    Study of a Dual Encryption Technique Based on RSA in Software Registration

  21. 要更好地利用加密技术,用户还应该再使用ESP。

    For the added benefit of encryption , users should additionally use ESP.

  22. ASP网站用户帐号的MD5加密技术

    The Encryption Techniques of MD5 about User Accounts in ASP Web

  23. 加密技术的应用包括ATM卡、计算机密码和电子商务的各个方面。

    Applications of cryptography include ATM cards , computer passwords , and various aspects of e-commerce .

  24. 提出了一种有效地保护E-mail信息安全传递的加密技术和算法。

    It brings forward an effective encryption technique and algorithm for protecting E-mail information 's safe network transmission .

  25. RSA公钥加密技术安全性分析与其在电子商务中的应用

    Safety of Encryption Techniques of RSA Public Key and its Application in Electronic Commerce

  26. 分析了XML数据安全的特殊性,并在XML数字签名和XML加密技术的基础上,设计和实现了XML数字签名和XML加密系统。

    The particularity of XML security was examined . A security system based on XML digital signature and XML encryption technologies was designed and implemented .

  27. VPN密码系统的构建涉及几个方面的技术,包括加密技术、认证技术、实现协议等。

    VPN cryptographical system is concerned with cryptographical technology , authentication technology and VPN implementation protocols .

  28. 基于RSA算法的数据库加密技术研究

    Encryption Technology of Database Based on RSA

  29. 其中XML加密技术和XML数字签名技术已经比较成熟,W3C也有与它们相关的推荐标准。

    Technologies of XML Encryption and XML Digital Signature have been well studied and have been a standard recommended by W3C .

  30. 它通过与门限加密技术相结合,把认证服务功能分发给多个CA节点。

    Combined with ( t , n ) threshold cryptography , it divides the function of the authentication service to many CA nodes .