您要查找的是不是:
- A government uses a cryptogram or secret code. 政府使用密码或暗号。
- Strand space model is a new formal analysis tool to the analysis of cryptogram protocol. 串空间模型是一种新兴的密码协议形式化分析工具。
- Communication manager, which is established in the connection of TCP by cryptogram, can transmit. 此系统可以分布在网络中任意数目的主机上。
- In this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced. 本文介绍了密码学的基本概念,包括数论的基础知识和模运算的概念。
- Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function. 加密卡是基于计算机总线接口的、提供密码服务功能的硬件模块。
- Lastly, the mixed cryptogram arithmetic was implemented and applied into the application of email encryption. 最后,实现了混合加密算法,并将其应用于加密发送电子邮件中。
- This paper has expounded on several typical cryptogram algorithms, and analyzed and summed up the implementation procedure of the cryptogram algorithms based on C-Language. 摘要阐述了几种典型的密码算法及其应用,分析总结了密码算法的C语言实现过程。
- RSA algorithm is an influential public-key encrypt algorithm at present,which can resist almost all cryptogram attack as yet. RSA算法是目前较有影响的公钥加密算法,它能够抵抗目前已知的大部分密码攻击。
- The phonetic signal encryption is implemented through the computer simulation, and two kinds of keys are used for decryption of the cryptogram. 通过计算机仿真,实现了语音信号的加密工作,对密文用两种解密钥进行解密。
- VPN technology is a virtual private network technology which use the cryptogram knowledge in the establishment of open public networks. VPN技术是利用有关密码学知识在开放的公共网络上建立虚拟专用网络的技术。
- Software and data’s safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique. 软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。
- In recent years, research and design of crypt security chip is a very popular subject in the cross field between cryptogram and micro-electronics. 安全加密芯片的研究与设计,是当前密码学和微电子学交叉学科领域的主要研究方向和难点。
- The digital signature is different from traditional signature,it is based on public key cryptosystems and is constructed by cryptogram arithmetic. 数字签名不同于传统的手写签名方式,它是基于公钥密码体制,依据一定的密码算法构造而成的。
- For improving security of voice in its transportation,chaotic signal is taken as a key and added in the phonetic signal to form a cryptogram. 为了加强语音传输的安全性,利用混沌的特性,把混沌作为加密钥加入到语音信号中形成密文,并从此密文中剔除混沌信号将语音信号还原,从而实现了对实时语音的加密解密处理。
- Encryption can be divided into symmetry cryptogram and public key cryptogram in terms of the difference between encryption key and decryption key. 单纯的采用对称密码体制或公钥密码体制在信息安全方面有诸多的不适之处,很难满足信息安全的要求。
- Considering RSA is one of the most popular public key cryptogram algirithms, a new group signature scheme completely based on RSA is proposed. 考虑到RSA是应用最广泛的公钥密码体制之一,首次基于RSA设计出一种群签名方案。
- Furthermore,the rationality and feasibility of mix cryptogram were proved by analyzing the efficiency, complexity and security. 此外,通过对混合加密算法进行效率、复杂度和安全性的分析,论证了其合理性和可行性。
- Common security technologies used in authentication include cryptogram technology, message digest, digital signature, and digital certification and so on. 身份认证中常用的安全技术包括密码技术、消息摘要、数字签名和数字证书等。
- Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network. 加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
- Analysis showed that the cryptogram formed by adding chaotic signal has good security;chaotic signal is an efficient tool for en6urin information safety. 分析所得的结果表明,把混沌加入语音信号中形成的密文保密特性较好,不易被破解,混沌是一种有效的保障信息安全的工具。