Apply encryption and security protection on application configuration files.
对应用程序配置文件要实施加密和安全保护。
Using them, as long as the object Click need encryption can be easily right.
使用起来, 只要点击需要加密对象的右键即可轻松实现。
The result of the encryption of the last 8byte block is the outcome of Step 9.
第9步的结果是最后8字节块的加密结果。
Symmetric encryption requires the same key for Both encryption and decryption.
传统的对称加密要求加密与解密使用同样的密钥。
Handlers can manage encryption and decryption, logging and auditing, and so on.
处理程序可以处理加密和解密,日志记录和审计等。
Require encryption of data at least8 bytes, number of bytes to be divisible by4.
要求被加密的数据至少8字节,字节数能被4整除。
The realization of sound file grouping encryption based on compound chaotic maps
基于混沌复合映射的语音文件的分组加密实现
The Design of the ICE Encryption Algorithm complete source code, has been tested.
设计完成冰加密算法源代码, 已经过测试。
This paper proposes a selective encryption algorithm based on quadtree structure.
提出一种基于四叉树结构得选择加密算法。
Describes symmetric and asymmetric algorithms used for encryption and decryption.
描述用于加密和解密得对称和非对称算法。
Application of neural network chaotic sucker in computer encryption communication
神经网络混沌吸收引子在计算机加密通信中的应用
THE COMPARING STUDY ON VARIED PHASE ENCRYPTION METHODS FOR OPTICAL IMAGE SECURITY
几种光学图象相位加密方法的比较
Cryptograph of block encryption appear one bit error, whole block cannot comeback.
块加密的密文出现一位错误,整个块都不可能正确解密。
Modified Image Encryption Based on Chaotic Sequences and Rubik Cube Transformation
改进的基于混沌序列的幻方变换图象加密
Chosen Ciphertext Security of Hybrid Schemes of Symmetric and Asymmetric Encryption
单双钥混合体制的选择密文安全性
Some form of encryption is needed to protect confidentiality and integrity of data.
需要用某种形式的加密技术保护数据的机密性和完整性。
A cryptographic algorithm using an identical key for both encryption and decryption.
一种密码算法,它对加密和解密使用相同的密钥。
Understanding of the data encryption methods used by the Angel Cartel and its allies.
关于天使企业和他的盟友使用的数据密码技术方法的理解。
The encryption algorithm and the hash function are further grouped into Cipher Specs.
加密算法和散列函数被进一步分组到密码规范中。
Six Security Key For Image Encryption Based on Anamorphic Fractional Fourier Transform
基于变形分数傅里叶变换的六重密钥图像加密
In this paper, a collaborative work in support of the encryption system is introduced.
介绍了一种支持协同工作的加解密系统。
For streaming encryption, block cipher needs to be translated into the work flow model.
对于流加密,需要将分组密码转化为流模式工作。
New Blind Watermarking Algorithm Based on Spread Spectrum and Chaotic Encryption Technique
一种基于混沌的新型扩频盲水印算法研究
Property contains the cipher strength of the encryption algorithm used on this connection.
属性包含该连接所使用的加密算法的密码长度。
Then a novel scheme of cascading chaotic stage and conventional encryption stage is proposed.
在此基础上,提出了一个混沌与常规加密级联的系统方案。
英文例句大全为您提供encryption英文例句大全,encryption英文造句,关于encryption的英语句子,单词encryption怎么造句,encryption英文例句大全有哪些,哪些英语句子是关于encryption,英语单词encryption的句子,单词encryption如何造句,encryption怎么造句等。