cryptograph

cryptograph

1. Electronic Commerce,Cryptograph Technology,Digital Signature,Digital Authentication,COM (component object model

01电子商务;加密技术;数字签名;数字认证;COM组件技术

2. Our paper-breaking machine was broken,so I would tear up the cryptograph by hand.

5.我们的碎纸机坏掉了,所以我会徒手将这些机密文件撕碎。

3. The Effect of AKS on Modern Cryptograph

AKS算法对现代密码学的影响

4. ZHAO Qi-yong; ZHENG Yan-fei; ZHENG Dong(Lab of Cryptograph &Information Security; Shanghai Jiaotong University; Shanghai 200240);

上海交通大学密码与信息安全实验室;

5. This CA’s software modules include users’ certificate application and management module, CA management module, CA service module, cryptograph service module and database module.

专用CA的软件模块划分为用户证书申请及管理模块、CA管理模块、CA服务模块、密码服务模块、数据库模块等;

6. Archaeological Studies of Chinese Music and Military Cryptograph

中国乐曲考古学与军事密码学的比较

7. For this, we need the services of a female member of the Russian Cryptograph Section in Turkey and the help of the British Secret Service.

为此,我们需要俄国驻土耳其密码部能有一位女职员配合我们的工作,同时也需要英国安全部门的协助。

8. But the cryptograph algorithms cost too much CPU time, which descrease the throughput of the VPN Gateway.

但是加密算法佔用大量的CPU资源,降低了VPN网关的吞吐量。

9. Intrusion detection is an active technology for defense, supplies the complement for shortcoming of traditional security technology like firewall, cryptograph.

入侵检测是一种主动防御技术,它弥补了防火墙、信息加密等传统安全技术的不足。

10. PKCS Public Key Cryptograph Standard

公开金钥密码技术标准

11. public key cryptograph

公钥密码

12. pubilc key cryptograph

公钥密码体制

13. shared cryptograph

共享密文

14. It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.

利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。

15. Encrpytion Algorithm and Cryptograph Key Management

加密算法和密钥管理

16. As for implement of the special CA, cryptograph hardware and cryptograph function interface in tax system as well as the implement of every software module are presented.

在专用CA的实现方面,阐述了它使用的密码硬件与密码函数接口以及每一模块的实现过程。

17. In cryptograph service module, a method of dynamically monitoring unused key pairs is developed, which can speed up key pairs generation.

在密码服务模块中,使用了动态监控密钥库存数量的方法,有效地提高了密钥生成的速度。

18. In the operation phase,the self-organized public/private key update,revocation,and shared-private-key-matrix update are implemented with threshold cryptograph.

在网络运行阶段,应用门限密码技术实现了自组织的节点公私密钥对更新和撤销,以及共享私钥种子矩阵更新。

19. --- Cryptograph plays a more important role in this e-age.

在这个电子时代里密码学起着更重要的作用。

20. Cryptograph of block encryption appear one bit error, whole block cannot comeback.

块加密的密文出现一位错误,整个块都不可能正确解密。

21. A Network Security System Based on the Public Key Cryptograph

基于公钥密码的一种网络安全系统

22. Cryptograph index technology based on multi-buckets partition

基于多重桶划分的密文索引技术

23. The cryptography technology based on the private or public key can be used to control the data access and change the straightforward information into the baffling cryptograph information.

基于私有或公共密钥的加密技术可以用来控制数据访问,它将明文消息变换成旁人无法理解的密文消息。

24. The scheme could obtain the quicker velocity of encryption and decryption, distinguish the right message from the wrong message, and resist the attack of continuous cryptograph sending.

它不仅可以获得较快的加密解密速度,辨别消息的真伪,还能抵抗重发密文的攻击。

25. cryptograph query

密文查询

26. cryptograph index

密文索引

27. Cryptograph:a system of secret or cipher writing;

密码:一种秘密的或用密码书写的系统;

28. 3. cryptograph:a system of secret or cipher writing; a cipher.

密码:一种秘密的或用密码书写的系统;密码.

29. Cryptograph: a system of secret or cipher writing; a cipher.

密码:一种秘密的或用密码书写的系统;密码。

30. PKCS#11 interface is adopted to implement cryptograph service module.

密码服务模块使用PKCS#11密码函数接口实现;

31. cryptograph computing

密码计算

32. Design and implementation of control system of computational node in grid for cryptograph computing

密码计算网格的计算节点控制系统设计与实现

33. The CSP based on smart card can provide cryptograph service of good reliability and security. Because of the portability of smartcard, it can be used on many different kinds of terminal device, such as cell phone, Pocket PC, PC and so on.

开发基于智能卡的CSP能提供高可靠性和安全性的加密服务,同时由于智能卡的小巧和可便携性的特点,使得它能用于诸如手机、掌上电脑、PC机等各种终端设备。

34. VPN Gateway uses cryptograph algorithms to protect network information.

摘要虚拟专用网(VPN)的网关使用加密算法保护网络信息。

35. The Server access DBMS on behalf of Application and sends back the results in cryptograph.

服务器接收请求后执行对数据库的真正访问,然后把访问结果加密后返回给客户端。

36. The paper introduces a sort of encrypted algorithm which comparied with the original length of cryptograph, the length of encrypted cryptograph will base on the difference of the encrypted information piece length to minish.

本文介绍了一种加密后的密文长度与原明文长度文相比,依据所选加密信息块长度的不同而做相应减小的加密算法。

37. elliptic curves cryptograph (ECC)

椭圆曲线加密

38. ellipse curve cryptograph

椭圆曲线密码

39. Second, studying into the theories arounding database-encryption system , explaining the cryptograph index, key management and some other key technologies in detail;

然后系统地介绍了扩展存储过程技术;

40. A Neural Network Method for Deciphering the Public Key Cryptograph

破译公钥密码的一种神经网络方法

41. Its hardware includes Database server, CA server, cryptograph server, web server, and management PC.

硬件则包括数据库服务器、CA服务器、密码服务器、Web服务器、管理PC机。

42. The fast progress of quantum information technology extends the research fields of information theory and technology.The important impact of quantum computation on modern cryptograph is talked about.

近年来,量子信息技术的快速发展拓宽了信息理论的研究内容,也给信息科学研究带来了新的机遇与挑战。

43. Its key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph.

这种方案的核心思想是在传输效率和传输保密性上取得更加实用性的平衡。

44. quantum cryptograph

量子密码术

45. In view of these questions, establish the cryptograph database is the effective method to realize the data security.

针对此问题,建立密文数据库是实现数据安全的有效方法。

46. Efficient VLSI Design for Elliptic Curve Cryptograph

高效椭圆曲线密码芯片的VLSI设计

英语宝典
考试词汇表