Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码,介绍方案。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码,介绍方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维混沌系统图像算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司科面目狰狞亲卫队抬着他来主持更生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
算法安全性很大程度上取决于暴力破解不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为服务集成商提供简单、易用接口。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统对称性与公开钥方法结合起来,兼备了者优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网点上使用操作键标进行一种键(也称键标,也就是钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础上采用一定、正交化方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重,据更安全特点,用于票据、证件、物品上,达到防伪目。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好实现多步置乱,对图像位置置乱算法进行了改进,改进后算法提升了混沌位置置乱速度,符合图像需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享基础上,选择特定重要信息,进行和解可逆方法.举出简单程序和解程序,最后探讨了应用操作技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES十进制算法实现过程和一种适合于不可靠信道(预付费系统与终端之间通信实现非接触无介质代码传送)算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池概念,将钥预配置建立在多个钥矩阵之上,节省了节点存储空间,增强了网络可扩展性。将传输机制应用到钥传输过程中,增强了钥传输过程中安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件观点;若发现问题,欢迎向我们指正。