您要查找的是不是:
- As application field of cryptography, nonreversible algorithm and hardware encryption technique will also be the essential technology in future. 作为密码学的应用领域,不可逆算法以及硬件加密技术也将是今后必不可少的技术辅助。
- Software and data’s safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique. 软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。
- The keyboard encryption technique bypasses the keyboard hooks of the cockhorses by setting bottom keyboard hooks and delivers the massage directly to the optional code window. 随意密的键盘加密技术,通过建立底层键盘钩子,绕过木马的键盘钩子,直接传送给随意密窗口,从而让木马无法拦截到键盘数据。
- Apply encryption techniques to protect sensitive data transmitted over public networks and the Internet. 要先以加密技术保护敏感的数据,然后才透过公共网络及互联网进行传送。
- Application of encryption technique in data safety 加密技术在数据安全中的应用
- In order to ensure the security and confidentiality of personal data we collect, encryption techniques have been applied for data transmission. 为了确保个人资料的保安及保密,我们采用了加密法传输所收集的资料。
- Encryption techniques have been applied to ensure secured data transmission in certain cases as specified in our website. 在某些于我们网站明示之情况下,保密技术将被使用以确保资料传送之安全。
- Research on the passivity encryption technique 非主动加密技术方案的研究
- Date Encryption Technique and SET Protocol 数据加密技术与SET协议
- The Elliptic Curve Encryption Technique 椭圆曲线密码加密技术
- unsymmetrical encryption technique 非对称加密技术
- Authentication technique is one of the core techniques of VPN, it is the safeguard of VPN together with encrypt technique, these two techniques make the name-VPN mathes the reality. 认证技术是虚拟专网的核心技术之一,它和加密技术是虚拟专网的安全保障,正是有了它,虚拟专网才名副其实。
- Application of Encryption Technique in Security Login of MIS System MIS系统安全登录中加密技术的应用研究
- The CATV of Encryption Technique and Practical Method 有线电视的加密技术及实用方法
- The technique is still at the experimental stage. 这项技术正处于实验阶段。
- Application of encryption technique in E-archives transfer system 加密技术在电子公文安全传输系统中的应用
- A Strong Encryption Technique for Data of Network Games 网络游戏安全性的数据健壮加密方案
- Security and encryption technique of information data 信息数据的安全与加密技术
- This technique is still in wide use. 这一技术仍被广泛使用。
- Using the way of identify verification of cookie and combining varieties of encrypted technique and perfect security configuration of operating system can provide enough support of many needing security verification application. 使用cookie的身份验证方法再结合各种加密手段以及操作系统完善的安全配置就可以为大多数需要安全认证的应用提供足够的支持。