cryptogram n.密碼(文件);暗號。
n. 密碼(文件);暗號。 “cryptogram for virus“ 中文翻譯: 病毒簡碼“cryptogram management“ 中文翻譯: 密碼管理“cryptogram space“ 中文翻譯: 密文空間“cryptogram telephone“ 中文翻譯: 話密機“cryptogram residue class“ 中文翻譯: 密碼殘余等級; 密文剩余類“cryptograined texture“ 中文翻譯: 隱晶結構“cryptograined“ 中文翻譯: 隱晶粒狀; 隱粒的“cryptograhy“ 中文翻譯: 密碼術“cryptogonomery“ 中文翻譯: 隱藏分核現象“cryptoglioma“ 中文翻譯: 潛神經膠質瘤; 潛隱期神經膠質瘤; 隱期神經膠質瘤
cryptograph |
|
Biometric recognition technology develops very fast recently , which recognize people by means of some sole and stable features . the operation of this technology is convenient and rapid . meanwhile , there does n ' t exist problems such as cryptogram got out or card lost which is present in cryptogram identification and card identification respectively 生物識別技術是近年來興起的身份識別技術,由于它利用了人體的某些具有終生不變性與唯一性的特征,使得這種技術不但具有極高的可靠性,而且操作方便快捷,同時,它不存在諸如密碼、卡片式身份鑒別方式中的密碼泄露或卡片遺失的隱患,因而具有極高的可靠性與安全性。 |
|
On the basis of some conceptions relating to ec security such as encrpytion techniques and identity - authentication , we mainly discuss the disadvantages of using ssl in online payment . to solve these disadvantages of ssl , i try to add bilateral - identity - authentication to give the customs more equitable circumstance to do ec businesses . for the reason of confronting the hacking , the management of cryptogram must to be improved 針對這些不足,作者嘗試在ssl協議的基礎上,添加雙向身份認證,保證客戶獲得和商家平等的交易環境,同時對密鑰的管理進行了改進,限制了同一密鑰的生存周期,使得密文擁有更高的隨機性,以對抗中間人黑客的監聽和破解。 |
|
After particularly researched the cryptogram algorithm of des , rsa , ecc , with which the virtue and shortcoming of performance in practice using is analysed . through which a hybrid ecryptogram system based on the des and ecc is designed , and also the flow of this cryptogram is provided . with this cryptogram , the problems of conservation of key and velocity of operation which aroses from using des , rsa algorithm singly is it resolved , and the securities of the system is improved 然后論文在詳細研究des 、 rsa 、 ecc等加密算法的前提下,分析了它們在實際應用中性能上的優缺點,進而,設計了一種基于des和ecc的混合加密體制,給出了算法的實現流程,解決了單獨使用des 、 rsa算法所帶來的密鑰保存不方便和運算速度較慢等問題,有效地提高了系統的安全性能。 |
|
It is n ' t satisfied with the secure requirement of the electronic business in our country . it ' s very significant to design or rebuild the secure transport protocol with our own cryptogram algorithm based on the research of its idea and principle . in this article , the fundamental knowledge of cryptography are introduced first 因此,在國際同行的研究基礎上,盡量吸取和掌握其思想、原理的先進性,結合我國自有密碼算法,設計或者改造相關的安全傳輸協議,將這些協議實現與現有應用系統和操作系統結合起來是十分有意義的工作。 |
|
Stamper and signature is very important in the affair of tradition work in government and enterprise . this article according to the characteristic of traditional signature and stamper , combinic the demands of signature and seal in e - government - affair work information system , inosculates the technology of middleware and e - government - affair security , makes use of object oriented and component technology , integrates correlation knowledge of compositive cryptogram , pki , seal digital image , activex etc , studies and achieves digital e - signature - seal middleware based on web which is used in internet / intranet environment 印章和簽名在傳統的政府辦公和企業事務處理中起著十分重要的作用。本文根據傳統簽名、蓋章的特點,結合電子政務辦公信息系統中的蓋章簽名需求,把電子政務安全技術和中間件技術相融合,利用面向對象和組件技術,集成密碼學、 pki 、印章數字圖像、 activex控件等相關知識,研究并實現了一個應用于internet intranet環境中的基于web的電子簽章中間件。 |
|
The cryptogram - based security infrastructure of designing information management is brought forward . 4 . analyzing the security problems of information access , information transfer and storage of designing information management system . the cryptogram - based information security of information access , information transfer and storage are put forward respectively ( 4 )分析了設計信息管理系統中在信息訪問、信息傳輸以及存儲上的安全問題,分別提出了基于密碼技術設計信息的安全訪問控制、安全傳輸和其安全存儲管理等安全機制。 |
|
Currently , the army is developping military network based oa project with effort among which military email transferring system is an essential application module . this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system , practical condition of current military network and official model as well as document transferring process . it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model , mail exchange protocol and application requirement of cryptogram management 該文針對電子郵件服務系統中存在的安全隱患,基于對目前國內外電子郵件安全技術的分析研究,立足于現有軍事計算機網絡的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合于軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。 |
|
100 prizes : an infantile epistle , dated , small em monday , reading : capital pee papli comma capital aitch how are you note of interrogation capital eye i am very well full stop new paragraph signature with flourishes capital em milly no stop : a cameo brooch , property of ellen bloom born higgins , deceased : 3 typewritten letters , addressee , henry flower , c o p . o . westland row , addresser , martha clifford , c o p . o . dolphin s barn : the transliterated name and address of the addresser of the 3 letters in reserved alphabetic boustrophedontic punctated quadrilinear cryptogram vowels suppressed n . igs . wi . uu 三封打字信,收信人為:亨利弗羅爾,韋斯特蘭橫街郵政局轉交發信人為:瑪莎克利弗德,海豚倉巷郵政局收轉。三信的發信人住址姓名被改寫為字母交互逆綴式附有句號分作四行的密碼元音字母略之如下: nigs wiuuoxwoksmhyim 296英國周刊現代社會297的一張剪報:論女學校中的體罰。一截粉紅色緞帶,這是一八九九年系在一顆復活節彩蛋上的。 |
|
On the other hand the information cryptogram technology and card identification of 1c appl ication system are also introduced . a novel fingerprint image preprocessing method is studied based on the trend of fingerprint veins , and some feature extraction and fingerprint matching methods based on fingerprint minutia based on a novel multi - fitness genetic algorithm ( mfga ) are also studied 在分析了國內外指紋識別理論研究的基礎上,研究了一種基于指紋紋線趨勢的指紋圖象預處理方法并取得了較好的仿真效果;研究了遺傳算法在指紋模式匹配中的應用,針對遺傳算法在模式匹配的局限性,提出了一種多適應度遺傳算法( mfga ) ,并在此基礎上對原遺傳匹配算法做了進一步的改進。 |
|
The traditional means , such as key , password , cryptogram , id card and even ic card , have fallen behind the needs of economic activity and social security . this is because that they would be forgeable , falsifiable , stolen or decodable 傳統的個人身份鑒別手段如鑰匙、口令、密碼、身份證件,甚至ic卡等識別方式,由于它們具有可假冒、可偽造、可盜用、可破譯的弱點,已不能完全滿足現代社會經濟活動和社會安全防范的需要。 |
|
Smart card has this rich cryptogram arithmetic and secure key management and along with its portability , it has won the favor of information security field and becomes widely applied in pki , electronic business and administration 智能卡以其豐富的密碼算法功能和安全的密鑰管理性能,加之靈巧、便攜等優點,贏得了信息安全領域的寵愛,在pki 、電子商務/政務等方面都有著廣泛的應用。 |
|
Then a draft is given . with this draft , the problems of various products of region and the system structure unmatching is resolved , and the security of system is improved by u sing the mix cryptogram 接著文章給出了一種基于lon總線的小區智能卡系統集成方案。該方案解決了小區產品協議多元化和面向各種應用的體系結構不匹配等問題,并使用混合密碼體制提高了系統安全性。 |
|
A efficient structure of beginning of cryptogram is prescribed . program implementation algorithm based on this cryptogram structure is designed as well , compatibility and unification of diversified cryptogram forms in the system is realized 規定了一種有效的密文文件頭結構,并設計了基于這種密文格式的程序實現算法,實現了系統中各種密文格式的兼容性和統一性。 |
|
Considering the compatibility , the system of security environment is designed and realized by corba technology . at present , security environment is composed of cryptogram base system , certificates base system and interface base system 考慮到系統的通用性,作者采用corba技術初步實現了安全平臺的加密算法庫系統、證書管理庫系統利接口庫系統。 |
|
After analyzing the advantages and the disadvantages of dse arithmetic and rsa arithmetic , which are both representatives of the traditional cryptogram systems , put forward a model of network data safety system combined two arithmetic 在分析對稱密碼體制和公開密鑰體制的代表dse和rsa算法的優缺點后,提出將兩種算法結合的網絡數據安全系統的模型。 |
|
A design scheme of cryptogram transmission system based on fpga is presented , which is used to implement the simulation of the quantum transmission channels . furthermore , a circuit of fpga power - on configuration is realized 提出了基于fpga的密碼傳輸系統的設計方案,用于模擬高斯密鑰在量子信道上的傳輸,并完成了fpga上電配置電路的設計。 |
|
In terms of the difference between encryption key and decryption key , it can be divided into symmetry cryptogram and public key cryptogram , and symmetry can be further divided into block cipher and stream cipher 根據加密密鑰和解密密鑰性質上的不同,可以將密碼體制分為對稱密碼和公鑰密碼兩大類,而對稱密碼又包括分組密碼和序列密碼。 |
|
The thesis aims to carry out a study of improving flexibility and efficiency of a server by designing and realizing reconfigurable algorithmic accelerate component ( raac ) in high performance cryptogram server 本文針對如何通過設計和實現高性能密碼服務器中的可配置密碼算法加速部件raac來提高服務器的靈活性和高效性進行了深入的研究。 |
|
Meanwhile , it has not problems such as cryptogram got out or card lost which is present in cryptogram identification and card identification respectively . so it is highly reliable and safe 同時,它不存在諸如密碼、卡片式身份鑒別方式中的密碼泄露或卡片遺失的隱患,具有極高的可靠性與安全性。 |