encipher vt.把(電文)譯成密碼。
vt. 把(電文)譯成密碼。 “encipher only“ 中文翻譯: 僅加密“encipher, encipter“ 中文翻譯: 加密,密碼“enciondo“ 中文翻譯: 恩西翁多“encioiu“ 中文翻譯: 恩喬尤“enciphered data“ 中文翻譯: 編碼資料; 加密數據“encio“ 中文翻譯: 恩西奧“enciphered facsimile communication“ 中文翻譯: 加密傳真通信; 密碼傳真通信設備“encinoso“ 中文翻譯: 恩西諾索“enciphered facsimile communications“ 中文翻譯: 加密傳真通信; 密碼傳真通信設備“encino man“ 中文翻譯: 沉睡野人
encircle |
|
You can choose different encipher algorithms according to requirement . aes is a symmetric block cipher that can process data blocks of 128 bits , using cipher keys with lengths of 128 , 192and 256 bits . because the length of block and key has been expanded , security has been enhanced Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加密算法,消息分組為128bit ,有三種密鑰長度128bit 、 192bit 、 256bit ,由于分組長度和密鑰長度加長使得安全性大大的提高,它有望成為21世紀的加密標準。 |
|
For the anticounterfeiting of printings ( such as certificate ) , the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy . basing in the double - random - phase transform , this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties . the major job are : ( 1 ) . basing in the ascii codes , numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure . later , using amplitude - based double - random - phase transform , the enciphered gray scale figure is formed . by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ) , we get the result that the gray scale figure with little miscoding rate ( 0 . 0026 ) by “ matrix expanding way ” 本文主要開展了以下三項研究工作: ( 1 ) .用自定義編碼方案,將數字和字母( ascii碼)轉換成二值條碼圖;對該圖形進行振幅型雙隨機相位加密變換,得到原信息的加密灰度圖;通過4f光學系統計算機模擬和打印-掃描實驗,證明本文提出的“矩陣擴展法”灰度圖具有較小的誤碼率,對于20次打印-掃描實驗,誤碼率不大于0 . 0026 。 |
|
The watermark algovithm can resist the physical transfer of printing and scanning by applying techniques such as fixation normalization mutually which can secure the embedding position , chaotic encipher encryption , multipassage embedding and so on . what ’ s more , the watermark designed in this essay is binary image . it can bear a large amount of information 本文綜合運用了歸一化相關確定嵌入位置、混沌加密、多通道嵌入等技術,使得本文所設計的水印算法能夠抵抗印刷和掃描的物理轉換過程,同時本文所采用的水印是二值圖像,能夠承載大量的信息。 |
|
At last this module is synthesized using 6s06dpdm technology library . 3 , the algorithm used in key module to the performance of data security is thoroughly analyzed . considering both performance of enciphering and degree of complexity of realization , steam cipher algorithm is used 3 、對數據通信安全性起決定作用的加密模塊所采用的加密算法進行了深入的分析,綜合加密性能和實現的復雜度的考慮,采用了流密碼的加密算法。 |
|
Abstract : fingerprint technology is an important part of computer software encipher , this paper presents the principles and methods to make and discriminate the laser hole fingerprint , the weak region fingerprint and the short sector fingerprint 文摘:指紋技術是計算機加密技術的一個重要組成部分,文中詳細論述了激光孔指紋、弱位法指紋及短扇區指紋的原理、制作與識別的方法。 |
|
In sna products , a key used to encipher operational keys that are to is used at a node 在系統網絡體系結構( sna )產品中,對將要在某個網點上使用的操作鍵標進行加密的一種鍵(也稱鍵標,也就是密鑰) 。 |
|
When customer sent forms to the platform , the message was transmitted with ssl encipher 在客戶向平臺傳送表單的時候,用ssl進行加密傳送。 |