Encryption Control

[ɪnˈkrɪpʃ(ə)n kənˈtrəʊl]
  • 网络

    加密控制

数据更新时间:2025-11-14 12:14:27
1、

In this system, we have designed the safety architecture of link layer in Ethernet, implemented and transferred security protocol defined by us. Moreover, we have finished the interface to link layer and circuit for encryption and control.

该系统已经完成了以太网的链路层安全体系的设计、自定义的安全协议以及相关的协议数据传输、链路层的安全数据的传送接口、以及相关的加解密和控制电路。

互联网摘选

2、

Design and Implementation of XML Data Encryption with Encryption Process Control Language

基于加密过程控制语言的XML数据加密方案

互联网摘选

3、

Intrusion detection system is a new generation of security technology after data encryption, access control, firewall and other traditional security technologies. As a kind of active and dynamic safe technology, intrusion detection system has recently been researching hot.

入侵检测系统是继数据加密、访问控制和防火墙等传统安全保护措施之后的新一代安全保障技术,作为一种积极主动的动态防护技术已成为近年来的研究热点。

互联网摘选

4、

Net platform provided by Microsoft Corps, the method based on XML of data expression and data transmission. At the same time the encryption control is added to the transmission process.

Net开发平台,完全基于XML的数据表达和数据传输方式,同时在传输过程中加入了数据加密控制等安全措施。

互联网摘选

5、

Cupboard door and openings pre encryption, consider control cabinet seals send out the heat than parts allow temperature, inside ark adopts mechanical.

柜门及开口预加密封条,考虑控制柜内散发出的热量超过部件允许温度,柜内采用机械。

互联网摘选

6、

Traditional network security technologies are data encryption, access control, firewall and intrusion detection system, but these methods have some disadvantages.

传统的计算机网络安全方案主要有数据加密、访问控制、防火墙和入侵检测系统等,上述方法都存在着一些不足之处。

互联网摘选

7、

Design of An Encryption Lock for Control Software Operation

一种控制软件运行权限的智能加密锁设计

互联网摘选

8、

The Multilayered Encryption System in Digital Control Access

数字条件接收的多层密钥系统

互联网摘选

9、

Original security methods, such as encryption, access control and firewall, cannot satisfy the needs nowadays.

原有的安全保障措施,诸如:信息加密、授权访问和防火墙等已经无法满足实际需要。

互联网摘选

10、

The experimental results show that the identity authentication which integrated iris identify with the secret key encryption technique can effectively control the resource access on WWW in security and can effectively reduce the probability which being attacked.

实际测试的结果表明,虹膜识别与网页结合的身份认证,能够达到控制网站上资源存取的目的,较大程度地减小了攻击者破解的可能性。

互联网摘选

11、

This paper introduces the physical security of the computer network, network security standard architecture, and analyzes computer networks security based on architecture, including encryption, access control, firewall, computer virus and intrusion detection system.

论文介绍了计算机网络的物理安全、网络安全标准体系,从密码技术、访问控制、防火墙、计算机病毒及入侵检测等多个方面进行了基于体系结构的网络安全分析。

互联网摘选

12、

Encryption U disk generally take the authorization management, access control and data encryption and decryption system to achieve overall U disk data encryption and password control open the safe zone data.

加密U盘一般是采取授权管理、访问控制数据加解密系统,来实现对U盘内数据的全盘加密和开启安全区数据的口令控制。

互联网摘选

13、

A Software Encryption Method for Fire Control Systems

火控系统软件加密方法初探

互联网摘选

14、

Computer security technology includes mainly: Authentication, Encryption, Access Control, Auditing and so on.

计算机网络安全技术主要有:认证授权、数据加密、访问控制、安全审计等。

互联网摘选

15、
16、

Chaotic encryption and error propagation control based video watermarking for AVS in compressed domain

基于混沌加密和误差扩散控制的AVS压缩域视频水印

互联网摘选

17、

In this paper, many technology scheme on XML signature, XML encryption and XML access control are studied.

本文研究了基于XML的加密、数字签名和XML的访问控制等安全技术方案;

互联网摘选

18、

Encryption and authentication technique is an effective method to ensure storage security, which can be used to realize the storage encryption and access control of electronic documents.

加密和身份认证是保证存储安全的有效手段,实现电子文档的加密存储和访问控制。

互联网摘选

19、

Accordingly, traditional security mechanisms, such as encryption and access control, can be used to provide authorization and authentication& solving the issue of trust on identity.

传统的安全机制有加密技术、访问控制等等,它们被用来提供授权和认证,解决了身份信任的问题。

互联网摘选

20、

A chaotic image encryption method based on control word is designed to improve the chaotic perturbation model and solve the finite precision problem in chaotic encryption.

论文设计了基于控制字的混沌图像加密方法,完善了混沌扰动模型,更好地解决了混沌加密有限精度问题。

互联网摘选

  • 相关词组
  • 今日热词
  • 热门搜索
  • ounce[aʊns] n.盎司;<口>少量,一点儿;雪豹;
  • kfc[ˌkeɪ ef ˈsɪ] abbr.Kentucky fried chicken 肯德基;肯德基;肯德基快餐店
  • hust n.华中科技大学(Huazhong University of Science and Technology);华中科大(HUAZHONG UNIV SCI TECHNOL);武汉华中科技大学
  • chopsticks['tʃɒpstɪks] n.筷子;筷子( chopstick的名词复数 );
  • Yp abbr.Yersinia pseudotuberculosis 假结核耶尔森菌;
  • army[ˈɑ:mi] n.军队;陆军;团体;野战军;
  • concern[kənˈsɜːn] n.担心;令人担心的事;关心(的事);分内之事;公司;v.影响;涉及;使担忧;关心;对…感兴趣;认为…重要;
  • poi[pɔɪ] n.波伊;淀粉糊(浆)
  • must[mʌst , məst] modal. 必须;一定;应该;一定要;n.必须做的事;
  • tease[tiːz] vt.取笑,戏弄;挑逗;强要;vi.梳理(羊毛等);起绒;
  • bookshelf[ˈbʊkʃelf] n.书架;书橱;
  • HBS abbr.Harvard Business School 哈佛大学商学院;

纳米英语英语词典(dict.nm3.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈