1、

The security technologies, such as firewall, intrusion detection and data encryption have been developed to prevent unauthorized user from stealing, faking and destroying data.

为防止非法用户利用网络系统的缺陷进行数据的窃取、伪造和破坏,人们发展了防火墙、入侵检测、数据加密等安全技术。

互联网摘选

2、

The security architecture and security features in 3G mobile communications system are introduced, and its network access security mechanisms including indentification by user identities, authentication and key agreement, access link data integrity protection and data encryption are discussed.

介绍了第三代移动通信系统中的安全结构以及其中定义的安全特征,讨论了其安全接入机制,包括用户标识鉴别、认证与密钥协商以及通信过程中数据完整性保护和数据加密方法。

互联网摘选

3、

The Encryption Techniques of MD5 about User Accounts in ASP Web

ASP网站用户帐号的MD5加密技术

互联网摘选

4、

The encrypted file system provides safe user authentication, file encryption and decryption, file integrity check, and file management based on directory.

加密文件系统提供安全的身份认证,文件加密与解密,文件的完整性校验,以及基于目录的文件管理功能。

互联网摘选

5、

RSA encryption algorithm is a non-symmetric encryption algorithm, in this system for user login and encryption and decryption portal system and application systems to interact.

RSA加密算法是一种非对称加密算法,在本系统中用于用户登录信息加密、解密以及门户系统和应用系统的交互。

互联网摘选

6、

Under the open standard connection of CA, the disturbing program with the multilayered encryption mechanism, uses the symmetrical and the asymmetrical encryption algorithm, while it products the authorized user news and management news.

通过节目加扰和多层加密机制,在CA开放的标准接口下,采用对称和非对称加密算法,完成用户的授权消息和用户管理消息的生成。

互联网摘选

7、

VPN consists of three parts: the tunnel, the data encryption technology and user authentication.

VPN由三个部分组成: 隧道技术, 数据加密和用户认证.

互联网摘选

8、

Based on COM design thought, the key COM of network teaching systems has been created and brought about. All of these COM involve user request management, information encryption and load-balancing process. Heilongjiang university network teaching system has been developed on this foundation.

基于组件化设计思想,设计并实现网络教学系统中的关键性组件,涉及到用户信息处理、信息加密、多视频负载均衡处理,并在此基础上开发黑龙江大学网络教学系统。

互联网摘选

9、

The direct file encryption system is realized based on OPENSSL including three major modules: user interface module, interface module, base encryption module.

直接文件加密系统是基于OPENSSL实现的,也有三大模块:用户界面模块、接口模块、底层模块。

互联网摘选

10、

File encryption and decryption key is updated dynamically, alternating convergence of old and new key is valid, just download the key material, key updates without user involvement.

文件加解密密钥动态更新,新老密钥有效交替衔接,只需用户下载密钥材料,密钥更新不必用户参与。

互联网摘选

11、

With the ground of information encryption technology, this paper analyzes network security architecture and makes deep research on user authentication on network application layer, especially on OTP ( One-Time Password).

本论文从网络安全体系结构分析入手,以信息加密技术为基础,对网络应用层的身份认证技术,特别是一次性口令认证(OTP)技术进行了深入研究。

互联网摘选

12、

When the users apply for the license, the system uses digital signatures, content Hash value verification, encryption key storage, user certificates, the binding of licenses and terminal equipment and other security technology to ensure the process of license download and use security.

用户申请许可证下载时,使用数字签名,内容Hash值验证,密钥加密存储,用户证书,许可证与终端设备绑定等多种安全技术,保证许可证下载和使用过程中的安全性。

互联网摘选

13、

The technology of component is used in many modules development, such as the encryption component for user password about system security, the file-uploading component, e-mail component, etc.

◆组件技术;在系统很多模块的开发中应用到了ASP的组件技术,如系统安全有关的用户密码加密组件、文件上传组件、电子邮件组件等。

互联网摘选

  • 今日热词
  • 热门搜索

纳米英语英语词典(dict.nm3.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈