快好知 kuaihz


data encryption造句
31. By considering data encryption standard algorithm, an improved method of the digital image encryption based on DES is proposed in this paper. 32. The module of data encryption adopts Advantaged Encryption Standerd ( AES ). 33. By comparison with Data Encryption Standard (DES), the concept to design new key generation algorithm of block ciphers was analyzed. 34. In this article, it was adopt symmetric encryption DES (data encryption standard, DES) algorithm, To achieve higher security, we have developed triple DES algorithm, 3-DES is an upgrading of DES. 35. This paper introduces the data encryption standard algorithm briefly, and discusses an IP-CORE design and the FPGA implementation of the algorithm. 36. Proposing a new data encryption algorithm based on multilayer feed forward neural networks. 37. Represents the base class for Triple Data Encryption Standard algorithms from which all. 38. Liberty offers Data Encryption Standard (DES) and Advanced Encryption Standard (AES) encryption with Over-the-air Rekeying (OTAR) and all of the typical features that are available in LMRs today. 39. Data encryption is one of the basic measures for computer system security defence. 40. Network security techniques include the authentication authorization, data encryption, access control, safe audit and so on. 41. The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus. 42. SSL is a protocol that supports authentication and data encryption. 43. This paper presents a scheme of electronic press issuing system, based on the technology of digital water-mark and data encryption. 44. A complete data encryption system must consists of a reliable authentication mechanism and an encryption algorithm. 45. Another popular secret - key cryptosystem is International Data Encryption Algorithm ( IDEA ). 46. Data encryption is one of the key technologies in network security. 47. American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms. 48. The team also used its design to perform a mathematical operation that underlies to the algorithm with which a quantum computer might crack complex data encryption. 49. According to ATA protocol, PHES used hardware encryption method in FPGA to achieve the transparent data encryption and high data throughput rate by pipeline operation. 50. The Enterprise edition adds more security through advanced auditing and transparent data encryption, and data warehousing with ColumnStore, compression, and partitioning. 51. It also includes secure login, data encryption, and biometric authentication support.