1. The Server access DBMS on behalf of Application and sends back the results in cryptograph.
服务器接收请求后执行对数据库的真正访问,然后把访问结果加密后返回给客户端。
来自互联网
2. Modern cryptograph can be divided into symmetrical key system and dissymmetrical key system.
密码体制大体分为对称密码和非对称密码两种。
来自互联网
3. This approach provides a set of inference rules for reduction and analysis of signature and cryptograph.
新方法中的推导规则既简单便捷同时又具有分析签名和分析密文的能力。
来自互联网
4. Its key idea of this project is to balance the transmitting efficiency and the transmitting cryptograph.
这种方案的核心思想是在传输效率和传输保密性上取得更加实用性的平衡。
来自互联网
5. Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information.
同时,传统的加密技术所得到的密文容易被攻击者发现,影响了信息的安全性。
来自互联网
6. It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.
利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
来自互联网
7. Quantum cryptograph has extraordinary adaptability to the optical communication and unconditional security which classical cryptography has been striving for.
量子密钥分配特别适合光通信环境,而且可以实现无条件安全性。
来自互联网
8. Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.
9. Corresponding to public key cryptographic algorithm, it can save energy consumption because the receiver can aggregate cryptograph directly instead of obtaining explicit terms.
相对公钥密码算法,接收方可以在不知道明文的情况下,直接对密文执行融合,节省了因解密带来的能量消耗。
来自互联网
10. Corresponding to public key cryptographic algorithm, it can save energy consumption because the receiver can aggregate cryptograph directly instead of obtaining explicit terms.