1.
Wireless Group Key Distribution Protocol Based on Homomorphic Encryption Scheme
基于同态加密机制的无线群组密钥分配协议
2.
Research on Techniques Securing Mobile Code Based on Homomorphic Encryption
基于同态加密的移动代码安全技术研究
3.
Research of privacy homomorphism algorithm based on encrypted database
面向数据库加密的秘密同态算法的研究
4.
Meanwhile, the density of state near Fermi level increases with the change from high valence to low valence.
同时,费密能级附近的态密度随着价态变低而逐渐增加。
5.
A secure two-party bargaining protocol based on additive homomorphic public key cryptosystem
基于加同态公钥密码体制的两方安全议价协议
6.
Data that is not enciphered.
没有经加密的数据。同plaintext。
7.
Dynamic Key Encryption and Decryption Algorithm Based on Chaos Theory;
基于混沌理论的动态密钥加解密算法
8.
An Dynamic Key Encryption Algorithm Based on Logistic Map;
基于Logistic映射的动态密钥加密算法
9.
A Scheme of Database Encryption Based on Dynamical Secret
一种基于动态密钥的数据库加密方案
10.
The file was encrypted with a different encryption driver than is currently loaded.
文件加密所使用的加密驱动程序与目前加载的加密驱动程序不同。
11.
In cryptography, an encrypted message.
密码学中一种加过密的报文,同cipher text。
12.
Symmetric encryption requires the same key for Both encryption and decryption.
传统的对称加密要求加密与解密使用同样的密钥。
13.
In the symmetrical cryptosystem, it's encryp tion's key co de and deciphers' key code is the same.
在对称密码体制中,其加密密钥和解密密钥是相同的。
14.
Design and Implementation of Encrypted Solid State Disk Integrated with Hardware Encryption
集成硬件加密的加密固态盘的设计与实现
15.
Research of Privacy Homomorphism Based on Manipulation of Encrypted Database Information;
基于密态数据库操作的秘密同态算法研究
16.
"From this day onward the two of them became inseparable, going to school and leaving it together. "
"自此以后,他二人同来同往,同坐同起,愈加亲密."
17.
The private key system is also called the single key system, in which the encryption process is the same as the decryption process.
私钥体制又称单钥体制,其加密密钥和解密密钥相同;
18.
The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy.
这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。