Encryption and decryption with PHP.
使用PHP进行加密和解密。
Can be achieved document encryption and decryption.
可以实现文件的加密和解密。
The same key is used for both encryption and decryption.
加密和解密使用相同的密钥。
We are almost to the point of encryption and decryption.
我们几乎是加密和解密问题。
Handlers can manage encryption and decryption, logging and auditing, and so on.
处理程序可以处理加密和解密、日志记录和审计等。
A symmetric key is one key that is used for both encryption and decryption.
对称密钥是加密和解密都使用的一个密钥。
In the end, image encryption and decryption with the new sequence are studied.
最后应用此序列进行了图像加密解密的研究。
Finally a software encryption and decryption method of PE file is put forward.
最后提出了用软件对PE可执行文件的加密解密方法。
The author puts forward a new style net transport encryption and Decryption system.
提出了一种新型的网络传输加解密系统。
Knapsack public-key cryptosystem is characterized by fast encryption and decryption.
背包公钥密码体制具有快速加密和解密的优点。
Used for encryption and decryption code I now further study, we hope to receive help.
用来加密解密的代码我现在正在进一步研究,希望能够得到大家的帮助。
So the problems of embedded system's data soft encryption and decryption are resolved.
解决了一般嵌入式系统数据软加解密的问题。
The pass phrase is used only for client-side encryption and decryption of your browser data.
该短语仅用于客户端的浏览器数据加解密。
You can also use AES_ENCRYPT and AES_DECRYPT functions for encryption and decryption of column data.
还可以使用AES_ENCRYPT和AES_DECRYPT函数对列数据进行加密和解密。
Due to simple system initialization, efficient encryption and decryption, this scheme is easy to realize.
该方案系统初始化简单、加密和解密效率高,便于实现。
This encryption method uses quantum state as the key used for the encryption and decryption of information.
这种加密方法是用量子状态来作为信息加密和解密的密钥。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
The encryption and decryption of these new schemes are much easier and much faster than the famous RSA scheme.
这些公钥体制与著名的RSA公钥体制相比的最大优点是共加密、解密算法简单,实现速度快。
The offline policy controls backup and restore commands, and the encryption and decryption of database backup images.
离线策略控制备份和恢复命令,以及数据库备份映像的加密和解密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
The double random phase real-value encryption and decryption method is proposed for the optical image security system.
提出了一种基于双随机相位的图像实值编码方法,该方法可应用于光学图像加密。
Moreover, the encryption and decryption schemes of the ECC are designed and the security problem of ECC is also considered.
文章还设计了椭圆曲线加密系统的加解密方案,讨论了椭圆曲线系统的安全性问题。
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
Keys are used for digitally signing documents and verifying signatures, and they help with the encryption and decryption processes.
密钥用于数字签署文档和验证签名,也用于加密和解密过程。
A group key distribution scheme utilizing a polynomial expansion is proposed, which features in no traditional encryption and decryption.
提出了一种利用多项式展开的组密钥分配方案,其特点是不使用传统加密和解密。
With the In System Programming technique(ISP), the system reconfiguration, the encryption and decryption for data communication are realized.
采用在系统可编程技术(ISP)实现系统重构和传输数据加密、解密编码。
Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.
XML加密只关于加密和解密结构化信息,而不规定密钥交换的任何特定方法。
Transparent database encryption refers to the encryption and decryption of data in the database, the database access program is completely unaware.
数据库透明加密是指对库内数据的加密和解密,对数据库的访问程序是完全无感知的。
This approach is transparent to the database itself, the database management system can not feel the existence of encryption and decryption process.
这种方式对于数据库自身来说也是透明的,数据库管理系统也感觉不到加密解密过程的存在。
This approach is transparent to the database itself, the database management system can not feel the existence of encryption and decryption process.
这种方式对于数据库自身来说也是透明的,数据库管理系统也感觉不到加密解密过程的存在。
应用推荐