Encryption and decryption with PHP.
使用PHP进行加密和解密。
Can be achieved document encryption and decryption.
可以实现文件的加密和解密。
Handlers can manage encryption and decryption, logging and auditing, and so on.
处理程序可以处理加密和解密、日志记录和审计等。
Knapsack public-key cryptosystem is characterized by fast encryption and decryption.
背包公钥密码体制具有快速加密和解密的优点。
So the problems of embedded system's data soft encryption and decryption are resolved.
解决了一般嵌入式系统数据软加解密的问题。
The pass phrase is used only for client-side encryption and decryption of your browser data.
该短语仅用于客户端的浏览器数据加解密。
This encryption method uses quantum state as the key used for the encryption and decryption of information.
这种加密方法是用量子状态来作为信息加密和解密的密钥。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
The encryption and decryption of these new schemes are much easier and much faster than the famous RSA scheme.
这些公钥体制与著名的RSA公钥体制相比的最大优点是共加密、解密算法简单,实现速度快。
The offline policy controls backup and restore commands, and the encryption and decryption of database backup images.
离线策略控制备份和恢复命令,以及数据库备份映像的加密和解密。
A new technique of optical image encryption and decryption based on the methodology of virtual optics is proposed.
在虚拟光学数据加密理论模型的基础上,提出了一种光学图像加密的可视化密码构造算法。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
The double random phase real-value encryption and decryption method is proposed for the optical image security system.
提出了一种基于双随机相位的图像实值编码方法,该方法可应用于光学图像加密。
Moreover, the encryption and decryption schemes of the ECC are designed and the security problem of ECC is also considered.
文章还设计了椭圆曲线加密系统的加解密方案,讨论了椭圆曲线系统的安全性问题。
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
Keys are used for digitally signing documents and verifying signatures, and they help with the encryption and decryption processes.
密钥用于数字签署文档和验证签名,也用于加密和解密过程。
Post Encryption And Decryption is an plugin designed to help you quickly encrypt or decrypt all posts of specific category or tag.
该插件可以帮助您快速加密解密某个分类或某个标签下的所有的文章。
A group key distribution scheme utilizing a polynomial expansion is proposed, which features in no traditional encryption and decryption.
提出了一种利用多项式展开的组密钥分配方案,其特点是不使用传统加密和解密。
For encryption and decryption of messages, both a public key and a private key are required. You must supply a password for the private key.
要加密和解密消息,需要公钥和私钥。您必须为私钥提供一个密码。
With the In System Programming technique(ISP), the system reconfiguration, the encryption and decryption for data communication are realized.
采用在系统可编程技术(ISP)实现系统重构和传输数据加密、解密编码。
Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.
XML加密只关于加密和解密结构化信息,而不规定密钥交换的任何特定方法。
Transparent database encryption refers to the encryption and decryption of data in the database, the database access program is completely unaware.
数据库透明加密是指对库内数据的加密和解密,对数据库的访问程序是完全无感知的。
This approach is transparent to the database itself, the database management system can not feel the existence of encryption and decryption process.
这种方式对于数据库自身来说也是透明的,数据库管理系统也感觉不到加密解密过程的存在。
You can use the encryption and decryption built-in functions encrypt, DECRYPT_BIN, DECRYPT_CHAR, and GETHINT to encrypt your data within database tables.
可以使用内置的加密和解密函数encrypt、DECRYPT _ BIN、DECRYPT_CHAR和GETHINT加密数据库表中的数据。
The system can operate any part of the XML documents, and perform encryption and decryption, digital signature, authorization in arbitrary sequences.
该系统能够为基于XML文档中的任意粒度数据信息提供任意次序的加密解密、数字签名、授权认证等相关操作。
If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.
如果在加密和解密操作中成功地使用了密钥对,那么必定在操作的某个部分使用了密钥对中的私钥。
By use of the TTP, digital signature, encryption and decryption technologies, the system guaranteed the security and reliability of thee-business trade.
该系统借助可信第三方技术、数字签名和加密等技术,确保电子交易的安全性和可靠性。
A quick and safe encryption arithmetic of symmetry is proposed, which has the same arithmetic in encryption and decryption without arithmetic logical operation.
给出了一种加密速度快,安全性高,加密算法和解密算法相同,且不需进行算术逻辑运算等特点的对称加密算法。
A quick and safe encryption arithmetic of symmetry is proposed, which has the same arithmetic in encryption and decryption without arithmetic logical operation.
给出了一种加密速度快,安全性高,加密算法和解密算法相同,且不需进行算术逻辑运算等特点的对称加密算法。
应用推荐