Her work on internet cryptograms helped disrupt 她关于互联网加解密的工作帮助了
Structure of cryptogram is deeply investigated in this theme 对密文文件格式作了深入研究。
Implementation of trusted computing in commercial cryptogram based on hardware 基于硬件系统的商用密码可信计算实现方法
Cryptogram residue class 密报剩余类
The security program builds largely upon sound cryptogram arithmetic and secure key management 密码算法的安全性很大程度上依赖于密钥的安全性。
Cryptogram programming of confidential information is an effective tool for ensuring information security 机密信息的密码化是保证信息安全的一种有效手段。
Collection of puzzles , brain teasers , mind benders , logic problems , cryptograms , patterns , and enigmas - 21cn提供的在线游戏,有脑力动作射击休闲搞笑棋牌等类别。
Chapter 3 , introduces the cryptogram technology which the e - signature stamper system will use 其中,数字签名技术尤为重要,它是提供信息完整性、机密性、不可抵赖性的基础。
High performance cryptogram server provides a safe , highly effective platform of cryptogram programming of information 高性能密码服务器提供了一个安全、高效的信息密码化平台。
Meanwhile , ideas in research toward standardization of cryptogram form is provided to information security researching staff of inland and overseas 也为国内外信息安全工作者对密文格式标准化研究提供了思路。
A cryptogram is a type of puzzle that consists of a short piece of encrypted text. Generally the cipher used to encrypt the text is simple enough that cryptogram can be solved by hand.