1.
H.264 Video Controllable Encryption Research Based on DCT Domain

H.264中基于DCT域的视频可控加密研究
2.
No encryption key is available. A well-known encryption key was returned.

没有可用的加密密钥。返回了一个已知加密密钥。
3.
The rapier loom is one kind of important loom type.

基于传统剑杆织机增加可视化人机界面和提高系统控制的精密度。
4.
Feasibility and Accuracy Analysis of RTK Technique in Encryption Short-side Survey of City Control
RTK技术加密城市短边控制网的精确性和可行性分析
5.
By precisely controlling the rates of cooling and heating, ice crystal morphology can be intimately controlled and investigated.
通过合适的制冷和加热速率的控制,研究人员可以密切观察和控制冰晶体的形态。
6.
Study on Provable Security of Public-Key and Hybrid Encryptions;

公钥加密与混合加密的可证明安全性研究
7.
It is kind of natural green health fruit.

金桔既可鲜食又可加工成密饯、脯。
8.
Research on Chaotic Image Encryption Technology Based on Control Word;

基于控制字的混沌图像加密技术研究
9.
Design of SATA Hard Disk Encryption/decryption Controller based on FPGA

基于FPGA的SATA硬盘加解密控制器设计
10.
Design of portable hard-disk encryption based on MEMS stronglink controlled by FPGA

FPGA控制MEMS强链的移动硬盘加密设计
11.
Design of File's Encryption and Decryption Program Controlled by Character's Place Value

利用字符位值控制密钥的文件加密解密程序的设计
12.
Store password using reversible encryption for all users in the domain

为域中所有用户使用可还原的加密来储存密码
13.
An order-preserving encryption method operating the encrypted data directly

一种可直接对密文操作的保序加密方法
14.
FPGA implementation of DES encryption arithmetic with dynamic key management

一种密钥可配置的DES加密算法的FPGA实现
15.
IBE Model for Inter-domain Communications with Key Escrow under Control

密钥托管可控的跨域通信IBE模型
16.
Controllable quantum secret sharing scheme on three-party entangled state

三态纠缠的可控的量子秘密共享协议
17.
The cryptographic providers you can use for your certificate are listed below.

下表是证书可以使用的加密提供程序。
18.
A normal proxy can tunnel encrypted data, but it cannot cache it.

正常可以。。加密数据,但不能缓存它。