| 1. | Her work on internet cryptograms helped disrupt 她关于互联网加解密的工作帮助了 |
| 2. | Structure of cryptogram is deeply investigated in this theme 对密文文件格式作了深入研究。 |
| 3. | Implementation of trusted computing in commercial cryptogram based on hardware 基于硬件系统的商用密码可信计算实现方法 |
| 4. | Cryptogram residue class 密报剩余类 |
| 5. | The security program builds largely upon sound cryptogram arithmetic and secure key management 密码算法的安全性很大程度上依赖于密钥的安全性。 |
| 6. | Cryptogram programming of confidential information is an effective tool for ensuring information security 机密信息的密码化是保证信息安全的一种有效手段。 |
| 7. | Collection of puzzles , brain teasers , mind benders , logic problems , cryptograms , patterns , and enigmas - 21cn提供的在线游戏,有脑力动作射击休闲搞笑棋牌等类别。 |
| 8. | Chapter 3 , introduces the cryptogram technology which the e - signature stamper system will use 其中,数字签名技术尤为重要,它是提供信息完整性、机密性、不可抵赖性的基础。 |
| 9. | High performance cryptogram server provides a safe , highly effective platform of cryptogram programming of information 高性能密码服务器提供了一个安全、高效的信息密码化平台。 |
| 10. | Meanwhile , ideas in research toward standardization of cryptogram form is provided to information security researching staff of inland and overseas 也为国内外信息安全工作者对密文格式标准化研究提供了思路。 |