| 1. | Her work on internet cryptograms helped disrupt 她关于互联网加解密的工作帮助了
 
  | 
 | 2. | Structure of cryptogram is deeply investigated in this theme 对密文文件格式作了深入研究。 
 
  | 
 | 3. | Implementation of trusted computing in commercial cryptogram based on hardware 基于硬件系统的商用密码可信计算实现方法
 
  | 
 | 4. | Cryptogram residue class 密报剩余类
 
  | 
 | 5. | The security program builds largely upon sound cryptogram arithmetic and secure key management 密码算法的安全性很大程度上依赖于密钥的安全性。 
 
  | 
 | 6. | Cryptogram programming of confidential information is an effective tool for ensuring information security 机密信息的密码化是保证信息安全的一种有效手段。 
 
  | 
 | 7. | Collection of puzzles , brain teasers , mind benders , logic problems , cryptograms , patterns , and enigmas - 21cn提供的在线游戏,有脑力动作射击休闲搞笑棋牌等类别。 
 
  | 
 | 8. | Chapter 3 , introduces the cryptogram technology which the e - signature stamper system will use 其中,数字签名技术尤为重要,它是提供信息完整性、机密性、不可抵赖性的基础。 
 
  | 
 | 9. | High performance cryptogram server provides a safe , highly effective platform of cryptogram programming of information 高性能密码服务器提供了一个安全、高效的信息密码化平台。 
 
  | 
 | 10. | Meanwhile , ideas in research toward standardization of cryptogram form is provided to information security researching staff of inland and overseas 也为国内外信息安全工作者对密文格式标准化研究提供了思路。 
 
  |