英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Finally, the way of the optical image encryption with chaotic sequence based on joint transform correlator is proposed.

最后,本文提出了利用混沌序列相位对图象在联合变换相关器中进行加解密的方法并作了计算机模拟分析。

The traditional optical encryption methods are classified into two kinds, one is based on the joint transform correlator, the second is based on the matched filter.

传统的光学加密方法分为两类,一种是基于联合变换相关器的加密方法,第二种是基于

Some novel methods and techniques of optical image encryption based on joint transform correlator were put forward ,and simulation results were demonstrated.

提出了几种基于联合变换相关器的光学图像加密方法,并进行了计算机仿真与验证,对这些方法进行了分析比较研究。

Firstly, this paper puts forward an improved authentication and key distribution scheme for internet environment, in which we adhibit multilevel authentication center, encryption technology of DES, RSA and one-way function to actualize the safety of communication among the different user on network and reduces the workload of the authentication institution; at the same time, this scheme can also assure the security of network. Besides, it use the temporary symbol and the responds" sign of both-side correspondent to replace time stamp and applies them to internet communication to countercheck "rebroadcast attack and accordingly resolves the problem that it needs synchronization for network clock.

本文在首先提出一种改进的Internet网络环境下的认证及密钥分配方案,该方案考虑采用了多级认证中心,DES、RSA和单向函数加密机制,实现了网络上不同用户间的安全通信,降低了网上认证机构的工作量,同时也能够保证网络的安全性;并用通信双方的临时标志和响应者标识来代替时间戳应用于Internet通信中以防止"重播"攻击,从而解决了以往需要网络时钟同步这一难题。

Encryption wins because it is the necessary counterforce to the Net's runaway tendency to link.

加密技术之所以会成为赢家,是因为它是对网络失控的连接倾向的必要的反作用力。

To address the latter issue, security analyst Bruce Schneier, chief technologist for BT Counterpane , uses whole-disk encryption on his laptop and then a second layer: He encrypts individual files on the machine separately, with a different password.

BT Counterpane 首席技术专家,布鲁斯 Schneier 安全分析师为了解决后面的问题,在他的笔记本电脑上进行整盘加密,然后进行第二个层次:他在机器上分别用不同的密码加密个人文件。

Password encryption algorithm is the antithesis of cryptanalysis, that is, deciphering the technical studies.

密码加密算法的对立面就是密码分析,也就是破译技术研究。

Cryptanalysis and encryption system are related to national security and financialsecurity.

密码分析和密码设计是信息安全领域最重要的组成部分,它的发展关系到国家安全、经济安全和金融安全等多个方面。

We show that unless a cryptanalyst can completely break the RSA encryption ,any heuristic oracle he uses to determine the least significant bit of the cleartext must have an error probability greater than 1/2-ε.

证明了,对于任意用于确定RSA明文的最后一个有效位的启示,必须有大于1/2-ε的出错概率,否则密码分析人员能够完全破译RSA。

In principle, the methods of modern cryptogram system are suitable for the digital image encryption.

数字图像置乱加密技术及其效果分析:置乱加密是数字图像加密技术中的热点问题。

第13/60页 首页 < ... 9 10 11 12 13 14 15 16 17 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。