英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Different from all other current file encryption systems which are also based on DES, our Enhanced File Encryption System is following X9.17 key generation standard to ensure the strength of the primary key, utilizing Cipher Block Chaining mechanism to hold the text structure, and introducing cache technique and Bit / Byte mapping algorithm to enhance the efficiency while reducing the complexity of the system.

与当前许多基于 DES 的文件加密系统不同,我们的增强型文件加密系统采用 X9.17密钥生成规范确保用户主密钥的强度,采用密文分组链接方式保护密文的结构信息,并且通过缓存技术和位/字节映射算法提高系统的执行效率、降低系统的复杂度。

In addition, algorithms used in PBE were discussed in details, including International Data Encryption Algorithm, Advanced Encryption Standard of U.S., safe Hash function named SHA-1, Pseudo Random Number Generator.The modes of operation in blok cipher,such as Electronic Code Book, Cipher Block Chaining, Cipfertext Feedback and Output Feedback,are described in the thesis.

采用DSP TMS320C5409汇编语言编制了以上各种算法,在DSP上实现了一个口令加密系统,数据加密速度达到3Mb/s以上,并实现密钥的安全管理,能满足个人PC机脱离主CPU加密大量数据的需要。

It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption.

它可以在3个层次上,使用448位Blowfish加密,具有模糊性的高级加密。

A code for encryption, AES, BLUEFISH a very wide variety of encryption algorithms.

一个加密库代码,有AES,BLUEFISH的很多种加密算法。

Proposed own through oneself to the encryption algorithm study research regarding the encryption algorithm improvement thought:Along with the rapid development of computer technology, Even using the exhaustive methods to pay only a smaller price can be completed within a few days break request.

加密算法的实际应用:利用汇编语言实现DES加密、DES算法的VLSI实现、FPGA上的DES算法实现。

A group of researchers in Princeton University have managed to prove and demonstrate that disk encryption mechanism used by BitLocker of Windows Vista; FileVault of MacOS X; dm-crypt of Linux, TrueCrypt and possibly other secure encryption software, can be cracked, hacked and defeated by imaging state of physical memory which still carry and retain traces of code bits, in what hackers called cold boot attack by dumping all data in memory to disk.

一组研究人员在美国普林斯顿大学已成功地证明,表明磁盘加密机制,利用BitLocker的Windows Vista的; FileVault的MacOS下;德国马克,隐窝的Linux , TrueCrypt ,可能还有其他安全的加密软件,可以被破解,黑客入侵并打败由成像状态的物理内存,其中仍保留痕迹的代码位,在什么所谓的黑客攻击冷启动倾倒所有的数据在内存到磁盘。

It is clearly advantage that if someone tries to see the plain file, he must try on the all encryption combinations in all encryption methods, strictly speaking, it is a kind of compositor.

如果技术上允许多重叠加的话,可以尝试用更多的加密方法来进行叠加,以达到增加数据对象的安全级别。

The continue thing is that the data thief needs to try on all combination and compositor of encryption under knowing the encryption method.

但是,为了数据对象的安全性更高些,还是建议多采用不止一种加密方法的组合叠加。

Using the technologies of DNA synthesis, DNA clone, PCR and DNA chip and the theory of computational complexity, an encryption scheme is formed. In the scheme, encryption is to confect a specially designed DNA mixture and decryption is the hybridization of DNA sequances on a DNA chip.

利用DNA合成技术、DNA克隆技术、PCR扩增技术以及DNA芯片技术,结合密码学的计算复杂度理论,提出了一种基于DNA技术的加密方法。

Database encryption engine is the core of database encryption system.

0引言管理信息系统中的大量数据一般都是存放在数据库中的。

第3/60页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。