英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

As to the procedure of obtaining evidence, the writer points out some procedures which are illegal and will result in the invalid of E-mail; as to the authenticity, several methods to identify were concluded and their advantages and disadvantages are also listed. In addition, the writer points out that the laws in force on the authenticity of E-mail were very macroscopic and vague. And there are not concrete laws in effect to identify the authenticity of E-mail without electronic signature and encryption. So the writer explains his views that each links of E-mail's lifecycle should be deeply analyzed and checked to exclude the possibilities of unauthenticity of E-mail.

就取证程序方面,该部分则指出了哪些取证程序是违反法律并可能会导致电子邮件无效;就电子邮件真实性的问题,本文主要从现有立法归纳出几种认定电子邮件真实性的具体方式,并阐述了这些方式的利弊,同时笔者还在该部分指出,现行法律对于电子邮件真实性问题的认识,仍仅停留在宏观层面,显得过于宽泛,尤其是针对未经签署电子签名和加密的电子邮件真实性的认定问题,现行法律没有进行具体规范。

The program uses unbreakable 256-bit AES encryption to provide you with peace of mind that your data is safe.

该软件使用牢不可破的256位AES 加密技术对你进行保护,让你放心数据的安全性。

If this sounds a bit complicated it does look a bit that way but also think of how complicated bit torrent is getting with seed box and protocol encryption, etc. Also with URD it is possible to create and download an NZB file from specified articles as well.

如果这听起来有些复杂,它看上去有点这样,而且多么复杂察看所有电影想与种子框和协议加密等,同时可以与用户要求文件就可以创建和下载从指定的文章,以及NZB文件。

Some of the encryption module, vector, key terms, arguments have done a brief introduction

对加密中的一些模块、矢量、密钥计算、变元做了简要的介绍

To solve this problem, an authenticated encryption schemes with public verifiability was proposed by Huang and Chang.

为解决该问题,HUANG和CHANG最近提出了一个可公开验证的认证加密方案。

To overcome this problem, Ma-Chen proposed an efficient authenticated encryption scheme with public verifiability.

为了解决此问题,Ma-Chen提出了一个有效的公开验证认证加密方案。

Furthermore, a model of authenticated encryption with public verifiability is presented by using generalized ElGamal type signatures.

根据新提出的认证加密方案,利用广义EIGamal类签名,给出了一类公开可验证的认证加密方案模型。

Animproved authenticated encryption scheme with public verifiability is proposed.

对一个消息可恢复式签名方案的安全性进行了分析,成功给出了两类伪造攻击。

Based on the DSP hardware, a novel encryption algorithm is designed, which can penetrate through RPE-LTP vocoder in GSM voice channel.

作品基于竞赛提供的DSP开发板,设计了一套新型抗RPE-LTP压缩编码的加解密算法。

Trunking communication in the field of mobile communication was an integral part, and voice encryption was its core technology.

语音加密是公网集群通信最核心的技术。

第39/60页 首页 < ... 35 36 37 38 39 40 41 42 43 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。