英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

The quality of decrypting watermark under the different sizes of encryption keys has been discussed. The simulation results prove the theoretical analysis.

计算和分析了二元位相密钥的空间分布对水印信息提取质量的影响,计算结果验证了理论的正确性。

In this paper we study the problem of database encryption keys at the field level. We give four methods for generating field keys and show that they are all superior to Denning's methods.

本文研究字段一级的数据库加密的密钥问题,我们给出四种字段密钥产生方法,并说明它们都优于Denning的方法。

In order to avoid trade disavowing and guarantee square deal in e-business, the impartial e-business technical system based on Trusted Third Part was put forward., By use of the TTP, digital signature, encryption and decryption technologies,the system guaranteed the security and reliability of the -e-business trade.

在电子商务中,为了防止交易抵赖,保证买卖双方在交易时的公平性,提出了基于第三方认证的公平电子商务技术体系。该系统借助可信第三方技术、数字签名和加密等技术,确保电子交易的安全性和可靠性。

I am also not disclosing the encryption algorithm used for providing ultimate security standards.

我也没有披露加密算法,用於提供最终的安全标准。

By disordering randomly the position of pixels of the wateamarking image,encryption is achieved.

在该方案中,通过对水印像点的位置进行随机置乱,达到加密的目的。

With the increasingly development of Network Technology, the data must be enciphered to protect from being intercepted or modified. So, the security of Computer Data Communication became a focus of our society, which leads to the development of encryption and deciphering technique of Computer Data Communication Security.

随着网络技术的不断发展,为了保护数据在传递过程中不被别人窃听或修改,我们必须对数据进行加密,从而计算机数据通信的安全问题也就成为当今网络社会的焦点,也自然导致了加密、解密等一系列关于计算机数据通信安全技术的产生和发展。

But if what we have is a random OTP, enciphered by simple columnar transposition, and the message, first with the OTP applied, and then enciphered by Playfair, then it is not at all clear how we can apply techniques analogous to those used against these two ciphers in the double encryption case.

但是,如果我们有一个随机的OTP ,加密由简单的柱状换位,并邮件时,先与检察官办公室申请,然后由加密playfair ,那么,它现在还不很清楚,我们如何能够适用技术类似于那些用来对付这两个密码在双重加密的情况。

All business logic components are based on DCOM. It provides the Business Process Reengineering function, and output/input interfaces based on XML in order to exchange data with different operating system and platform. The system adopts dual encryption with software and hardware: Encapsulating the function of CryptoAPI of Microsoft provides file enciphering interface and file deciphering interface.

本系统采用软加密和硬加密结合的方式来保护软件:封装微软加密库,形成加密、解密组件,提供加密接口和解密接口函数;采用Access库的安全机制,对数据库建立SqServer.mdb三级安全机制;将用户数量写入硬件加密狗中,控制客户端的数量。

The system adopts dual encryption with software and hardware: Encapsulating the function of CryptoAPI of Microsoft provides file enciphering interface and file deciphering interface.

本系统采用软加密和硬加密结合的方式来保护软件:封装微软加密库,形成加密、解密组件,提供加密接口和解密接口函数;采用Access库的安全机制,对数据库建立SqServer.mdb三级安全机制;将用户数量写入硬件加密狗中,控制客户端的数量。

Some of the common ways of implementing message level security is by encrypting data using some standard encryption algorithm.

在实施信息安全的水平,一些常用方法是使用一些数据加密标准的加密算法。

第48/60页 首页 < ... 44 45 46 47 48 49 50 51 52 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。