英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

The synchronous measurement scheme of combining the wire encryption control survey and strip topography mapping was taken in the course of the engineering survey for the Xilongchi Pumped Storage Power Station , located in Shanxi Province.

在山西西龙池抽水蓄能电站施工测量中,采取导线加密控制测量和带状地形图测绘的同步测量方案,利用全站仪开展导线控制测量与碎部测量同步进行,最后用微机进行测量后的数据处理工作。

The new encryption systems effectively solve the problem of one way error diffusion in a single cellular automata system and acquire large key space with small rule radius.

新的复合元胞自动机密码系统很好地解决了单一元胞自动机密码系统中存在的误差单向扩散的问题,并且能够以较小的规则半径获得大密钥空间。

Of course, if we find that the local node in the wireless LAN equipment has been illegal attacker encryption, they can not normally enter the local wireless LAN, we can force the wireless device node parameter setting back to default, to restore the specific ways to view the corresponding wireless node equipment manuals, usually as long as we press the wireless node equipment in the control panel button to complete the reset function to restore the task parameters.

当然,要是我们发现本地无线局域网中的节点设备已经被非法攻击者加密,自己不能正常进入本地无线局域网时,我们可以强行将无线节点设备的参数设置恢复到默认状态,具体恢复方法可以查看对应无线节点设备的操作说明书,通常情况下我们只要按下无线节点设备控制面板中的reset功能按钮来完成参数设置恢复任务。

Lastly, this paper analysis the safety problems that may happened between WAP terminal and data center when they are communicating. In addition, this paper proposes a encryption algorithm based on the theory of shared secret key in order to improve the wireless protocol.

本文最后针对ITS中WAP终端与数据中心通信的环节上可能出现的安全隐患做了分析,同时也提出了一个基于共享密钥的加密算法对移动协议进行了改进。

Encryption allows people with "need-to-know" privileges to view sensitive information with ease while effectively blocking access to unauthorized parties.

加密后的文件只允许有&需要认识&特权的人轻易浏览敏感信息,同时有效阻止非法用户进入文件。

In this thesis, GSM mobile phone encryption security system design is mainly researched.

本文致力于GSM加密手机系统的安全性设计研究。

The platform is designed to combine ease of programming with powerful features such as over the air programming and debugging, adhoc mesh networking, innovative power management, built-in encryption and easy interface to a variety of sensors and effectors.

开发平台将程序开发的轻松性和一些功能强大的特性设计结合在一起,比如,空中编程和编译,临时性mesh网络,新颖的电源管理,内置加密及与多要传感器和效应器轻松连接

Designing encryption algorithms is a challenging business that should be left to cryptographers.

设计加密演算法是一个极具挑战性的任务,而且是属於密码学家的任务。

D k E k (P=P 计算机专业英语 10-17 Chapter 10 Computer and Network Security 10.2 Modern Cryptography- Data Encryption DES has been studied by many of the world's leading cryptographers, but no weaknesses have been uncovered. To crack a DES-encrypted message a hacker or commercial spy would need to try 255 possible keys.

前略为了打开一个DES加密的报文,黑客或商业间谍需要试验前略为了打开一个DES加密的报文, DES加密的报文种可能的密钥, 255种可能的密钥,这种搜索在世界上最快的巨型机上也需好几天的计算机时间。

It also makes sense to prevent potential eavesdroppers from spying on your data stream, so a combination of filtering and encryption will provide all the

这是最低限度的安全,您应该适用。它也使意识,以防止潜在的间谍窃听从您的数据流,因此相结合的过滤和加密将提供一

第58/60页 首页 < ... 52 53 54 55 56 57 58 59 60 > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。