英语人>网络例句>Encryption 相关的网络例句
Encryption相关的网络例句

查询词典 Encryption

与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

It means that the accepter must decrypt them in triple-DES firstly, in RSA secondly, the order is rightly reverse to the encryption's order.

这样可以让数据对象的原文被窃取的难度增加,继而达到更好的保密作用。

According to the function, the system can be divided into three modules: mobile terminals encryption module, secure access module and certificate authority module.

本系统按其功能可分为三个模块:移动终端加密模块、安全接入模块和权威机构认证模块。

Of modern information technology to the enterprise's internal control has given new meaning, financial accounting control to manual control by the common man-machine control, such as password control, data encryption, the functions of authority, access, operation log management.

现代信息技术给企业的内部控制赋予了新的内涵,财务会计控制也由人工控制变为人机共同控制,如口令控制、数据加密、职能权限、访问权限、操作日志管理等。

The facets of customer verification ,access control ,authority management ,log audit ,data encryption , digital signature are researched and implemented to some extent.

具体对身份认证、访问控制、权限管理平台、日志审计、数据加密、数字签名等方面进行了研究和一定程度的实现。

The facets of customer verification, access control, authority management, log audit, data encryption, digital signature are researched and implemented to some extent.

具体对身份认证、访问控制、权限管理、日志审计、数据加密、数字签名等方面进行了研究和一定程度的实现。

The second layer of encryption is unique to each addressee, at least in that each addressee has a unique key.

第二层加密是独一无二的,以每个收件人的,至少在每个收件人有其独特的关键。

For implementing the encryption/decryption and information hiding for digital multimedia, and aiming to generate enough large cipher key space, the accurate period of high dimension random matrix scrambling transformation is studied with the help of number theory and algebraic theory.

为了适合数字多媒体特性,实施多媒体加密与信息隐藏,生成充分大的密钥空间,使用了数论、近世代数、算法分析等工具,对高维随机矩阵置乱变换的精确周期进行了研究。

The network security is an affected area very widespread question, the topic research content: The network security rank, the data encryption technology, the firewall technology concept, the function, introduced the network security faces main threat as well as question countermeasure, and through the example some company network analysis situs chart from the analysis network security movement environment explained the example plan as well as supplements four safe disposition.

网络安全性是一个涉及面很广泛的问题,课题研究的内容:网络安全级别、数据加密技术、防火墙技术的概念、作用,介绍了网络安全面临的主要威胁以及问题的对策,并且通过实例某公司网络拓扑图从分析网络安全的运行环境来说明实例方案以及补充四点安全的配置。

Government may not give encryption back to the people for a number of antiquated reasons.

可是,政府会因为许多过时的理由可能还不把该技术交还人民。

This paper analyzes the security in a mobile telephone network with emphasis on its identification authentication, data encryption, key assignation and integrity authentication.

分析了移动通信网络中的不安全因素,重点讨论了移动通信网络中的身份认证和密钥分配,数据加密与完整性检测方案,并对其安全性进行了详细分析。

第7/60页 首页 < ... 3 4 5 6 7 8 9 10 11 ... > 尾页
相关中文对照歌词
Headless Princess
Self Explanatory
No Church In The Wild
推荐网络例句

The production moved off-Broadway to New York City, where she won the Joseph E. Calloway award for her performance, and was profiled in American Theater Magazine as one of ten young theater artists to watch.

生产提出过百老汇的新的纽约市,在那里她赢得了约瑟夫calloway奖,她的表现,并于异型在美国的战区杂志之一, 10战区的青年艺术家观赏。

It's a risk tradeoff, and I believe that adding test support code usually wins.

这是一个风险的权衡,我相信添加测试代码通常会占上风。

Besides, Fantine was only a moderately good workwoman

芳汀究竟还只是一个手艺平凡的工人。