英语人>网络例句>cryptographically 相关的网络例句
cryptographically相关的网络例句

查询词典 cryptographically

与 cryptographically 相关的网络例句 [注:此内容来源于网络,仅供参考]

The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.

这次竞赛的目的是为了寻找一个强大的替代品,来取代现有的散列函数集。因为现有的散列函数集中有些已经显现出比当初设想的要差的加密性。

IP Security Protocol is the standard security IP protocols defined by the Internet Engineering Task Force , and it provides cryptographically-based security at network layer .

IP安全协议IPsec是IETF制定的安全IP协议建议标准,在网络层提供基于密码学的安全服务。

This is a cryptographically signed message in MIME format.

这是一条MIME格式的加密的签名消息。

Because there is less linkage between bytes, such a method is cryptographically weaker so I don't recommend running your online bank this way!

因为没有那么字节之间的联系,这种方法是加密较弱的(所以我不建议您在您的网上银行,这种方式!

The present invention is a method for outputting larger bit size pseudo-random number Zi that is cryptographically secure.

本发明是一个输出较大位长度伪随机数Zi的方法,这个伪随机数是密码安全的。

Encode - prompts for a "Keyword" to use to cryptographically encode the text.

编码-提示为&关键字&使用的保密编码的文本。

The next iteration was this thing that would do cryptographically secure IOU notes.

接下来的这次尝试是我们使用密码安全加密 IOU3。

Considering IP address spoofing attack, MCGA which is a kind of CGA (Cryptographically Generated Addresses) based on MAC address has been proposed.

针对邻居发现协议的伪造IP地址攻击,在现有的加密产生地址技术(Cryptographically Generated Addresses,以下简称CGA)基础上提出基于MAC地址的CGA技术。

Even though functions that create hashed passwords may be cryptographically secure, possession of a hashed password provides a quick way to verify guesses for the password by applying the function to each guess, and comparing the result to the verification data.

即使职能创造乱后密码可cryptographically可靠、藏乱后密码提供了一种快速的方式验证密码臆测运用功能每猜想核查结果的比较数据。

An Advanced Cryptographically Generated Addresses method is proposed.It uses two sets of cryptographically keys to produce IPv6 address.One set cryptographically key is public key and private key of ISP.And the private key is used in assigning ACGA address,the public key is used in validating whether the address come from the ISP that it claimed.

提出一种改进的密码生成地址方法,ACGA涉及到两组公钥和私钥对,一组是ISP的公钥和私钥对,其中私钥在分配ACGA地址中使用,公钥在验证该地址是否存在或是否来自声称的ISP中使用。

第1/4页 1 2 3 4 > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。