英语人>网络例句>cryptographically 相关的网络例句
cryptographically相关的网络例句

查询词典 cryptographically

与 cryptographically 相关的网络例句 [注:此内容来源于网络,仅供参考]

The contest seeks to find a strong replacement for the current family of hash functions, some of which have been shown to be cryptographically weaker than originally thought.

这次竞赛的目的是为了寻找一个强大的替代品,来取代现有的散列函数集。因为现有的散列函数集中有些已经显现出比当初设想的要差的加密性。

IP Security Protocol is the standard security IP protocols defined by the Internet Engineering Task Force , and it provides cryptographically-based security at network layer .

IP安全协议IPsec是IETF制定的安全IP协议建议标准,在网络层提供基于密码学的安全服务。

This is a cryptographically signed message in MIME format.

这是一条MIME格式的加密的签名消息。

Because there is less linkage between bytes, such a method is cryptographically weaker so I don't recommend running your online bank this way!

因为没有那么字节之间的联系,这种方法是加密较弱的(所以我不建议您在您的网上银行,这种方式!

The present invention is a method for outputting larger bit size pseudo-random number Zi that is cryptographically secure.

本发明是一个输出较大位长度伪随机数Zi的方法,这个伪随机数是密码安全的。

Encode - prompts for a "Keyword" to use to cryptographically encode the text.

编码-提示为&关键字&使用的保密编码的文本。

The next iteration was this thing that would do cryptographically secure IOU notes.

接下来的这次尝试是我们使用密码安全加密 IOU3。

Considering IP address spoofing attack, MCGA which is a kind of CGA (Cryptographically Generated Addresses) based on MAC address has been proposed.

针对邻居发现协议的伪造IP地址攻击,在现有的加密产生地址技术(Cryptographically Generated Addresses,以下简称CGA)基础上提出基于MAC地址的CGA技术。

Even though functions that create hashed passwords may be cryptographically secure, possession of a hashed password provides a quick way to verify guesses for the password by applying the function to each guess, and comparing the result to the verification data.

即使职能创造乱后密码可cryptographically可靠、藏乱后密码提供了一种快速的方式验证密码臆测运用功能每猜想核查结果的比较数据。

An Advanced Cryptographically Generated Addresses method is proposed.It uses two sets of cryptographically keys to produce IPv6 address.One set cryptographically key is public key and private key of ISP.And the private key is used in assigning ACGA address,the public key is used in validating whether the address come from the ISP that it claimed.

提出一种改进的密码生成地址方法,ACGA涉及到两组公钥和私钥对,一组是ISP的公钥和私钥对,其中私钥在分配ACGA地址中使用,公钥在验证该地址是否存在或是否来自声称的ISP中使用。

第1/4页 1 2 3 4 > 尾页
推荐网络例句

The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.

采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。

By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.

通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。

Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.

有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。