英语人>网络例句>cryptography 相关的网络例句
cryptography相关的网络例句

查询词典 cryptography

与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]

The most direct and effective technical means to prevent the illegal wiretapping or fabrication of information transmitted on the network is believed to be cryptography.

为了使网络中所传输的信息不被非法地窃取或篡改,密码学被认为是最直接、最有效的保护信息安全的技术手段。

In addition, it includes several utilities and libraries that were required to support SPKI: an ASN.1 parser, a Yarrow daemon, and a PKCS5 password-based cryptography module.

此外,它包括了几个支持SPKI需要的工具和库:一个ASN.1分析器,一个Yarrow后台程序,一个基于PKCS5口令的加密模块。

There is awide range of fascinating questions in studying cryptography.

对于暗号理论的学习来说,有很多方面奇妙的问题,我主要想学习暗号理论的两个重要的问题,一个是data的暗号化和情报认证。

The choosable use of cryptography enables highest data security.

加密法的可选择的使用使最高数据安全性。

Researchers in this lab focus on multilingual systems, technologies for emerging markets, digital geographics, cryptography and security, mobility, networking and systems, rigorous software engineering, and algorithms.

这个实验室的研究人员集中在多语言系统,技术的新兴市场,数字地理,加密和安全性,移动性,网络和系统,严格的软件工程,和算法。

Quantum key distribution produces and releases key by making use of quantum mechanics principle,to solve the insuperably limitation of key distribution in classical cryptography,and guarantees the absolute security of the cryptographic key.

量子密钥分发系统是利用量子力学的基本原理来产生和发布密钥,以解决经典密码学在密钥分发方面存在的无法克服的缺陷,从而保证密钥在发布过程中的绝对安全,进而实现通信双方所交换信息的绝密。

Authentication schemes are one of the most useful and fundamental primitives in public key cryptography which applies cryptographic methods to achieve the security services such as authenticity, integrity and nonrepudiation.

随着计算机和计算机网络的快速发展,信息安全已经成为信息社会急需解决的问题。

Although the discipline of cryptography is at least two thousand years old, its algorithmic and mathematical foundations have recently solidified to the point where there can now be talk of provably secure cryptosystems.

虽然纪律加密至少二千年岁,它的算法和数学基础,最近凝固点那里现在可以谈的可证明安全加密系统。

Law, an Elliptic Curve Cryptography based Secure and efficient authenticated key agreement protocol - SEAK protocol are proposed.

为此,按照L.Law所定义的认证密钥协商协议的安全特性,提出一种基于椭圆曲线密码体制的安全高效认证密钥协商协议——SEAK协议。

So conforming to the authenticated key agreement security attributes defined by L. Law, an Elliptic Curve Cryptography based Secure and efficient authenticated key agreement protocol - SEAK protocol are proposed.

为此,按照L.Law所定义的认证密钥协商协议的安全特性,提出一种基于椭圆曲线密码体制的安全高效认证密钥协商协议——SEAK协议。

第14/18页 首页 < ... 10 11 12 13 14 15 16 17 18 > 尾页
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?