英语人>网络例句>cryptography 相关的网络例句
cryptography相关的网络例句

查询词典 cryptography

与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]

The most direct and effective technical means to prevent the illegal wiretapping or fabrication of information transmitted on the network is believed to be cryptography.

为了使网络中所传输的信息不被非法地窃取或篡改,密码学被认为是最直接、最有效的保护信息安全的技术手段。

In addition, it includes several utilities and libraries that were required to support SPKI: an ASN.1 parser, a Yarrow daemon, and a PKCS5 password-based cryptography module.

此外,它包括了几个支持SPKI需要的工具和库:一个ASN.1分析器,一个Yarrow后台程序,一个基于PKCS5口令的加密模块。

There is awide range of fascinating questions in studying cryptography.

对于暗号理论的学习来说,有很多方面奇妙的问题,我主要想学习暗号理论的两个重要的问题,一个是data的暗号化和情报认证。

The choosable use of cryptography enables highest data security.

加密法的可选择的使用使最高数据安全性。

Researchers in this lab focus on multilingual systems, technologies for emerging markets, digital geographics, cryptography and security, mobility, networking and systems, rigorous software engineering, and algorithms.

这个实验室的研究人员集中在多语言系统,技术的新兴市场,数字地理,加密和安全性,移动性,网络和系统,严格的软件工程,和算法。

Quantum key distribution produces and releases key by making use of quantum mechanics principle,to solve the insuperably limitation of key distribution in classical cryptography,and guarantees the absolute security of the cryptographic key.

量子密钥分发系统是利用量子力学的基本原理来产生和发布密钥,以解决经典密码学在密钥分发方面存在的无法克服的缺陷,从而保证密钥在发布过程中的绝对安全,进而实现通信双方所交换信息的绝密。

Authentication schemes are one of the most useful and fundamental primitives in public key cryptography which applies cryptographic methods to achieve the security services such as authenticity, integrity and nonrepudiation.

随着计算机和计算机网络的快速发展,信息安全已经成为信息社会急需解决的问题。

Although the discipline of cryptography is at least two thousand years old, its algorithmic and mathematical foundations have recently solidified to the point where there can now be talk of provably secure cryptosystems.

虽然纪律加密至少二千年岁,它的算法和数学基础,最近凝固点那里现在可以谈的可证明安全加密系统。

Law, an Elliptic Curve Cryptography based Secure and efficient authenticated key agreement protocol - SEAK protocol are proposed.

为此,按照L.Law所定义的认证密钥协商协议的安全特性,提出一种基于椭圆曲线密码体制的安全高效认证密钥协商协议——SEAK协议。

So conforming to the authenticated key agreement security attributes defined by L. Law, an Elliptic Curve Cryptography based Secure and efficient authenticated key agreement protocol - SEAK protocol are proposed.

为此,按照L.Law所定义的认证密钥协商协议的安全特性,提出一种基于椭圆曲线密码体制的安全高效认证密钥协商协议——SEAK协议。

第14/18页 首页 < ... 10 11 12 13 14 15 16 17 18 > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。