英语人>网络例句>cryptography 相关的网络例句
cryptography相关的网络例句

查询词典 cryptography

与 cryptography 相关的网络例句 [注:此内容来源于网络,仅供参考]

I've read the study guides, and nearly all have failed miserably in the cryptography domain (in our case, achieving an 80% does not mean passing - it means 20% is torqued and requires attention).

我读过的学习指南,几乎都在悲惨地失败了密码域(在我们的情况下,实现了80%并不意味着传递-这意味着20%是torqued,需要注意的)。

You can consult the Wrox Book on Cryptography (mentioned in Bibliography section of this article) for more reference.

您可以咨询加密的Wrox图书(书目提到本文部分获取更多参考)。

In this case, there's an antidote : cryptography , the use of codes and ciphers to protect information.

在这种情况下,有一个破解之道:密码技术——使用代码和密码来保护信息。

However, digital watermarking technology can make up the shortcomings of cryptography, because it can protect the decrypted data.

但是,数字水印技术弥补了密码技术的缺陷,因为它可以为解密后的数据提供进一步的保护。

In the one hand, digital watermarking can make up the shortcomings of cryptography, because it can protect the decrypted data.

数字水印技术一方面弥补了密码技术的缺陷,因为它可以为解密后的数据提供进一步的保护。

With the rapid development of Internet, the problem of network security becomes more and more important How to construct a secure network is an important subject The technologies of firewall, cryptography, identity authentication are indispensable but passive in defensing against network attacks.

随着Internet的迅速发展,特别是随着政府上网工程的启动,网络安全问题越来越受到重视。

This dissertation chooses the latter method, and disjoins the analysis on protocol and on cryptography algorithm itself.

定理证明则是从证明的角度给出协议的安全性分析,无需对验证的空间进行特别的约束。

Firstly, there are less secure and efficient threshold schemes; secondly, the research on multi-secret sharing is rather weak; thirdly, usual verifiable secret sharing don't consider the partners' anonymity, while it is just people's expectation. Last but not least, the problem of variety on shares is becoming a more obvious restrict of efficiency, especially in the facets of the lost and being districted of shares. On the application of verifiable secret sharing, there are also two inadequates : on the one hand , verifiable secret sharing has been used in much threshold cryptography but in less verifiable signatures.

然而,经过认真总结、分析该领域目前研究的发展状况(具体结果将在第一章给出),我们发现在可验证秘密分享的研究方面,仍有下列四个不足之处:一是现有的安全、高效的门限方案不多;二是对多秘密分享的研究非常薄弱,在已有的文献中还见不到安全、实用的可验证多秘密分享方案;三是通常的秘密分享方案没有考虑秘密分享者的匿名性,而这恰恰是人们所希望的;四是秘密分享者的动态管理问题已经越来越明显的制约现有方案的安全,尤其是密钥份额丢失或被破坏时如何恢复更是没有被深入探讨。

Cryptography: Practice of the enciphering and deciphering of messages in secret code in order to render them unintelligible to all but the intended receiver.

密码法:以密码将讯息编码与译码的方法,让指定接收者以外的所有人都无法得知其含意。

Cryptography: Practice of the enciphering and decipher ing of messages in secret code in order to render them unintelligible to all but the intended receiver.

密码法:以密码将讯息编码与译码的方法,让指定接收者以外的所有人都无法得知其含意。

第15/18页 首页 < ... 10 11 12 13 14 15 16 17 18 > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。