英语人>网络例句>decrypting 相关的网络例句
decrypting相关的网络例句

查询词典 decrypting

与 decrypting 相关的网络例句 [注:此内容来源于网络,仅供参考]

In addition, you can also create self-extracting and self-decrypting archives from your folder, allowing you to send the content by email or other means.

此外,你还可以从文件夹创建自解压和自解密存档,允许你通过电子邮件或者其它方式发送其内容。

A 300-Year Error-----Three-Hundred-Year Devil's DEN on NB of SNB, Two Decrypting Equation Books of 《 The Laws (ISBN1442131241)》 and 《 The Laws Plus (ISBN144213285X)》; A Three-Hundred-Year Error's Decryption, The Sword of the Third Signorino—Nostradamus' Sword of Great Seven Number that Makes the Global 6.5 Billions People Be Not Any More Buried Alive by the Earthquake in the World; Ali Baba and the Forty Thieves Open Simsim to the Sun and Moon Treasure House of the God to Get the Heaven's Nuclear Cimelia: Nuclear Les Trois Mousquetaires and Big Three's Triumvirate Carry out Three Nuclear Controls and Monitors to Make the Global 6.5 Billions People No Longer Lie Under Big Deathful Nuclear Radiation Here and There

全球拉响核警报:核泄露、核块熔化,全球15%以上核弹参与,同时大面积污染土壤和水资源,全球80%以上的人遭受严重核放射性照射辐射一个300年的错误;两本解密方程书《 The Laws (ISBN1442131241)》和《 The Laws Plus (ISBN144213285X)》;三百年错误的纠正令全世界65亿人从此不用再被地震无情活埋和被海啸无望吞噬;核三剑客令全世界65亿人从此不用再遭受致命核辐射

For decrypting data, the same algorithm can be used - it's symmetric.

对于解密数据,同样的算法可用于-它是对称的。

All that is needed is the password used for the encryption; decrypting and decompressing engine is encapsulated inside the archive.

所有需要的是密码,用来为加密;解密及解压缩引擎是封装内存档。

All that is needed is thepassword used for the encryption; the decrypting and decompressing engine is encapsulated inside thearchive.

所以这些只需要使用一个用于加密的密码;解压缩引擎被嵌入到了文件存档当中。

In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.

本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。

Digital watermarking, which can overcome some uncontrollability issues for decrypting encrypted messages, has become a new information security area under this circumstance.Currently, Watermarking researches are mostly focused on image and video instead of text.

目前关于水印的研究主要集中在图像和视频等方面,对于文本数字水印研究的很少,已有的一些文本水印算法主要是通过轻微改变字间距,行间距或字符特征等方法来实现。

BACE algorithm has the desired property that does not reduce the encoding efficiency of the CABAC entropy encoder compared to the CIME algorithm for CAVLC entropy encoder. Both CIME and BACE algorithms can adapt to the content security level by choose the amount and different key parts of the video stream to be encrypted, the theoretical and experimental results show that both these algorithms can effectively encrypt the video content. Due to the ability of encrypting the video content without violating the syntax, the BIME and BACE algorithms can be employed used for many advanced H.264/AVC coding options without first decrypting the video stream, like Data Partition and UnEqualized Protection for the enhancement of transmission robustness, and the scalable coding in order to match the different channel capacity.

上述两种结合了H.264/AVC熵编码器特征的内容选择性加密算法,由于其加密后的视频码流的句法结构完全符合H.264/AVC视频编码标准,与传统的基于块数据的块加密算法相比较,本文提出的两种内容加密算法可以使得加密后码流在无需解密的情况下,实现H.264/AVC视频编码标准为移动视频应用而设计的诸多特性,如:增强传输鲁棒性的数据分割技术和非均衡保护技术,以及直接做匹配信道带宽的分级编码操作等,具有更高的灵活性和计算效率,从而可以灵活运用于各种应用场合。

Now that we have decrypted the Signature element, decrypting the body will be a peace of cake!

现在我们已经解密签名元素,解密的机构将是一个和平的蛋糕!

So we are going to develop such reusable class that will do the job of encrypting and decrypting for us.

所以我们打算开发一个可重用的类,这个类将做加密和解密的工作。

第2/5页 首页 < 1 2 3 4 5 > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。