英语人>网络例句>enciphering 相关的网络例句
enciphering相关的网络例句

查询词典 enciphering

与 enciphering 相关的网络例句 [注:此内容来源于网络,仅供参考]

In order to establish the systematic structure of Web Serves and enhance reusability of the software and safety of application syste m,this paper lays emphasis on researching and analyzing technology of loginning,data enciphering,database connection visiting,ensuring database safety,defending Web attack and reserving data to avoid any disaster and then gives some better corresponding solutions.

为了搭建多层结构的分布式Web应用系统的Web Servers体系结构,提高软件的可重用性及应用系统的安全性,本文重点对遥程数据库维护中的登录技术、数据加密技术、数据库连接访问技术、数据库安全技术、防Web攻击技术及远程数据容

With the development of digital image enciphering techniques,there appeared a lot of methods including those based on Arnold transformation and affine transformation and those based on theories of Hilbert curve,knight-tour problem,Gray code and etc.However,there are few criteria to measure the merits and demerits of these methods.

随着图像加密技术的发展,出现了各种各样的加密方法,其中有基于Arnold变换、仿射变换、Hilbert曲线、幻方、骑士巡游、Gray码、混沌序列和基于频域的置乱加密技术,但是却缺少一种能有效衡量这些方法的置乱程度及反映加密次数与置乱程度关系的标准。

All business logic components are based on DCOM. It provides the Business Process Reengineering function, and output/input interfaces based on XML in order to exchange data with different operating system and platform. The system adopts dual encryption with software and hardware: Encapsulating the function of CryptoAPI of Microsoft provides file enciphering interface and file deciphering interface.

本系统采用软加密和硬加密结合的方式来保护软件:封装微软加密库,形成加密、解密组件,提供加密接口和解密接口函数;采用Access库的安全机制,对数据库建立SqServer.mdb三级安全机制;将用户数量写入硬件加密狗中,控制客户端的数量。

The paper closely combines with practice to study and analyzeseveral key security technology and measures which must be implemented. Forinstance, firewall technology, net virus prevention, PKI/PMI identity authenticationtechnology, gap technology, enciphering VPN channel, intranet managementmeasures, etc. The paper brings the design and implement of dual-usage monitoringsystem to a focus. Finally, this paper put forward the construction of the intrusiondetection system in the police network, of the police terminal monitoring system.

本文联系实际,研究分析了几个关键性的、必须实施的安全技术和措施,如:防火墙技术、网络病毒防治、PKI/PMI身份认证技术、物理隔离技术、加密VPN通道建设、内部网管理措施等;重点研究了内网外联监控系统的设计和实现;最后提出在公安网上建立入侵检测系统、在因特网上建设公安脱网终端监控系统的设想。

The system adopts dual encryption with software and hardware: Encapsulating the function of CryptoAPI of Microsoft provides file enciphering interface and file deciphering interface.

本系统采用软加密和硬加密结合的方式来保护软件:封装微软加密库,形成加密、解密组件,提供加密接口和解密接口函数;采用Access库的安全机制,对数据库建立SqServer.mdb三级安全机制;将用户数量写入硬件加密狗中,控制客户端的数量。

The BORUI software belongs to the field of computer software technology, and is characterized by that after the BORUI software is mounted in computer, when the mourse is placed on the icon of an unopened file, one window can be automatically ejected, the file contents or preset contents can be displayed in the window, after the file is opened, the preset contents also can be looked up by means of software function; in the computer said BORUI software has several functions; inhibiting deletion, enciphering deletion function and making reference and comparison between various files with different types and different forms.

BORUI软件属于计算机软件领域,其特征在于:当计算机安装BORUI软件后,将鼠标放置在一个未打开的文件的图标上时会自动弹出一个窗口,窗口中可显视其文件内容或预先设定的内容;在文件打开后也可以通过软件功能查看其预先所设定的内容;通过软件功能可将计算机中不同类型不同格式的文件设定成为禁止删除;可为删除功能加密,为删除功能加密后,只能通过输入正确的密码才可以将文件删除;通过软件的功能可以在文件中的文字与文字、图像与图像、视频与视频、动画与动画、音频与音频等不同类型不同格式的各种文件之间进行参照与对比。

The controller connected to the automatic camera, the automobile bottom scanning instrument and the computer completes power source providing, enciphering, signal receiving and other functions; the automatic camera connected to the controller takes the photographs of automobile number plates; the automobile bottom scanning instrument connected to the controller scans the automobile bottom automatically and transmits video signal to the computer; and the computer with special program creates, shows and stores the real-time image of automobile bottoms.

控制器连接自动拍照器、车底扫描仪和计算机,用于完成提供电源、加密和信号接收等功能;自动拍照器与控制器连接,当检测到车辆到来时,自动拍照车辆号牌;车底扫描仪与控制器连接,当车辆通过时,对车辆底部进行自动扫描,并向后端计算机传送视频信号,由计算机内的程序完成完整车底图像的实时生成、显示与存储。

The embedded information safety platform features the CPU micro controller as one network processing chip with ARM940T kernel containing real-time embedded operation system; enciphering and deciphering hardware chip comprising IPSec algorithm chip and symmetric algorithm chip; I/O interface including two 10/100 M adaptive Ethernet interfaces, one USB main control interface and one serial interface.

本发明涉及一种嵌入式信息安全平台,特点是,CPU微控制器为一个网络处理芯片,片内处理器为ARM940T核,嵌入式实时操作系统置于该核内;加解密硬件芯片由IPSec算法芯片、对称算法芯片组成;输入输出接口包括2个10/100M自适应以太网接口、USB主控接口,串口接口。

第3/3页 首页 < 1 2 3
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。