查询词典 encrypt
- 与 encrypt 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
RSA algorithm is an influential public-key encrypt algorithm at present, which can resist almost all cryptogram attack as yet.
RSA算法是目前较有影响的公钥加密算法,它能够抵抗目前已知的大部分密码攻击。
-
Firstly, chaotic kinetic characteristic of Kent mapping is analyzed, using it to encrypt watermark image; Secondly, an algorithm of only modifying the decimal part of DC components is given, bringing the least error, effectively solving the problem which embedding watermark in DC components is easy to the image's block effect; Watermark is extracted without original image utilizing two-bits algorithm.
深入分析了帐篷映射的混沌动力学特性,并将其应用于水印图像的预处理;在分析了 DCT域嵌入对策的基础上提出了一种只修改 DC 分量小数部分的嵌入算法,引入的误差小,有效的解决了以往人们在 DC 分量嵌入水印容易引起图像块效应的问题;检测过程中利用二值离散算法使得水印提取时无需原始图像。
-
It is basically an application and document in one: the mechanism to encrypt and decrypt a note is part of it.
它基本上是一个应用程序和文件之一:机制来加密和解密的一份说明的一部分。
-
Encrypt and decrypt files of any type.
加密和解密文件的任何类型的。
-
An easy and fast tool to encrypt and decrypt folder.
一个方便快捷的工具,加密和解密文件夹中。
-
You can also drop files or text on the applet icon to encrypt or decrypt it.
你也可以减少档案或文字对applet的图标来加密或解密。
-
Then how to realize network security of J2ME based on Bouncy Castle is discussed,including to encrypt the data which are transmitted to the server and to verify the client by using digest and digital signature .
简要介绍了Bouncy Castle J2ME加密包,并具体探讨了如何用Bouncy Castle API来实现J2ME的网络安全,包括加密传输的数据和使用摘要及数字签名对客户端进行验证。
-
The method is as follows:(1) encrypt at control signal line of CPU to prevent the abnormal retrieval by CPU emulator;(2) encode the data and address of the program code to prevent the operation of dissembler;(3) do a pattern checking to prevent the execution of illegal reverse tracking program.
我们所提出的方法如下:(1)由CPU中的M1控制讯号线加密以防止由CPU模拟器做非正常之撷取程式;(2)将程式码的资料及位址重新编码,以防止反组译程式的运作;(3)额外加一颗CPLD做特殊图样比对以防止不正当逆向追踪程式的执行。
-
Software Description: About iStegano 2005, Encrypt and emboss numerous files into an image, with encryption.
iStegano 2005 使用加密算法加密和加工大量的文件到一幅图像当中。
-
Aimed at the safety requirement of WAP, the disadvantange of WAP's application model is analyzed, a new end-to-end safe model, named Double Encrypt's model, is developed. Its DES and IDEA algorithm are realized by the compiling language based on delphi 6.0, the most excellent IDEA algorithm that is suitable to encipher the algorithm in WAP application system is selected to transmit data safely.
为解决无线应用协议在应用中存在的安全隐患,探讨了WAP应用模型漏洞产生的原因,分析了目前WAP应用的3种实现模型及存在的不足,提出了一种新的端到端安全模型——双加密模型,并使用面向对象的编程语言DELPHI6.0实现了数据加密标准和国际数据加密算法两种对称加密算法,选择了适用于WAP应用的最优的IDEA算法。
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。