英语人>网络例句>encrypt 相关的网络例句
encrypt相关的网络例句

查询词典 encrypt

与 encrypt 相关的网络例句 [注:此内容来源于网络,仅供参考]

RFID technology is used to encrypt the pharmaceutical packaging and complete control of the anisomeles, can also provide guidance on the treatment of speech.

RFID技术用于制药包装加密可以真正地完全控制伪品,还可以提供治疗的语音指导。

Its basic idea is to realize all kinds of radio communication functions, such as work band, kinds of modulation or demodulation, data format, encrypt mode and communication protocol by upgradable and displaceable software on a hardware platform which is opening, expanded and simple structure. And it makes wideband A/D and D/A converters close to the antenna, in order to develop more flexible and opening wireless communication system.

它的基本思想是以开放的、可扩展的、结构最简的硬件为通用平台,把尽可能多的通信功能,如工作频段、调制解调类型、数据格式、加密模式、通信协议等用可升级、可替换的软件来完成,并使宽带A/D和D/A转换器尽可能地靠近天线,以研制出具有高度灵活性、开放性的新一代无线通信系统。

This paper proposes an extended image encryption algorithm, which is used to encrypt the confidential binary images into non-confidential garnished image.

文章提出了一种延拓的图像加密算法,该算法用于将机密的二值图像加密成非机密的伪装图像。

Software Description: About Vigilant File Encryption Software, This allows you to encrypt, sign or shred files, e-mail, documents, folders and Hippa data.

Vigilant File Encryption Software 这允许你加密,签署或者切碎文件,电子邮件,文件,文件夹和 Hippa 数据。

PLOP is a development tool that can linearize, optimize and encrypt existing PDF documents for Web activities.

PLOP则是为提高PDF文档在网络的传输及查阅而设计,对已有PDF文档进行网络优化及加密的软件包。

This scheme is based on the PRIMAR protection scheme, adopt Blowfish algorithm to encrypt, use Hash function (SHA-1) and Cyclic Redundancy Check to make sure the data integrity, and adopt DSA signature.

该方案基于PRIMAR保护方案发展而来,采用Blowfish分组算法对海图信息加密保护,通过SHA-1哈希函数和CRC循环冗余校验确保传输数据的完整性,并采用DSA算法进行签名认证。

The scheme adopts a multi-agent system and a threshold secret share technology, in which the secret information and the shares are carried by many different agents, adopts D-H key exchange technology to encrypt intermediate result to hide real intention of agent, to protect the privacy of agents and to enhance the reliability and the fault-tolerance capability of the mobile agent system. A mobile agent with limited authorization can sign a message on behalf of a user at far-end without divulging the user s private key. In order to avoid rebuilder attack the time-stampe mechanism is adopted.

运用信息加密和身份认证技术,实现了移动Agent和Agent平台间双向身份认证,有效地防止了恶意Agent对Agent平台的攻击或越权访问以及恶意Agent平台对Agent的攻击;引入远端可信任的代理平台作为数据处理平台,采用多代理系统和门限秘密共享技术,将加密信息和密钥由多

Translation robotization ; information encrypt ; fireproofing wall ; VPN

调度自动化;信息加密;防火墙; VPN

Pocket SafeHold is an easy-to-use program that allows you to encrypt/decrypt files or folders.

掌上SafeHold是一个易于使用的程序,使您可以加密/解密文件或文件夹。

It can be strongly extended because we can load various DLL in Client terminal for different test. Compared with LoadRunner , Test Main Console resolves the problem that we can't make the information of the product whose communicated function is encrypt which obtained in network parameterized. It can test the software using encrypting communication. Because material test module is loadable, Test Main Console has good tractility.

主控台是该项目的灵魂,再客户端可以加载不同的测试程序,具有很强的扩展性和LoadRunner相比,测试主控台解决了采用加密传输方式的软件产品无法将网络中获取的命令参数化的问题,可以对加密方式的软件进行压力测试,同时由于具体的测试模块是可加载的,程序具有良好的延展性。

第9/11页 首页 < ... 3 4 5 6 7 8 9 10 11 > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。