英语人>网络例句>encrypted 相关的网络例句
encrypted相关的网络例句

查询词典 encrypted

与 encrypted 相关的网络例句 [注:此内容来源于网络,仅供参考]

The next step is that this encrypted description document in XML format will transfer to the accepter in security channel (this channel is different from which the encrypted object data is transferred in).

接收方再按照这个说明文档对xml格式的加密文档的内容进行相应的解密----不同部分,用不同加密算法来进行解密。

First, let's get a few terms out of the way.In cryptography, a file of any type that isn't encrypted is called plaintext;encrypted data is called ciphertext .

首先,让我们解释几个术语上的拦路虎,在密码学中,没有加密的任何形式的文件都被叫做普通文本,而加密的数据则叫做密码文本。

Keyword index is a data structure that allows us to search in constant time for documents containing specified keywords. Unfortunately, standard index constructions are not designed for encrypted documents, because they may leak some information about the document. In this thesis, we propose two index structures called PRP-Index and P-Index which are designed for encrypted documents.

中文摘要关键字索引搜寻为一种加速文件关键字搜寻的一种架构,但是随著文件的安全性越来越受到重视,文件开始以加密的型态储存於资料库,但是目前的索引架构并没有针对加密文件作考量,也因此索引有可能会透露出文件的相关资讯,造成安全上的问题。

Firstly, the digital watermarking was transformed randomly, and then encrypted by chaos. The encrypted watermarking was transformed to one-dimensional row vector, and the pixel value was sorted. The coefficient of primitive image of stationary wavelet transformation was expanded to one-dimensional row vector, too, and then the sorted watermarking was embedded to the sorted low frequency and turned to two dimensions.

本算法先将数字水印图像进行置乱变换,然后将置乱后的水印图像进行混沌加密,将加密后的水印按行展开成一维行向量,并将像素值从大到小排序,将原始图像平稳小波分解得到的低频系数也按行展开成一维行向量,并按从大到小排序。

I decided to make my encrypted filesystem live in a regular file rather than its own partition. This requires less tweaking of the disk, and makes mounting and unmounting the encrypted filesystem easier, as you will see later.

您可将加密文件系统保存在一个特定的文件当中而不是单独分区,这样不要对磁碟做太多的调整便让对加密文件系统的登录和退出操作变得更加容易。

I decided to make my encrypted filesystem live in a regular file rather than its own partition. This requires less tweaking of the disk, and makes mounting and unmounting the encrypted filesystem easier, as you will see later.

您可将加密文件系统保存在一个特定的文件当中而不是单独分区,这样不要对磁盘做太多的调整便让对加密文件系统的登录和退出操作变得更加容易。

Encrypted data needs to be encrypted and decrypted, which takes time.

加密数据需要加密并且解密,这需要时间。

The system is composed of a finger mark encrypted e-mail server, a finger mark encrypted e-mail client, a finger mark encrypted e-mail user manager and a CA certificate system, which follows the X.509v3 criterion.

系统以用户指纹为身份鉴别依据,对邮件传输与存储的各个环节进行加密,具有全面的安全性保证。近年来,信息安全已成为国际性问题,它能够直接影响到国家的信息主权安全。

To increase the security of the watermark, a new binary image encryption algorithm based on TD-ERCS map is presented. The watermark is encrypted by a chaos sequence generated by TD-ERCS map; A novel color image watermarking algorithm is proposed based on discrete chaotic map and 2-dimensions discrete wavelet transform. The watermark is encrypted by the new binary image encryption algorithm, and the encrypted watermark is embed into four sub-bands of the most deep level of blue branch of host image by three-level wavelet transform, and the embedded positions are determined by general cat cha otic map; A novel color-image blind detection watermarking algorithm is proposed based on integer wavelet transform and subsampling. The scrambled watermark is encrypted and embed into the low sub-bands after four sub-images of the Y branch of host image is transformed by two-level wavelet transform, and the embedded positions are determined by Logistic chaotic map, this watermarking scheme can realize blind extraction.

为了提高水印图像的安全性,提出了一种基于TD-ERCS混沌映射的二值水印图像的加密算法,该算法利用TD-ERCS映射产生的混沌序列加密水印图像;将离散混沌映射和二维离散小波变换相结合,研究了彩色图像水印新算法,该算法先对混沌序列加密后的水印图像进行小波变换,再嵌入到宿主图像的蓝色分量的最深层的四个子带中,嵌入位置则由广义猫映射确定;将整数小波变换和图像子采样技术应用于数字水印,提出了一种彩色图像盲提取水印算法,水印嵌入时,先对宿主图像在YIQ色彩空间中的Y分量进行子采样,并对得到的四个子图像分别进行二级离散小波变换,然后将置乱并加密后的水印图像嵌入到小波变换后的低频子带中,其嵌入位置由Logistic混沌映射产生的混沌序列确定,实现了水印的盲提取。

First of all, the structure from the message, the message is divided into 3 parts: the first message, at the style, MAC address, so that packet transmission to reach the safety of the international financial sector standards; Secondly, the encryption method from the point of view, this The most prominent of the two systems were encrypted administrator password is encrypted on the card to encrypt passwords, especially for card encryption, the use of soft encryption service interface technology, using the work key, master key, the original password through the ciphertext key algorithm through two different DES encryption key to come up, we can imagine, I want to work at the same time key, master key, the text of the original secret password to a more difficult task, If the re-solution of the two DES, can be said to be completely impossible!

首先从报文结构上来看,报文分为3部分:报文头、报文体、MAC地址,使报文传输的安全性达到了国际金融行业的标准;其次,从加密方式来看,本次系统最突出的两个加密分别是对管理员密码进行加密、对卡密码进行加密,特别是对卡密码的加密,运用的是软加密服务接口技术,运用工作密钥,主密钥,原始密码通过算法得到密钥密文通过两次不同的DES加密才得出的密钥,可想而知,想要同时得到我的工作密钥,主密钥,原始密码密文本来就比较困难了,要是再解两次DES,可以说是完全不可能实现的!

第1/24页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。