英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Three kinds of encryption methods——Arnold scrambling, magic square scrambling and chaotic technique are introduced in detail.

秘密信息嵌入在这些高能量的音频段后,提高了该算法的鲁棒性和不可见性。

Which also includes analysis of the majority of characters function, encryption and decryption functions.

其中还包含了大部分字符分析函数,加密解密函数。

This is incredibly easy (and a good example of why you should use the device mapper for encryption in ubuntu and stop using the old loopback system).

此步骤不可置信的容易(这也是一个好例子说明你应该使用ubuntu中的device mapper来加密而不是使用旧的环回系统)。

We also describe that it exists the coefficients matrix of the MixColumn operation in Rijndael which satisfy that the encryption and decryption can share the same operation.

4从改变Rijndael的变换常量这一全新的角度降低了其实现的代价,包括软件和硬件的实现代价,尤其是硬件实现代价。

It only takes quadratic bit complexity for the cryptosystem to perform an encryption/decryption operation.(6) A public-key cryptosystem is proposed by using a special combinatorial problem defined over the matrix ring. The security of the scheme is related to but not directly dependent upon the integer factorization problem.

6使用矩阵环上的一个特殊的组合问题构造了一个公钥加密算法,其安全性与整数分解问题有关,但并不直接依赖于整数分解问题,而是依赖于一类特殊的矩阵组合问题。

Best of all, data encryption velocity is about 50-60 Mbps in our nation.

国内最快的数据加解密的速度也就是五、六十兆的水平。

Here is the meat and potatoes of the encryption/decryption process.

这里是肉和土豆的加密/解密过程。

The security verification based on the content authentication is implemented through feature extraction, choosing of the shared encryption key, transformation of the Hash function and generation of the Merkle tree, which is simulated in the environment of NS-2. The result shows that the proposed mechanism has better performance in the efficiency and security.

通过特征提取、选取共享密钥、Hash函数变换和构造Merkle树实现基于内容认证的安全性检验,并在NS-2环境下进行了仿真模拟,结果表明所提出的安全机制具有较好的效率和安全性。

It should be noted, though, that, if it is assumed that the first layer of encryption, since it is shared among all the nodes in the network, can be compromised, then the fact that the keypad numbers are not further concealed does weaken this system: for each value tried in a brute-force search of the key for a message block, the related keypad is immediately identifiable.

应当指出,虽然说,如果这是假设的第一层加密,因为这是共同的各节点在网络中,可以毫不妥协的,那么事实,那就是键盘号码,不准备再隐瞒不削弱本制度:每个价值试图在一个简单粗暴的武力搜索最关键的一个消息块时,其相关按键立即识别。

The encryption algorithms ensure the security of message transfer, which among the clients and the authentication servers.

其中,最常用的就是对称加密算法和公钥加密算法,加密算法可以保证用户和认证服务器间的数据传输保密和安全。

第29/60页 首页 < ... 25 26 27 28 29 30 31 32 33 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。