英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

In addition, algorithms used in PBE were discussed in details, including International Data Encryption Algorithm, Advanced Encryption Standard of U.S., safe Hash function named SHA-1, Pseudo Random Number Generator.The modes of operation in blok cipher,such as Electronic Code Book, Cipher Block Chaining, Cipfertext Feedback and Output Feedback,are described in the thesis.

采用DSP TMS320C5409汇编语言编制了以上各种算法,在DSP上实现了一个口令加密系统,数据加密速度达到3Mb/s以上,并实现密钥的安全管理,能满足个人PC机脱离主CPU加密大量数据的需要。

It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption.

它可以在3个层次上,使用448位Blowfish加密,具有模糊性的高级加密。

A code for encryption, AES, BLUEFISH a very wide variety of encryption algorithms.

一个加密库代码,有AES,BLUEFISH的很多种加密算法。

Proposed own through oneself to the encryption algorithm study research regarding the encryption algorithm improvement thought:Along with the rapid development of computer technology, Even using the exhaustive methods to pay only a smaller price can be completed within a few days break request.

加密算法的实际应用:利用汇编语言实现DES加密、DES算法的VLSI实现、FPGA上的DES算法实现。

A group of researchers in Princeton University have managed to prove and demonstrate that disk encryption mechanism used by BitLocker of Windows Vista; FileVault of MacOS X; dm-crypt of Linux, TrueCrypt and possibly other secure encryption software, can be cracked, hacked and defeated by imaging state of physical memory which still carry and retain traces of code bits, in what hackers called cold boot attack by dumping all data in memory to disk.

一组研究人员在美国普林斯顿大学已成功地证明,表明磁盘加密机制,利用BitLocker的Windows Vista的; FileVault的MacOS下;德国马克,隐窝的Linux , TrueCrypt ,可能还有其他安全的加密软件,可以被破解,黑客入侵并打败由成像状态的物理内存,其中仍保留痕迹的代码位,在什么所谓的黑客攻击冷启动倾倒所有的数据在内存到磁盘。

It is clearly advantage that if someone tries to see the plain file, he must try on the all encryption combinations in all encryption methods, strictly speaking, it is a kind of compositor.

如果技术上允许多重叠加的话,可以尝试用更多的加密方法来进行叠加,以达到增加数据对象的安全级别。

The continue thing is that the data thief needs to try on all combination and compositor of encryption under knowing the encryption method.

但是,为了数据对象的安全性更高些,还是建议多采用不止一种加密方法的组合叠加。

Using the technologies of DNA synthesis, DNA clone, PCR and DNA chip and the theory of computational complexity, an encryption scheme is formed. In the scheme, encryption is to confect a specially designed DNA mixture and decryption is the hybridization of DNA sequances on a DNA chip.

利用DNA合成技术、DNA克隆技术、PCR扩增技术以及DNA芯片技术,结合密码学的计算复杂度理论,提出了一种基于DNA技术的加密方法。

Database encryption engine is the core of database encryption system.

0引言管理信息系统中的大量数据一般都是存放在数据库中的。

Using C language RSA encryption algorithm, the use of large prime numbers decomposition of the principle of an algorithm for encryption.

详细说明:用C语言编写的RSA加密算法,利用大素数分解的原理进行加密的一种算法。

第3/60页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Headless Princess
Self Explanatory
No Church In The Wild
推荐网络例句

More direct, directer ; most direct, directest

径直的,笔直的

Do you know how to use a chain saw?

你知道如何使用链锯吗?

This is close to the cost of the purchase price.

这样的收购价已接近成本。