英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Remora USB Disk Guard is designed as a file encryption switch in your USB storage devices.

remora随身碟民警卫队是设计成一个档案加密开关在您的USB储存装置。

This paper also introduces Remote Authentication Dial In User Service protocol and data packet encryption in detail.

本文对RADIUS协议的认证技术、数据包加密方式等进行了详细的讨论。

In the pre-process of embedding, both chaos encryption sequence and repletion code (a kind of simple error-correction code) are used to improve the security of watermark information and robustness of digital watermarking.

在水印嵌入前的预处理中,使用混沌序列加密和重复编码的方法来提高水印信息的安全性和数字水印的鲁棒性。

In this paper,we simply introduces the whole design scheme of security network access server; subsequently, we deeply analyse the principle and structure model of RADIUS and TACACS in the distributed security authentication system, and more explain the idea and implementation of design. On the other hand, in order to authencating、authorizing and accounting more securely, efficiently and accurately to the remote users, we put forward a series of key techniques which are used in analysis such as MD5 encryption arithmetic、packet retransfer、buffer storage、interprocess communication and so on, and prove the compatibility of the system through employing the commercial software Shiva AccessManager.

本论文首先简要介绍了《安全网络访问服务器》的总体设计方案;之后,深入分析了分布式安全认证系统RADIUS和TACACS的原理与结构模型,并进一步详细阐述了安全认证模块的设计思想和实现,深入剖析了系统中引用的MD5加密算法、数据包重发机制、缓冲区存储、进程间通信等技术,这些技术使得系统能安全、高效、准确地对远程用户进行认证、授权和计费,而且通过使用商用软件Shiva AccessManager的测试验证了该系统的通用性。

Browse 8 Unbounded Unbounded Unbounded Following the visit 6 and later a major technological breakthrough in addition to Microsoft-based browser full-transparent proxy encryption, the unbounded browse 8 opening of a new invention called the road to the Super Eagles agent server connection technology to coordinate a global search for a variety of resources for users to use a proxy server, fast, unlimited capacity, and technology platform for the global network free basis.

无界浏览8是继无界无界浏览6之后又一个重大技术突破,除了具备基于微软浏览器的全透明加密代理之外,无界浏览8启用了新发明的名为雄鹰之路的超级代理服务器连接技术,能够搜寻协调全球各种代理服务器资源供用户使用,速度快,容量无限大,并为全球网络自由技术平台奠定基础。

The optical image encryption with rotating invariance based on joint transform correlator is studied.

其次,本文开展了基于联合变换的旋转不变光学图象加密的研究并作了计算机模拟分析。

PE code, research PE file encryption and shell sabot code examples.

PE 相关代码,研究PE文件加密及加壳脱壳的事例代码。

The design process using subroutine Reuse, lock the safety aspects of the use of encryption technology.

本系统以AT89C51单片机为核心,LM386音频功率放大器、LED等构成外围电路,程序是用C语言编写,用Keil软件进行编译。

Scalar multiplication is the main operation in ECC. It determines the speed of encryption / decryption in ECC.

椭圆曲线密码算法中最主要的运算是数乘运算,数乘运算的效率决定了椭圆曲线密码算法的加解密速度。

Very fast and Secure Encryption method is used to scramble your secret data.

非常快速和安全的加密方法是用来争夺您的秘密数据。

第35/60页 首页 < ... 31 32 33 34 35 36 37 38 39 ... > 尾页
推荐网络例句

It has been put forward that there exists single Ball point and double Ball points on the symmetrical connecting-rod curves of equilateral mechanisms.

从鲍尔点的形成原理出发,分析对称连杆曲线上鲍尔点的产生条件,提出等边机构的对称连杆曲线上有单鲍尔点和双鲍尔点。

The factory affiliated to the Group primarily manufactures multiple-purpose pincers, baking kits, knives, scissors, kitchenware, gardening tools and beauty care kits as well as other hardware tools, the annual production value of which reaches US$ 30 million dollars.

集团所属工厂主要生产多用钳、烤具、刀具、剪刀、厨具、花园工具、美容套等五金产品,年生产总值3000万美元,产品价廉物美、选料上乘、质量保证,深受国内外客户的青睐

The eˉtiology of hemospermia is complicate,but almost of hemospermia are benign.

血精的原因很,以良性病变为主。