英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Remora USB Disk Guard is designed as a file encryption switch in your USB storage devices.

remora随身碟民警卫队是设计成一个档案加密开关在您的USB储存装置。

This paper also introduces Remote Authentication Dial In User Service protocol and data packet encryption in detail.

本文对RADIUS协议的认证技术、数据包加密方式等进行了详细的讨论。

In the pre-process of embedding, both chaos encryption sequence and repletion code (a kind of simple error-correction code) are used to improve the security of watermark information and robustness of digital watermarking.

在水印嵌入前的预处理中,使用混沌序列加密和重复编码的方法来提高水印信息的安全性和数字水印的鲁棒性。

In this paper,we simply introduces the whole design scheme of security network access server; subsequently, we deeply analyse the principle and structure model of RADIUS and TACACS in the distributed security authentication system, and more explain the idea and implementation of design. On the other hand, in order to authencating、authorizing and accounting more securely, efficiently and accurately to the remote users, we put forward a series of key techniques which are used in analysis such as MD5 encryption arithmetic、packet retransfer、buffer storage、interprocess communication and so on, and prove the compatibility of the system through employing the commercial software Shiva AccessManager.

本论文首先简要介绍了《安全网络访问服务器》的总体设计方案;之后,深入分析了分布式安全认证系统RADIUS和TACACS的原理与结构模型,并进一步详细阐述了安全认证模块的设计思想和实现,深入剖析了系统中引用的MD5加密算法、数据包重发机制、缓冲区存储、进程间通信等技术,这些技术使得系统能安全、高效、准确地对远程用户进行认证、授权和计费,而且通过使用商用软件Shiva AccessManager的测试验证了该系统的通用性。

Browse 8 Unbounded Unbounded Unbounded Following the visit 6 and later a major technological breakthrough in addition to Microsoft-based browser full-transparent proxy encryption, the unbounded browse 8 opening of a new invention called the road to the Super Eagles agent server connection technology to coordinate a global search for a variety of resources for users to use a proxy server, fast, unlimited capacity, and technology platform for the global network free basis.

无界浏览8是继无界无界浏览6之后又一个重大技术突破,除了具备基于微软浏览器的全透明加密代理之外,无界浏览8启用了新发明的名为雄鹰之路的超级代理服务器连接技术,能够搜寻协调全球各种代理服务器资源供用户使用,速度快,容量无限大,并为全球网络自由技术平台奠定基础。

The optical image encryption with rotating invariance based on joint transform correlator is studied.

其次,本文开展了基于联合变换的旋转不变光学图象加密的研究并作了计算机模拟分析。

PE code, research PE file encryption and shell sabot code examples.

PE 相关代码,研究PE文件加密及加壳脱壳的事例代码。

The design process using subroutine Reuse, lock the safety aspects of the use of encryption technology.

本系统以AT89C51单片机为核心,LM386音频功率放大器、LED等构成外围电路,程序是用C语言编写,用Keil软件进行编译。

Scalar multiplication is the main operation in ECC. It determines the speed of encryption / decryption in ECC.

椭圆曲线密码算法中最主要的运算是数乘运算,数乘运算的效率决定了椭圆曲线密码算法的加解密速度。

Very fast and Secure Encryption method is used to scramble your secret data.

非常快速和安全的加密方法是用来争夺您的秘密数据。

第35/60页 首页 < ... 31 32 33 34 35 36 37 38 39 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。