英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

This paper also introduces Remote Authentication Dial In User Service protocol and data packet encryption in detail.

本文对RADIUS协议的认证技术、数据包加密方式等进行了详细的讨论。

In the pre-process of embedding, both chaos encryption sequence and repletion code (a kind of simple error-correction code) are used to improve the security of watermark information and robustness of digital watermarking.

在水印嵌入前的预处理中,使用混沌序列加密和重复编码的方法来提高水印信息的安全性和数字水印的鲁棒性。

In this paper,we simply introduces the whole design scheme of security network access server; subsequently, we deeply analyse the principle and structure model of RADIUS and TACACS in the distributed security authentication system, and more explain the idea and implementation of design. On the other hand, in order to authencating、authorizing and accounting more securely, efficiently and accurately to the remote users, we put forward a series of key techniques which are used in analysis such as MD5 encryption arithmetic、packet retransfer、buffer storage、interprocess communication and so on, and prove the compatibility of the system through employing the commercial software Shiva AccessManager.

本论文首先简要介绍了《安全网络访问服务器》的总体设计方案;之后,深入分析了分布式安全认证系统RADIUS和TACACS的原理与结构模型,并进一步详细阐述了安全认证模块的设计思想和实现,深入剖析了系统中引用的MD5加密算法、数据包重发机制、缓冲区存储、进程间通信等技术,这些技术使得系统能安全、高效、准确地对远程用户进行认证、授权和计费,而且通过使用商用软件Shiva AccessManager的测试验证了该系统的通用性。

Browse 8 Unbounded Unbounded Unbounded Following the visit 6 and later a major technological breakthrough in addition to Microsoft-based browser full-transparent proxy encryption, the unbounded browse 8 opening of a new invention called the road to the Super Eagles agent server connection technology to coordinate a global search for a variety of resources for users to use a proxy server, fast, unlimited capacity, and technology platform for the global network free basis.

无界浏览8是继无界无界浏览6之后又一个重大技术突破,除了具备基于微软浏览器的全透明加密代理之外,无界浏览8启用了新发明的名为雄鹰之路的超级代理服务器连接技术,能够搜寻协调全球各种代理服务器资源供用户使用,速度快,容量无限大,并为全球网络自由技术平台奠定基础。

The optical image encryption with rotating invariance based on joint transform correlator is studied.

其次,本文开展了基于联合变换的旋转不变光学图象加密的研究并作了计算机模拟分析。

PE code, research PE file encryption and shell sabot code examples.

PE 相关代码,研究PE文件加密及加壳脱壳的事例代码。

The design process using subroutine Reuse, lock the safety aspects of the use of encryption technology.

本系统以AT89C51单片机为核心,LM386音频功率放大器、LED等构成外围电路,程序是用C语言编写,用Keil软件进行编译。

Scalar multiplication is the main operation in ECC. It determines the speed of encryption / decryption in ECC.

椭圆曲线密码算法中最主要的运算是数乘运算,数乘运算的效率决定了椭圆曲线密码算法的加解密速度。

Very fast and Secure Encryption method is used to scramble your secret data.

非常快速和安全的加密方法是用来争夺您的秘密数据。

You won't fail to be impressed with the outstanding e-mailing that is possible with the Blackberry 8800 and you will enjoy staying connected and there is more to it than simple Internet connectivity; it also has encryption available that will make your emails a lot securer.

你不会不留下深刻印象的优秀电子邮件这是可能的黑莓8800 ,您将享有保持联系,并有更多它不是简单的互联网连接,它也可以加密,使您的电子邮件很多安全的。

第35/60页 首页 < ... 31 32 33 34 35 36 37 38 39 ... > 尾页
相关中文对照歌词
Headless Princess
Self Explanatory
No Church In The Wild
推荐网络例句

Methods Clinical data of 3 cases of bile duct injury during laparoscopic cholecystectomy were analyzed retrospectively.

回顾总结3例LC术中胆管损伤的临床资料,分析3例胆管损伤的原因及对策。

These techniques are applied to the gobang.

本文将这些技术用于五子棋中。

I don't want to add to your trouble.

我不想给你增加麻烦。