英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

You won't fail to be impressed with the outstanding e-mailing that is possible with the Blackberry 8800 and you will enjoy staying connected and there is more to it than simple Internet connectivity; it also has encryption available that will make your emails a lot securer.

你不会不留下深刻印象的优秀电子邮件这是可能的黑莓8800 ,您将享有保持联系,并有更多它不是简单的互联网连接,它也可以加密,使您的电子邮件很多安全的。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不可复制,多重加密,数据更加安全的特点,用于票据、证件、物品上,达到防伪目的。

Procedures for the encryption code is a good code, you can have the software serial number.

为程序加密的代码,是一个很好的代码,可以为你的软件产生序列号。

Hua Xin Zhong An has advanced wireless Long-range surveillance technology and military digital encryption techniques. We can provide reliable long-range surveillance service for those common technology can not be reached areas, such as oil field, shipside, diggings, storehouse, etc.

华信中安以先进的无线远程监控技术及军用级的数字加密方式,可为油田、码头、矿厂、重要仓库等一些传统布线无法满足的部位提供可靠的远程监控技术。

Hua Chuang Zhong An has advanced wireless Long-range surveillance technology and military digital encryption techniques. We can provide reliable long-range surveillance service for those common technology can not be reached areas, such as oil field, shipside, diggings, storehouse, etc.

华创中安以先进的无线远程监控技术及军用级的数字加密方式,可为油田、码头、矿厂、重要仓库等一些传统布线无法满足的部位提供可靠的远程监控技术。

Hua Chuang Zhong An has advanced wireless Long-range surveillance technology and military digital encryption techniques. We can provide reliable long-range surveillance service for those common technology can not be reached areas such as oil field shipside diggings storehouse etc.

华创中安以先进的无线远程监控技术及军用级的数字加密方式,可为油田、码头、矿厂、重要仓库等一些传统布线无法满意的部位提供可靠的远程监控技术。

A proxy signature scheme based on encryption and blind signature was proposed to protect original signer's privacy.

为了保护原始签名人的隐私,提出了一种基于加密和盲签名的消息保密的代理签名方案。

The source of Hill simple algorithm to achieve, Compression packet contains crypt and decrypt two catalogs, respectively encryption...

本源码是对Hill算法的简单实现,压缩包内包含crypt和decrypt两个目录,分别为加密和解密。

Can be a simple document to the machine encryption.

可以简单的给本机文件加密。

Used for data encryption and decryption, signature verification function of the source code.

用于对数据进行加密解密,签名验证等功能的源代码。

第36/60页 首页 < ... 32 33 34 35 36 37 38 39 40 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。