查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
As to the procedure of obtaining evidence, the writer points out some procedures which are illegal and will result in the invalid of E-mail; as to the authenticity, several methods to identify were concluded and their advantages and disadvantages are also listed. In addition, the writer points out that the laws in force on the authenticity of E-mail were very macroscopic and vague. And there are not concrete laws in effect to identify the authenticity of E-mail without electronic signature and encryption. So the writer explains his views that each links of E-mail's lifecycle should be deeply analyzed and checked to exclude the possibilities of unauthenticity of E-mail.
就取证程序方面,该部分则指出了哪些取证程序是违反法律并可能会导致电子邮件无效;就电子邮件真实性的问题,本文主要从现有立法归纳出几种认定电子邮件真实性的具体方式,并阐述了这些方式的利弊,同时笔者还在该部分指出,现行法律对于电子邮件真实性问题的认识,仍仅停留在宏观层面,显得过于宽泛,尤其是针对未经签署电子签名和加密的电子邮件真实性的认定问题,现行法律没有进行具体规范。
-
The program uses unbreakable 256-bit AES encryption to provide you with peace of mind that your data is safe.
该软件使用牢不可破的256位AES 加密技术对你进行保护,让你放心数据的安全性。
-
If this sounds a bit complicated it does look a bit that way but also think of how complicated bit torrent is getting with seed box and protocol encryption, etc. Also with URD it is possible to create and download an NZB file from specified articles as well.
如果这听起来有些复杂,它看上去有点这样,而且多么复杂察看所有电影想与种子框和协议加密等,同时可以与用户要求文件就可以创建和下载从指定的文章,以及NZB文件。
-
Some of the encryption module, vector, key terms, arguments have done a brief introduction
对加密中的一些模块、矢量、密钥计算、变元做了简要的介绍
-
To solve this problem, an authenticated encryption schemes with public verifiability was proposed by Huang and Chang.
为解决该问题,HUANG和CHANG最近提出了一个可公开验证的认证加密方案。
-
To overcome this problem, Ma-Chen proposed an efficient authenticated encryption scheme with public verifiability.
为了解决此问题,Ma-Chen提出了一个有效的公开验证认证加密方案。
-
Furthermore, a model of authenticated encryption with public verifiability is presented by using generalized ElGamal type signatures.
根据新提出的认证加密方案,利用广义EIGamal类签名,给出了一类公开可验证的认证加密方案模型。
-
Animproved authenticated encryption scheme with public verifiability is proposed.
对一个消息可恢复式签名方案的安全性进行了分析,成功给出了两类伪造攻击。
-
Based on the DSP hardware, a novel encryption algorithm is designed, which can penetrate through RPE-LTP vocoder in GSM voice channel.
作品基于竞赛提供的DSP开发板,设计了一套新型抗RPE-LTP压缩编码的加解密算法。
-
Trunking communication in the field of mobile communication was an integral part, and voice encryption was its core technology.
语音加密是公网集群通信最核心的技术。
- 推荐网络例句
-
Lugalbanda was a god and shepherd king of Uruk where he was worshipped for over a thousand years.
Lugalbanda 是神和被崇拜了一千年多 Uruk古埃及喜克索王朝国王。
-
I am coming just now,' and went on perfuming himself with Hunut, then he came and sat.
我来只是现在,'歼灭战perfuming自己与胡努特,那麼,他来到和SAT 。
-
The shamrock is the symbol of Ireland and of St.
三叶草是爱尔兰和圣特里克节的标志同时它的寓意是带来幸运。3片心形叶子围绕着一根断茎,深绿色。