查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
You're doing an article on encryption soft ware ?
你在写关于加密软件的文章吗?
-
Using conventional survey and ground encryption observations and T213 amount prediction product and fy-2c/2d infrared satellite cloud chart data, weather power diagnosis and mesoscale analysis of gale and strong sandstorm process initiated by squall line are carried on May 2, 2008 in east of Hexi corridor.
利用常规探测、地面加密观测、T213数值预报产品和fy-2c/2 d红外卫星云图资料对2008年5月2日河西走廊东部飑线引发的强沙尘暴过程进行了天气动力诊断和中尺度分析。
-
In the article, we analysised the rainstorm process using conventional information, encryption data, strength ,speed and wind profile data of Doppler radar, discussed the atmospheric circulation system in the westing process of the subtropical high; revealed the different reasons caused two heavy precipitation (more than 10 mm per hour) and the possibility of small and medium-scale system existed, displayed the vertical distribution of the wind field over the stations in the rainstorm process and the close relationship between the transmission., strengthen of the level air-jet and the heavy precipitation, and then proved that the heavy precipitation was caused by the transmission and strengthen of the low-level jet.
利用常规资料,加密观测资料,多普勒雷达强度、速度和风廓线资料等对本过程进行周密细致的分析。探讨了在副热带高压西进过程中与之相配合的大气环流形势和影响系统;揭示了造成两次强降水(1小时大于10 mm以上)的不同原因和中小尺度系统存在的可能性;展示了暴雨过程中测站上空垂直风场的分布特点以及风廓线高低空急流下传和加强与强降水的密切关系,证明了强降水的产生主要由低空急流的下传和加强引起的。
-
The encryption application can prevent important or private information from interception or wiretap on the Internet.
加密在网络上的作用就是防止有用或私有化信息在网络上被拦截和窃取。
-
What is one reason that WPA encryption is preferred over WEP?
下列哪一个是引起WPA首选加密技术是WEP的原因?
-
The 1 TB drive has all the features of its MiniStation siblings, including 256-bit AES encryption, and wrap-around USB cable.
1结核病驱动器的所有功能,它的MiniStation兄弟姐妹,包括256位AES加密和缠绕的USB电缆。
-
Firstly, this paper puts forward an improved authentication and key distribution scheme for internet environment, in which we adhibit multilevel authentication center, encryption technology of DES, RSA and one-way function to actualize the safety of communication among the different user on network and reduces the workload of the authentication institution; at the same time, this scheme can also assure the security of network. Besides, it use the temporary symbol and the responds" sign of both-side correspondent to replace time stamp and applies them to internet communication to countercheck "rebroadcast attack and accordingly resolves the problem that it needs synchronization for network clock.
本文在首先提出一种改进的Internet网络环境下的认证及密钥分配方案,该方案考虑采用了多级认证中心,DES、RSA和单向函数加密机制,实现了网络上不同用户间的安全通信,降低了网上认证机构的工作量,同时也能够保证网络的安全性;并用通信双方的临时标志和响应者标识来代替时间戳应用于Internet通信中以防止&重播&攻击,从而解决了以往需要网络时钟同步这一难题。
-
This is a complete set of AES encryption and decryption procedures, using V...
这是一套完整的AES加密解密程序,用VB编写,调试可用。
-
This is a complete set of AES encryption and decryption procedures, using VB, debugging available.
这是一套完整的AES加密解密程序,用VB编写,调试可用。
-
Network security encryption algorithm AES code, the hope everyone can be significant.
网络安全加密的AES算法代码,希望大家能用的着。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。