查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In the short-run label can use all the common bolographic anti-false self adhesive identity applies on anti-counterfeiting technology, such as true color hologram, encryption, and synthetic, photochemical micro-kizami technology, such as relief can be an excellent anti-false effect.
在烫印标上可以运用所有在通用全息防伪不干胶标识上采用的防伪技术,比如像素全息、真彩色、合成加密、微刻、光化浮雕等技术,能起到极佳的防伪效果。
-
According to the anti-counterfeiting laser molded holographic imaging technology identifies the hologram of different can be divided into three dimensional laser pulse classics, bolographic anti-false and molded synthetic molding, multiple image laser molding, dynamic molding, dynamic grating molding, embedded hologram molded, inks encryption such as holographic laser molded anti-false identification.
根据激平模压全息不攻假标记全息图不败像技艺的差别可不兵其不合为经典、脉冲不一维激平模压全息不攻假标记以及不合不败模压、众轻图像激平模压、不静态模压、不静态平栅模压、隐不神全息模压、不攻假油墨加密激平模压等全息不攻假标记。
-
Thirdly, Instead of using one-dimensional coupled map lattices model, we have constructed a combinable model, which is consisted of an one-dimensional chain, a two-dimensional netting grid and another one-dimensional chain as the drive-response system. So both the system's complexity for secret key streams and the efficiency for encryption have been increased.
第三,改进了使用单纯的一维耦合格子模型,而采用一维链加二维网格再加上一维链的组合模型来构造驱动和响应系统,增强密钥序列复杂度的同时也提高了系统的加密效率。
-
HEUR/Crypted in particular signals files that have a suspicious structure of the program. Usually such files are protected by encryption mechanisms and are often manipulated afterwards to hide the real functionality.
HEUR/Crypt会特别指出具有可疑结构的程序、通常这种文件被加密保护并经常生成其他文件在运行后以试图隐藏其真实功能(看来这个启发就是为了报壳的,现在才明白
-
All that is needed is the password used for the encryption; decrypting and decompressing engine is encapsulated inside the archive.
所有需要的是密码,用来为加密;解密及解压缩引擎是封装内存档。
-
All that is needed is thepassword used for the encryption; the decrypting and decompressing engine is encapsulated inside thearchive.
所以这些只需要使用一个用于加密的密码;解压缩引擎被嵌入到了文件存档当中。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
In this paper, the author first introduces some basic conception of Cipher technology and Shannon model of secret communication, then the paper discusses and analyses the advantages and problems of symmetric algorithm and dissymmetrical encryption.
在介绍密码学基本概念以及Shannon保密通信模型的基础上,分析了对称密码算法和公钥密码算法的优点及其在应用中注意的问题,最后对密码算法的发展及其应用的未来做出展望。
-
Besides, this USB flash drives also features AES 256-bit encryption technology, driverless operation (Windows 2000/XP/Vista) and fully USB 2.0 compliant for high speed data transfer.
此外,这种USB闪存驱动器还具有的AES 256位加密技术,无人驾驶的运作(在Windows 2000/xp/vista )和完全兼容的USB 2.0高速数据传输。
-
Enhydra Oyster - Enhydra Oyster is a Java library for SMIME signing and encryption using different key strangths and algorithms.
Enhydra Oyster是为SMIME签名和加密提供的一个Java库,使用了不同的关键字方法和算法。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。