英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Sunlite - Sunlite is a BitchX script which features a translation of the environment into Spanish, Galego, English, Catala, Euskera, and Italian, color configuration with a theme manager, hotkeys support, sound playing on events, an MP3 player, a conference mode, ASCII art capability, a manager for windows, multi-server support, autojoin, autoidentify, and password encryption.

Sunlite是一个BitchX脚本,特点有把环境转译成西班牙语、加利西亚语、英语、加泰罗尼亚语、Euskera语和意大利语,带有主题管理器颜色配置、支持热键、事件发生时发出声音、MP3播放器、会议模式、ASCII技术、窗口管理器、多用户支持、自动加入、自动识别和密码加密。

Sunlite is a BitchX script which features a translation of the environment into Spanish, Galego, English, Catala, Euskera, and Italian, color configuration with a theme manager, hotkeys support, sound playing on events, an MP3 player, a conference mode, ASCII art capability, a manager for windows, multi-server support, autojoin, autoidentify, and password encryption.

Sunlite是一个BitchX脚本,特点有把环境转译成西班牙语、加利西亚语、英语、加泰罗尼亚语、Euskera语和意大利语,带有主题管理器颜色配置、支持热键、事件发生时发出声音、MP3播放器、会议模式、ASCII技术、窗口管理器、多用户支持、自动加入、自动识别和密码加密。

Encryption would meter it out, preventing you from filching other tiny bits of data that would hardly be worth protecting in other ways.

在这个过程中,加密技术可以调节信息的流量,防止你窃取那些在其它情况下根本不值得保护的小片段数据。

In this thesis, the research aims to combine the flexibleness of electrical equipment with the fast parallel optical computing, so that it can realize optical image encryption and recognition and high efficiency of information security protection.

本论文研究目的在于将传统电子设备的灵活性和光学的快速并行计算结合起来,实现光学图像加密和图像识别,实现高效的信息安全保护。

This paper proposes an extended image encryption algorithm, which is used to encrypt the confidential binary images into non-confidential garnished image.

文章提出了一种延拓的图像加密算法,该算法用于将机密的二值图像加密成非机密的伪装图像。

And the result has all-important guidable meaning for us to use the se sequences as keys for data multiple encryption based on simple XOR operation.

该结论的提出对用混沌二值序列作为密钥对数据流进行简单的异或加密时,是否可使用多重加密来增强效果具有非常重要的意义。

Harn and Kiesler proposed a public-key cryptosystem,digital signature and authentic encryption scheme based on Rabin's cryptosystem.

在文献[3]中,Harn和Kiesler对Rabin方案进行了改进,提出一种改进的公钥密码体制、数字签名方案和认证加密方案。

Certainly these works are not imaginably easy. However, I strongly recommend that the times of combination encryption not be so many.

目前对xml数据格式的处理,要么是基于全文整体进行的,要么是对需要进行保密的数据部分进行加密处理。

The mobility and wireless links bring some problems which won't occur in lineate networks. Some technologies about security that used in lineate networks frequently become useless. In order to resist the attacks, we can take some traditional preventive measures, such as encryption and validation, but it's not enough for the security of MANET, because it can only reduce, not eliminate the attacks.

要抵抗对Ad Hoc网络的袭击,可以采用一些传统的入侵预防技术,比如加密和鉴权,但是入侵预防技术只能减少袭击的发生,不能完全消除袭击,因此,有必要引入入侵检测技术,在袭击的早期阶段就收集足够的袭击证据,采取相应的抵抗措施,使侵害损失大大降低。

Finally , I put forward some methods on mediating work of encryption and decryption module and key management.

最后,还提出使加脱密模块和密钥管理的协调工作的解决方案。

第43/60页 首页 < ... 39 40 41 42 43 44 45 46 47 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。