英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Like Cox, Sprague, and the cypherpunks, JEIDA counts on public-key encryption to keep these counts private and untampered as they are transmitted to the credit center. Peter Sprague says plainly,"Encrypted metering is an ASCAP for intellectual property."

和确斯,斯普雷格还有密码浪子们一样,他们也是把希望寄托在公共密钥的加密技术上面,希望这种加密技术可以让被传输的信息保持其私密性,不会被做了手脚,就像是向信用卡中心传输的那些信息一样。

Based on visual perception and image statistic characteristics, propose new techniques for content-aware key feature measurement, extraction and encryption of vidual media, consolidate foundations of mathematic theories of information hiding and embedding, propose robust capacity models and estimation methods for visual media information hiding and embedding; solve the key problems inherent in digital content certification of visual media, systematically establish controllable content-aware security mechanism of visual media

基于视觉感知和图像统计特性,提出可视媒体基于内容的关键特征度量、提取和加密的新方法;完善信息嵌入与隐藏的数学理论基础,提出高鲁棒性的可视媒体信息嵌入与隐藏的容量模型和方法,解决可视媒体的内容认证问题,系统地建立可控的可视媒体内容安全新机制。

If you're so devil-may-care as to omit encryption, the suite warns you that your network isn't secure.

如果你是抱着加不加密,鬼才在意呢这样的想法而删除加密的话,套件就会警告你说你的网络不安全。

There are several software protection tools in the market currently , but these tools were standalone nine tenths , and they only used simple encryption algorithms , so they could be cracked easily by the crackers .

现在市面上有许多反盗版软件,但这类软件多是单机处理,并且只使用简单的加密手段,很容易被解密者破解。

There are several software protection tools in the market currently , but these tools were standalone nine tenths , and they only used simple encryption algorithms , so they could be cracked easily by the crackers .

现在市面上有许多反盗版软閒,但这类软閒多湜单机处理,并且只使苚简单菂加密手葮,很容易被解密者破解。

This dissertation mainly discusses the technique of digital signature and authenticated encryption.

本文主要研究了数字签名和认证加密技术。

Our encryption matter's the very certificated .

我们的编码方法是非常复杂难解的。

This article introduces some encryption methods in common use, and analyses their advantages and disadvantages, and at last brings forward the scheme of "double software with certificating for two times ".

本文介绍几种目前常用的加密方法,并分析了它们的优缺点,最后提出了自己设计的&双软件两次认证&方案。关键词:软件保护;软件加密;双软件两次认证

The experiment demonstrates the algorithm is effective in the image encryption.The ciphered image has random-like distribution behavior of grey values,adjacent pixels have zero co-correlation properties and the deciphered image is perfect.

仿真实验表明,该算法可以有效地加密图像,密文具有在整个取值空间均匀分布的特性,相邻像素具有近似于零的相关性,且得到的密文可以无损还原。

I'm listening to the cypherpunks not because I think that anarchy is a solution to anything but because it seems to me that encryption technology civilizes the grid-locking avalanche of knowledge and data that networked systems generate.

而一个密码分子,就是网络之阳的阴,是一种能够将那种诞生于无中心的、分布式的系统之中的爆炸性的相互通联驯服的微小而隐蔽的力量。

第46/60页 首页 < ... 42 43 44 45 46 47 48 49 50 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。