查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
I'm listening to the cypherpunks not because I think that anarchy is a solution to anything but because it seems to me that encryption technology civilizes the grid-locking avalanche of knowledge and data that networked systems generate.
我之所以能听得进去密码浪子们的观点,并不是因为我觉得无政府主义是解决所有问题的万灵丹,而是因为在我看来,加密技术能够让因为网络系统而产生的那种知识和数据的雪崩,那种会将所有空隙填满堵牢的雪崩(grid-locking avalanche)平息下来或者至少变得&文明&一些。
-
This paper concentrates on the theory and technique of identity-based encryption and its application on Eamil system.
本文的主要工作是研究基于身份的加密体制及其在电子邮件系统中的应用。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
当人们尽力迎合数字交流,电子商务成为经济中的一支力量时,对于密码近乎魔术的译码和确认功能的需求日益迫切。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
当人们享受数字通讯,而且电子商贸在经济中变得很重要,对编码和认证近乎神奇的加密作用会很火热。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
谁能够抵制像移动电话和联网计算机这样的革新?它们使任何人在任何地方都能被听到。
-
After the folder encryption to exist independently EXE file, the software can be installed without an independent declassified.
加密后的文件夹,以EXE文件独立存在,不需安装本软件即可独立解密。
-
In structure, in order to offer the agility of scheme implementation, it adopts hierarchical design, combining the virtue of hybrid Identity-Based public key schemes, which makes signature and encryption arithmetics configured and decouples them.
在结构上,采用了层次式的设计,结合混合的基于身份公钥方案的优点,使得基于身份的签名和加密的功能可配置,并且解决了加密、签名算法的紧耦合问题,为方案的实现提供了灵活性。
-
The data cannot be decrypted because the key encryption algorithm it used does not match that of your certificate.
由于它所使用的密钥加密算法与您证书中的算法不匹配,无法对这些数据进行解密。
-
Therefore, it may happen that files encrypted by Encryption Workshop will not be decrypted by other software or vice versa.
因此,它可能发生的文件进行加密的加密讲习班将不会解密其他软件或反之亦然。
-
With link encryption, the data must be decrypted and re-encrypted at each of these points.
用链路加密时,数据必须在每一场点上进行解密和再加密。
- 推荐网络例句
-
It is suggested that TDS can be used as a new method for the analysis of pedogenesis and climatic change.
总之,热处理过程中磁化率的变化能非常灵敏地反映磁性矿物的转化情况,而且,这种转化往往与样品所经历的土壤化作用强度密切相关,因此,TDS可做为分析成土作用强度和古气候变化的一种新方法。
-
Therefore, in this chapter, I will research into the conflict and contradiction of the paternity. Also, in this novel, the father's behavior of "He who loves well chastises well." is quite suspicious, one of the reasons is that the father thought his son belonged to him. And then, this thesis quoted Lacan's theory to touch upon that someone who has accepted the concept of patriarchal society, he will be influenced for his whole life. That also reveals that human being has no choice sometimes in this society.
因此本章会先就父子关系的冲突与矛盾做深入的探讨,小说中的父亲似有对儿子爱之深责之切的行为,其原因可能在於父亲将儿子视为所有物所致;其次,论文将引用拉冈相关理论,讨论在父权社会中,不论身分为何,只要是已受父权社会观念根深蒂固影响的人物,终生都将受其所苦,此也揭示出人生存於社会上的无奈。
-
But these days, because of everybody's attention,"Super Marie " track begins suddenly to become eccentric, see a chess do not go out only action, be in it seems that sedulous and evasive what.
但这几天,因为大家的关注,"超级玛丽"的行踪突然开始变得古怪,只看棋不出招,似乎在刻意回避着什么。