查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
I'm listening to the cypherpunks not because I think that anarchy is a solution to anything but because it seems to me that encryption technology civilizes the grid-locking avalanche of knowledge and data that networked systems generate.
我之所以能听得进去密码浪子们的观点,并不是因为我觉得无政府主义是解决所有问题的万灵丹,而是因为在我看来,加密技术能够让因为网络系统而产生的那种知识和数据的雪崩,那种会将所有空隙填满堵牢的雪崩(grid-locking avalanche)平息下来或者至少变得&文明&一些。
-
This paper concentrates on the theory and technique of identity-based encryption and its application on Eamil system.
本文的主要工作是研究基于身份的加密体制及其在电子邮件系统中的应用。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
当人们尽力迎合数字交流,电子商务成为经济中的一支力量时,对于密码近乎魔术的译码和确认功能的需求日益迫切。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
当人们享受数字通讯,而且电子商贸在经济中变得很重要,对编码和认证近乎神奇的加密作用会很火热。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
谁能够抵制像移动电话和联网计算机这样的革新?它们使任何人在任何地方都能被听到。
-
After the folder encryption to exist independently EXE file, the software can be installed without an independent declassified.
加密后的文件夹,以EXE文件独立存在,不需安装本软件即可独立解密。
-
In structure, in order to offer the agility of scheme implementation, it adopts hierarchical design, combining the virtue of hybrid Identity-Based public key schemes, which makes signature and encryption arithmetics configured and decouples them.
在结构上,采用了层次式的设计,结合混合的基于身份公钥方案的优点,使得基于身份的签名和加密的功能可配置,并且解决了加密、签名算法的紧耦合问题,为方案的实现提供了灵活性。
-
The data cannot be decrypted because the key encryption algorithm it used does not match that of your certificate.
由于它所使用的密钥加密算法与您证书中的算法不匹配,无法对这些数据进行解密。
-
Therefore, it may happen that files encrypted by Encryption Workshop will not be decrypted by other software or vice versa.
因此,它可能发生的文件进行加密的加密讲习班将不会解密其他软件或反之亦然。
-
With link encryption, the data must be decrypted and re-encrypted at each of these points.
用链路加密时,数据必须在每一场点上进行解密和再加密。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。