查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The quality of decrypting watermark under the different sizes of encryption keys has been discussed. The simulation results prove the theoretical analysis.
计算和分析了二元位相密钥的空间分布对水印信息提取质量的影响,计算结果验证了理论的正确性。
-
In this paper we study the problem of database encryption keys at the field level. We give four methods for generating field keys and show that they are all superior to Denning's methods.
本文研究字段一级的数据库加密的密钥问题,我们给出四种字段密钥产生方法,并说明它们都优于Denning的方法。
-
In order to avoid trade disavowing and guarantee square deal in e-business, the impartial e-business technical system based on Trusted Third Part was put forward., By use of the TTP, digital signature, encryption and decryption technologies,the system guaranteed the security and reliability of the -e-business trade.
在电子商务中,为了防止交易抵赖,保证买卖双方在交易时的公平性,提出了基于第三方认证的公平电子商务技术体系。该系统借助可信第三方技术、数字签名和加密等技术,确保电子交易的安全性和可靠性。
-
I am also not disclosing the encryption algorithm used for providing ultimate security standards.
我也没有披露加密算法,用於提供最终的安全标准。
-
By disordering randomly the position of pixels of the wateamarking image,encryption is achieved.
在该方案中,通过对水印像点的位置进行随机置乱,达到加密的目的。
-
With the increasingly development of Network Technology, the data must be enciphered to protect from being intercepted or modified. So, the security of Computer Data Communication became a focus of our society, which leads to the development of encryption and deciphering technique of Computer Data Communication Security.
随着网络技术的不断发展,为了保护数据在传递过程中不被别人窃听或修改,我们必须对数据进行加密,从而计算机数据通信的安全问题也就成为当今网络社会的焦点,也自然导致了加密、解密等一系列关于计算机数据通信安全技术的产生和发展。
-
But if what we have is a random OTP, enciphered by simple columnar transposition, and the message, first with the OTP applied, and then enciphered by Playfair, then it is not at all clear how we can apply techniques analogous to those used against these two ciphers in the double encryption case.
但是,如果我们有一个随机的OTP ,加密由简单的柱状换位,并邮件时,先与检察官办公室申请,然后由加密playfair ,那么,它现在还不很清楚,我们如何能够适用技术类似于那些用来对付这两个密码在双重加密的情况。
-
All business logic components are based on DCOM. It provides the Business Process Reengineering function, and output/input interfaces based on XML in order to exchange data with different operating system and platform. The system adopts dual encryption with software and hardware: Encapsulating the function of CryptoAPI of Microsoft provides file enciphering interface and file deciphering interface.
本系统采用软加密和硬加密结合的方式来保护软件:封装微软加密库,形成加密、解密组件,提供加密接口和解密接口函数;采用Access库的安全机制,对数据库建立SqServer.mdb三级安全机制;将用户数量写入硬件加密狗中,控制客户端的数量。
-
The system adopts dual encryption with software and hardware: Encapsulating the function of CryptoAPI of Microsoft provides file enciphering interface and file deciphering interface.
本系统采用软加密和硬加密结合的方式来保护软件:封装微软加密库,形成加密、解密组件,提供加密接口和解密接口函数;采用Access库的安全机制,对数据库建立SqServer.mdb三级安全机制;将用户数量写入硬件加密狗中,控制客户端的数量。
-
Some of the common ways of implementing message level security is by encrypting data using some standard encryption algorithm.
在实施信息安全的水平,一些常用方法是使用一些数据加密标准的加密算法。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。