查询词典 encryption
- 与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It means that the accepter must decrypt them in triple-DES firstly, in RSA secondly, the order is rightly reverse to the encryption's order.
这样可以让数据对象的原文被窃取的难度增加,继而达到更好的保密作用。
-
According to the function, the system can be divided into three modules: mobile terminals encryption module, secure access module and certificate authority module.
本系统按其功能可分为三个模块:移动终端加密模块、安全接入模块和权威机构认证模块。
-
Of modern information technology to the enterprise's internal control has given new meaning, financial accounting control to manual control by the common man-machine control, such as password control, data encryption, the functions of authority, access, operation log management.
现代信息技术给企业的内部控制赋予了新的内涵,财务会计控制也由人工控制变为人机共同控制,如口令控制、数据加密、职能权限、访问权限、操作日志管理等。
-
The facets of customer verification ,access control ,authority management ,log audit ,data encryption , digital signature are researched and implemented to some extent.
具体对身份认证、访问控制、权限管理平台、日志审计、数据加密、数字签名等方面进行了研究和一定程度的实现。
-
The facets of customer verification, access control, authority management, log audit, data encryption, digital signature are researched and implemented to some extent.
具体对身份认证、访问控制、权限管理、日志审计、数据加密、数字签名等方面进行了研究和一定程度的实现。
-
The second layer of encryption is unique to each addressee, at least in that each addressee has a unique key.
第二层加密是独一无二的,以每个收件人的,至少在每个收件人有其独特的关键。
-
For implementing the encryption/decryption and information hiding for digital multimedia, and aiming to generate enough large cipher key space, the accurate period of high dimension random matrix scrambling transformation is studied with the help of number theory and algebraic theory.
为了适合数字多媒体特性,实施多媒体加密与信息隐藏,生成充分大的密钥空间,使用了数论、近世代数、算法分析等工具,对高维随机矩阵置乱变换的精确周期进行了研究。
-
The network security is an affected area very widespread question, the topic research content: The network security rank, the data encryption technology, the firewall technology concept, the function, introduced the network security faces main threat as well as question countermeasure, and through the example some company network analysis situs chart from the analysis network security movement environment explained the example plan as well as supplements four safe disposition.
网络安全性是一个涉及面很广泛的问题,课题研究的内容:网络安全级别、数据加密技术、防火墙技术的概念、作用,介绍了网络安全面临的主要威胁以及问题的对策,并且通过实例某公司网络拓扑图从分析网络安全的运行环境来说明实例方案以及补充四点安全的配置。
-
Government may not give encryption back to the people for a number of antiquated reasons.
可是,政府会因为许多过时的理由可能还不把该技术交还人民。
-
Routines with the previous upload declassification procedures supporting the encryption process, completed a 16 encryption.
该例程是与先前上传的解密程序配套的加密程序,完成16轮分组加密。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。