英语人>网络例句>encrypts 相关的网络例句
encrypts相关的网络例句

查询词典 encrypts

与 encrypts 相关的网络例句 [注:此内容来源于网络,仅供参考]

This program encrypts your personal data using strong encryption algorithms like Triple DES and Blowfish.

此程序加密您的个人资料,使用强大的加密算法,像三重DES和河豚。

It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption.

它可以在3个层次上,使用448位Blowfish加密,具有模糊性的高级加密。

Afterward, the main control desk encrypts the session key by using a public key, and transfers encrypted configuration information and session key to configuration server of network phone.

然后,主控台以一公开密钥对会话密钥进行加密,并传送已加密过的配置信息与会话密钥至网络电话配置服务器。

To address the latter issue, security analyst Bruce Schneier, chief technologist for BT Counterpane , uses whole-disk encryption on his laptop and then a second layer: He encrypts individual files on the machine separately, with a different password.

BT Counterpane 首席技术专家,布鲁斯 Schneier 安全分析师为了解决后面的问题,在他的笔记本电脑上进行整盘加密,然后进行第二个层次:他在机器上分别用不同的密码加密个人文件。

Ethernet data stream with HTML format and DVB-C data stream with MPEG2 format is inputted in form of ASI and SPI, and send it into FIFO via 74F675A. 5416 packs and encrypts and transfers to DVB-C and Ethernet by time diplex mode. Thereby, data bus access is realized.

HTML格式以太网数据流和MPEG2格式DVB-C数据流以ASI和SPI形式输入,经74F675A串并转换进入FIFO.5416进行打包和加密并以时分复用方式传输DVB-C和以太网数据,实现数据总线访问。

The article mainly research cryptography applying in digital encrypts technique base on PKI and mainly includes three steps: public key encipher, digital signature and key distribution.

本论文主要是对密码学在信息加密技术中的应用进行研究,主要是基于PKI公钥密码体制来对公钥数据加密、数字签名和密钥分配这三个方面进行研究。

A virtual private network both encrypts all of the data transmitted between you and your VPN and creates an exit point in another geographical location.

虚拟专用网络都加密所有传送的数据与您和您的VPN和创建一个出口点在另一个地理位置。

In the meantime, we got several achievements during the process:Firstly, a sequence encryption algorithm of real-time video in use of one dimension piece-wise linear chaotic map is carried out. This algorithm makes use of Inter' s SSE2 special dictates and makes nonlinear change of chaotic sequences.As a result, the algorithm not only encrypts faster, but also resists several cipher analysis methods. Secondly, this paper presents a block encryption algorithm of real-time video based on chaotic neural network which makes use of numerical transient chaotic neural network to produce chaotic sequences and uses these sequences to do encryption.

同时,在实现系统的过程中,取得了以下研究成果:(1)提出了一种利用一维的分段线性混沌映射来对实时视频进行序列加密的算法,该算法利用Inter的SSE2专用指令集来实现,并对产生的混沌序列进行了有效的非线性变换,从而使该算法不仅加密速度快,并且能有效的抗多种密码分析;(2)提出了一种利用混沌神经网络对实时视频进行分组加密的算法。

Nyx Password Storage encrypts all your passwords and other information using Blowfish cypher algorythm, so even if you loose your smartphone/PDA or it is stolen, nobody will be able to access your private information.

店密码加密存储您所有的密码和其他信息使用河豚的CYPHER algorythm ,所以即使你松散,您的智能手机/ PDA或这是被盗,没有人将能够获得您的私人信息。

On egress, the secY computes and appends a new ICV to the frame and encrypts it, if desired, before sending it out.

在出口处,secY计算并在帧上设置新的完整性检查值,如果需要,则将其加密后,再发送出去。

第1/6页 1 2 3 4 5 6 > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。