英语人>网络例句>hash function 相关的网络例句
hash function相关的网络例句

查询词典 hash function

与 hash function 相关的网络例句 [注:此内容来源于网络,仅供参考]

A possible member of that category is a hash table with a hashing function that is a heuristic based on the problem at hand.

一种可能的成员,这一类是一个哈希表的哈希函数这是一个启发式的问题的基础上在手。

Based on the coupled discrete tent spatiotemporal chaotic maps, a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.

与帐篷映射相比,该方案所采用的离散耦合帐篷时空混沌模型避免了有限精度实现产生的短周期行为,产生的时间序列近似服从均匀分布,具有更为理想的扩散与混乱特性。

For simplicity of this discussion, when the one-way function does not incorporate a secret key, other than the password, we refer to the one way function employed as a hash and its output as a hashed password.

为简化这项讨论中,当单向函数并不包含密钥以外的密码,我们指的是单程功能聘为哈希和其输出作为一个散列密码。

Experimental results show that the hash function based on the Web site achieves the goal of the distributed Web crawler.

单处理机系统受限于CPU的处理能力和磁盘存储的容量,不可能具备这种处理海量信息的能力,更不必说跟上Web信息的飞速增长了。

The key technologies of which are hash function zero knowledge proof and digital signature.

消息完整性及真实性认证是防止消息被篡改、删除、重放和伪造的一种有效方法,其关键技术为:哈希函数、零知识证明和数字签名。

This scheme is based on the PRIMAR protection scheme, adopt Blowfish algorithm to encrypt, use Hash function (SHA-1) and Cyclic Redundancy Check to make sure the data integrity, and adopt DSA signature.

该方案基于PRIMAR保护方案发展而来,采用Blowfish分组算法对海图信息加密保护,通过SHA-1哈希函数和CRC循环冗余校验确保传输数据的完整性,并采用DSA算法进行签名认证。

The General Purpose Hash Function Algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithms in the C++ programming language.

通用哈希函数运算法则库包括一系列通常使用的附加的或者循环的字符窜散列法运算法则,在C++程序语言中。

The original video is spitted into a series of frame groups,for each frame in the group,the points of contour shape are described by MPEG-7,and taking advantage of hash function to calculate the keys between those points in the 1D- DFT transform domain and the watermark signals.

在该算法中,原始视频数据被分割成等帧数的视频组,利用MPEG-7的轮廓编码计算每个视频帧的主要物体轮廓坐标点集合;接着通过傅立叶变换得到该帧轮廓点形状不变量,利用哈希的方法计算水印信号并将这些不变量的有效值作为密钥之一;再对整个视频组的轮廓点进行傅立叶变换,得到其时间轴上的有效不变域,将水印信号嵌入在这个不变域的中频部分以确保了水印的鲁棒性。

Then two steganographic schemes with the ability of information authentication are designed by combining with Hash function and digital signature algorithm. Finally, the authentication security of the two schemes under active attacking istheoretical ratiocinated.(5) A public key steganographic system using gray image as the cover-object is developed.

设计了一种以灰度图像为隐秘载体的公钥隐秘通信方案,在嵌入相当大的数据量时,信息隐藏过程仍然较好地保持了原始图像的质量和统计特性,从理论和实验两方面对方案的安全性进行了分析。

In this paper,the security of the YHSW scheme is analyzed.The bilinear parings and Hash function are adopted to propose an id-based multi-proxy multi-signcryption scheme with the property of proxy revocation.

分析了YHSW方案的安全性,并利用双线性对和哈希函数,提出了一个可撤销代理权的基于身份的多代理多签密方案。

第5/6页 首页 < 1 2 3 4 5 6 > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。