查询词典 hashing function
- 与 hashing function 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
A possible member of that category is a hash table with a hashing function that is a heuristic based on the problem at hand.
一种可能的成员,这一类是一个哈希表的哈希函数这是一个启发式的问题的基础上在手。
-
A mathematical formula, called a hashing function, is used to produce a unique number that will identify the record's physical location on the disk.
所谓的杂凑函数,是用来制造了一个独特的识别号码,将记录的物理位置在磁盘上。
-
The finding is that the well-known function for hashing sequence of symbols, ELFhash, is not very good in this regard, and the other two functions are better and thus recommended.
在Web信息处理的研究中,不少情况下需要对很大的URL序列进行散列操作。
-
A hashing function accepts a symbol name and returns a value that may be used to compute a bucket index.
一个哈希函数elf_hash接受一个符号名然后返回一个值,该值可以用于计算bucket数组索引。
-
The smart card system is due to an application of RFID, the first scheme of our research is using this to help store the information of authentications. It uses hashing function combined with smart card to the network authentication for the most part to cut down the cost of computation as well as communication and further accomplish higher security.
智慧卡属於射频辨识的一种应用,本研究的机制一为使用智慧卡系统辅助储存认证用资讯,并采用杂凑函数结合智慧卡的方式来进行网路认证,以降低计算与通讯的成本,并达到高度安全性。
-
To support secure group communications in resource constrained wireless sensor networks, We propose an efficient and scalable key management scheme which only uses symmetric cryptographic algorithms and hashing function. This scheme can achieve forward and backward security.
为了在有限资源的无线传感器网络能安全进行群组通讯,本文只使用对称加密算法和单向哈希函数提出了一种具有有效性和扩充性的组密钥管理方案,并可满足前向和后向安全性。
-
Search of Chinese characters; hashing; hash function; adaptive hashing
关键字]汉字查找;散列查找;散列函数;自适应散列查找
-
Based on the coupled discrete tent spatiotemporal chaotic maps, a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.
与帐篷映射相比,该方案所采用的离散耦合帐篷时空混沌模型避免了有限精度实现产生的短周期行为,产生的时间序列近似服从均匀分布,具有更为理想的扩散与混乱特性。
-
The watermark structure was divided into sub-blocks and calculated by linear hashing function, which includes both the sequence information and the quantity information of the nodes. A constant migration technique wraps the integrity checking in the normal logical judgment operation of the watermarked program.
利用线性哈希函数对水印结构进行分块计算,既包含了结点顺序信息,又包含了结点数量信息,同时采用常量迁移技术使完整性检查隐藏在程序本身正常的逻辑判断语句中。
-
The client computer receives the information from KDC and runs the user.s password through a one-way hashing function, which converts the password into the user.s KA. The client computer now has a session key and a TGT so that it can securely communicate with the KDC. The client is now authenticated
客户机受到了KDC的信息,然后通过单向的hash算法将用户密码转换成user's KA,现在客户计算机拥有了一个会话key和一个TGT,使得其可以和KDC安全通讯,现在客户通过了域验证,并且准备访问域内的资源。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。