加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The aspects of its safety uses popedom access control and MD5 encryption algorithm to protect user passwords, to get better security.
该网站界面美观,操作简洁明了,安全性方面采用了权限控制和 MD5加密算法加密用户密码,具有较好的安全性。
-
Cause 原因 This error likely means a resource adapter archive has been migrated where the passwords in the security principal map were encrypted on a different server using the encryption tool.
这个错误可能是指资源适配器档案已被迁移的密码的安全主要是加密的地图上不同的服务器使用的加密工具。
-
If you've gotten this far, you're probably convinced that Authenticated Encryption is a good thing, CBC-MACs are tricky (but have provable security with apppropriate counter mode encryptors), and it is best to use a canned solution.
如果你建立了这一步,你可能认为认证加密是一件好事,央行,互有棘手的(但有适当的计数器模式加密器可证明的安全性),这是最好使用罐装的解决方案。
-
In the design of SMCOS, introduce the software and hardware developing platform of SMCOS at first, then describe the system characteristic and hierarchical structure, tell the course of design and implementation of the software system of the SMCOS finally, mainly tell software architecture, design method to command interpreter, transmission module and file management, especially carry on deep explanation and discussion to the security environmental management of SMCOS, design the secure pseudorandom number generator according to systemic characteristic; Implement AES cryptographic algorithm, and optimize in term of the characteristics of AVR platform, make it reach the faster speed of encryption in case
在SMCOS的设计中,首先介绍了SMCOS的软硬件开发平台,然后描述了系统特性及其层次结构,最后讲述了SMCOS的软件系统设计与实现过程,主要讲述了SMCOS的软件架构、命令解释器、传输模块以及文件管理器的设计方法,特别对于SMCOS的安全环境管理进行深入的讲解及探讨,针对系统特点设计了安全的伪随机数生成方法;实现了AES加密服务模块,并针对AVR平台的特点进行了优化,使其在占用较小的代码空间的情况下达到较快的加密速度;改进了PIN的认证方法,对其传输过程提供了安全保护并采用了安全的验证方式以避免可能遭受的攻击:设计了相互认证命令,缩减了认证过程的时间消耗并提高了安全性。
-
In the paper, we improve CHAP protocol by substituting password in the protocol with fingerprint after analyzing the security of CHAP. In addition, an improved secure lock is designed by using the Chinese Remainder Theorem, which is used for key management of the confidential cell broadcast.
另外,针对GSM中加密小区广播的密钥管理问题,本文利用中国剩余定理设计了一种改进的"安全锁",用于加密小区广播的密钥管理,保证了系统的前向安全和后向安全,降低了系统开销。
-
The configuration of ID-based Encryption is analyzed. A new ID-based Encryption is realized with the Elliptic curve over the residue class ring.
分析了基于身份加密体制的构造框架,利用剩余类环上的椭圆曲线密码实现了一种新的基于身份的加密机制。
-
Firstly, the digital watermarking was transformed randomly, and then encrypted by chaos. The encrypted watermarking was transformed to one-dimensional row vector, and the pixel value was sorted. The coefficient of primitive image of stationary wavelet transformation was expanded to one-dimensional row vector, too, and then the sorted watermarking was embedded to the sorted low frequency and turned to two dimensions.
本算法先将数字水印图像进行置乱变换,然后将置乱后的水印图像进行混沌加密,将加密后的水印按行展开成一维行向量,并将像素值从大到小排序,将原始图像平稳小波分解得到的低频系数也按行展开成一维行向量,并按从大到小排序。
-
According to the requirement of network to video encryption, this paper proposed a new scalable encryption scheme.
为了满足网络对视频加密的要求,设计了一种可伸缩性视频加密的方案。
-
The first phase array ofthe AS γ experiment began to run in June 1990. The first phase array thatconsists of 49 plastic scintillate detector has an angle resolution of 1°, atrigger rate of 20Hz and a threshold energy of about 10TeV. The second phasearray was finished on the base of the first phase array in 1994, and after that, apart of the second phase array was made high density.
一期阵列由49个塑料闪烁体探测器组成,探测阈能为10TeV左右,事例触发率为20Hz,角分辨率小于1°。1994年在一期阵列的基础上进行了扩建,扩建后阵列比一期阵列有效面积增大8倍,随后进行了部分加密,建成二期/加密阵列。
-
The next signal is the Public Regulated Service which uses encrypted codes and data.
下一种服务是公共调整服务,它采用加密代码和加密数据库的双重保护。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。