加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The scheme adopts a multi-agent system and a threshold secret share technology, in which the secret information and the shares are carried by many different agents, adopts D-H key exchange technology to encrypt intermediate result to hide real intention of agent, to protect the privacy of agents and to enhance the reliability and the fault-tolerance capability of the mobile agent system. A mobile agent with limited authorization can sign a message on behalf of a user at far-end without divulging the user s private key. In order to avoid rebuilder attack the time-stampe mechanism is adopted.
运用信息加密和身份认证技术,实现了移动Agent和Agent平台间双向身份认证,有效地防止了恶意Agent对Agent平台的攻击或越权访问以及恶意Agent平台对Agent的攻击;引入远端可信任的代理平台作为数据处理平台,采用多代理系统和门限秘密共享技术,将加密信息和密钥由多
-
It can be strongly extended because we can load various DLL in Client terminal for different test. Compared with LoadRunner , Test Main Console resolves the problem that we can't make the information of the product whose communicated function is encrypt which obtained in network parameterized. It can test the software using encrypting communication. Because material test module is loadable, Test Main Console has good tractility.
主控台是该项目的灵魂,再客户端可以加载不同的测试程序,具有很强的扩展性和LoadRunner相比,测试主控台解决了采用加密传输方式的软件产品无法将网络中获取的命令参数化的问题,可以对加密方式的软件进行压力测试,同时由于具体的测试模块是可加载的,程序具有良好的延展性。
-
The main features of this paper is: nothing to do with the platform, this system can be compatible with the majority of software and hardware used by the platform, as well as various database platform, shielding the differences of hardware and software platform such as network, operating systems, databases, application systems and so on, so that enterprises and institutions could achieve seamless, transparent data exchange through data exchange system; Java technology used to develop the system transplantability; using data exchange center to achieve centralized data processing, different data format conversion, increased system scalability; from data transmission, authentication, access control, encryption and more news content log-class areas enhanced data exchange system security; using DES and RSA algorithm , increased the confidentiality of data transmission; create WrapperTimer category achieved data transmission timing implementation and reduce the dependence on artificial.
设计的系统与平台无关,能兼容企业所用的大多数软硬件平台,以及各种数据库平台,屏蔽网络、操作系统、数据库、应用系统等软硬平台的差异,使企事业单位通过数据交换系统实现无缝的、透明的交换数据;采用数据交换中心来实现数据的集中处理、不同数据格式的转换,增加了系统的可扩展性;从数据传输、身份认证、权限控制、消息内容加密和多级日志等多方面增强数据交换系统的安全性;用DES和RSA算法对XML文件或XML文件中的元素进行加密,增加传输数据的保密性;创建WrapperTimer类实现了数据传输的定时执行,降低了对人工的依赖性。
-
In a point to point encryption of the TETRA system, the trunking system does not participate in the key generation and management, and only provides the clear channel for transportation.
在TETRA 系统的端到端加密中,集群系统不参与密钥的产生和管理,也不规定加密算法,只提供透明传输通路。
-
Elliptic Curve Signature Algorithmis used to provide unforgeability of user public key.
采用椭圆曲线签名算法保证用户自主生成公钥的不可伪造性,利用用户公钥生成的会话密钥以对称加密算法加密明文,保证明文的机密性,对明文空间的大小没有严格限制。
-
I decided to make my encrypted filesystem live in a regular file rather than its own partition. This requires less tweaking of the disk, and makes mounting and unmounting the encrypted filesystem easier, as you will see later.
您可将加密文件系统保存在一个特定的文件当中而不是单独分区,这样不要对磁碟做太多的调整便让对加密文件系统的登录和退出操作变得更加容易。
-
I decided to make my encrypted filesystem live in a regular file rather than its own partition. This requires less tweaking of the disk, and makes mounting and unmounting the encrypted filesystem easier, as you will see later.
您可将加密文件系统保存在一个特定的文件当中而不是单独分区,这样不要对磁盘做太多的调整便让对加密文件系统的登录和退出操作变得更加容易。
-
The remaining oil research results of Xing1-3 region showed: although secondary and part tertiary infilling wells were drilled, the recovery percent of reserves of the untabulated reservoir can't reach anticipative index.
杏1-3区表外储层剩余油研究结果表明,该区块虽然经过二次加密和局部三次加密,但目前注水开发方式下表外储层动用程度仍然较差,存在大量剩余油。
-
Like Cox, Sprague, and the cypherpunks, JEIDA counts on public-key encryption to keep these counts private and untampered as they are transmitted to the credit center. Peter Sprague says plainly,"Encrypted metering is an ASCAP for intellectual property."
和确斯,斯普雷格还有密码浪子们一样,他们也是把希望寄托在公共密钥的加密技术上面,希望这种加密技术可以让被传输的信息保持其私密性,不会被做了手脚,就像是向信用卡中心传输的那些信息一样。
-
If you're so devil-may-care as to omitencryption, the suite warns you that your network isn't secure.
如果你是抱着加不加密,鬼才在意呢这样的想法而删除加密的话,套件就会警告你说你的网络不安全。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。