英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

Now comes an interesting question: When your browser encrypts and decrypts data that it shares with a Web site, where does this secret key come from?

现在有个很有趣的问题:当你的浏览器加密加密日期共享一个网业,这些机密是从哪来的?

If your company is trying to understand tokenization and end-to-end encryption (E2E) you could do a lot worse than purchasing a copy of the Forrester research paper, Demystifying Tokenization and Transaction Encryption .

如果你的公司正在试图了解记号化和终端到终端的加密,你可以做很多事情不如购买副本 Forrester的研究报告,加密解密断词与交易。

This dissertation uses the double-encrypting method based on the public key technology to protect the agent from being eavesdropped, providing a feasible measure to detect counterfeit codes in the host to ensure the security of the agent in the process of transmission.

本文利用公钥加密手段,采用双重加密方法阻止恶意用户对主体信息的窃取,提供一种识别假冒代码的手段保障主体在传输过程中的安全。

With the increasingly development of Network Technology, the data must be enciphered to protect from being intercepted or modified. So, the security of Computer Data Communication became a focus of our society, which leads to the development of encryption and deciphering technique of Computer Data Communication Security.

随着网络技术的不断发展,为了保护数据在传递过程中不被别人窃听或修改,我们必须对数据进行加密,从而计算机数据通信的安全问题也就成为当今网络社会的焦点,也自然导致了加密、解密等一系列关于计算机数据通信安全技术的产生和发展。

The chip was composed of an existing core and a calculating module that we designed ourselves. This can extend DSP and accelerate enciphering speed.

新的加密芯片由一块已有的DSP Core和我们自己所设计的计算单元组成,这样既可以发挥DSP软件扩展性好又可以加快加密速度。

The research on the C OMSEC cipher device in this paper is mainly to study the process- ing technique of data enciphering in the user's access channel in th...

COMSEC密码装置的研究,主要是研究计算机网络中用户存取通道上的数据加密处理技术,作者认为对传输信道的最大攻击是&劫抄&,对付非法存取的唯一有效对策是数据信息的密码化,即信息加密是围绕计算机系统的处理的信息本身实施信息保护。

The BORUI software belongs to the field of computer software technology, and is characterized by that after the BORUI software is mounted in computer, when the mourse is placed on the icon of an unopened file, one window can be automatically ejected, the file contents or preset contents can be displayed in the window, after the file is opened, the preset contents also can be looked up by means of software function; in the computer said BORUI software has several functions; inhibiting deletion, enciphering deletion function and making reference and comparison between various files with different types and different forms.

BORUI软件属于计算机软件领域,其特征在于:当计算机安装BORUI软件后,将鼠标放置在一个未打开的文件的图标上时会自动弹出一个窗口,窗口中可显视其文件内容或预先设定的内容;在文件打开后也可以通过软件功能查看其预先所设定的内容;通过软件功能可将计算机中不同类型不同格式的文件设定成为禁止删除;可为删除功能加密,为删除功能加密后,只能通过输入正确的密码才可以将文件删除;通过软件的功能可以在文件中的文字与文字、图像与图像、视频与视频、动画与动画、音频与音频等不同类型不同格式的各种文件之间进行参照与对比。

This is used to encrypt the first portion of the data to be encrypted.

这是用于加密数据的第一部分是加密的。&/页&

Some of the common ways of implementing message level security is by encrypting data using some standard encryption algorithm.

在实施信息安全的水平,一些常用方法是使用一些数据加密标准的加密算法。

In part of the AAA, the application of information encrypts and authentication about users identity can resolve the above problem.

在数据的网络传输部分,本文采用AAA机制,进行了信息加密、用户身份认证等安全措施的应用,加密算法采用了国际流行的DES标准。

第20/100页 首页 < ... 16 17 18 19 20 21 22 23 24 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。