加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Engrafting L.A.Zadeh one branch fuzzy decision theory with RSA algorithm in information security, this paper gives concepts of multi-cooperation encryption and multi-cooperation sharing fuzzy decision; innovatively gives mathematical structures of group encryption and multi-group sharing fuzzy decision; finally gives safe fuzzy decision algorithm and its applications; safe fuzzy decision is a new direction of fuzzy decision research.
将L.A.Zadeh单枝模糊决策理论与信息安全中的RSA算法相互嫁接,相互渗透,提出了多合作加密与多合作共享模糊决策的概念;创新性地给出了集团加密与多集团共享模糊决策的数学结构;最后给出安全模糊决策算法以及它的应用;安全模糊决策是模糊决策研究的一个新的方向。
-
This paper creatively engrafts elliptic curve encryption algorithm with fuzzy recognition theory, puts forward t-order iteration encryption and t-order iteration decryption algorithm of fuzzy recognition based on elliptic curve.
本文别具心裁地将椭圆曲线加密算法与模糊识别理论相互嫁接,提出基于椭圆曲线的模糊识别t-阶迭代加密与t-阶迭代解密算法。
-
Interworking Between IP Security and Performance Enhancing Proxies for Mobile Network.
在这方面,目前的加密技术中私钥加密技术能够提供比较好的性能。
-
These formulae can be used to establish the hydraulic gradient lines of laterals easily.Thus, alternate measures for bettering the hydraulic gradient lines may then be a...
这类支管,加密喷头,喷灌的就向滴灌的接近,加密滴头,滴灌的就向渗灌的接近,型类有异,原理则同,本文只就渗灌、喷灌两类各作简论。
-
With the development of the Oilfield, especially the increase of secondary and tertiary infilled wells and outlaying wells in transitional zones, oil-water contact becomes different from basic patterns.
萨北油田位于大庆长垣萨尔图油田纯油区内,随着油田的开发,特别是二、三次加密调整井及过渡带扩边井,油水界面不同于基础井网;应用井壁取心分析资料总结了萨北油田水淹层与原始油水同层的评价方法;统计萨北油田30口井,其中4口过渡带井,其余为二、三次加密调整井,应用井壁取心分析资料区分该区油水界面位置附近不同水洗程度、原始油水同层及原始水层,应用效果较好。
-
This paper presents a new solution for the security transportation system based on TCP/IP routers, including such four novel technologies as identity-authentication protocol, state maintenance protocol, packet auto recognition and transparent packeting scheme.
以自行开发的高性能多协议路由器为背景,提出了一种基于TCP/IP协议簇的路由器安全传输系统解决方案,包括路由器身份认证协议、状态维护协议、普通—加密状态切换协议及数据包加解密自动识别和透明打包四项关键技术,并且将其与基于&加密器&的安全传输系统作了比较。
-
This approach encrypts digital image hy permuting on bitmap after pretreatment,and decryption pixels' values of the image which is attacked by shear transformation is computed by using neighboring pixels' values,it can protect the encryption image from shear transformation attack.A binary sequence nonlinear generating method based on chaotic system is also presented.
基于数字图像灰度矩阵位平面进行置乱加密,在恢复过程中通过象素邻域灰度信息进行恢复,能够有效抵御针对加密图像的剪切变换攻击,同时给出了一种非线性的、应用高维混沌系统产生二值序列的方法。
-
4 Data Encryption 9.3.4 Encryption is a process that scrambles data to protect it from being read by anyone except the intended receiver.
19.3.4 数据加密 9.3.4 加密是对数据进行编码,防止数据被目标接受者以外的人读取的过程。
-
The design in the mail client use RSA encryption algorithm on the message content of asymmetric cryptography, causing E-mails in the transmission process are replaced by ciphertext, ensuring the users are not wiretapped by third-part when using the mail client to communicate with others.
本设计在邮件客户端使用 RSA 加密算法对邮件内容进行非对称加密,这样邮件在传输过程中便以密文代替明文显示,保证用户在使用本邮件客户端与他人通信时不被第三方窃听。
-
The modular design of printNet system is divided into several application part, such as data processing tools, design tools, products, Business card printing tools, and solutions to technical tools, of which the highest is a design tool over the actions that it printLayout from page formatting and setting variables, but also can be used by an operator in a transform tool programming, so that the contents of the variables in a database in output for operations, now produetion of mostly to one-dimensional bar codes and encrypted bit or anti-false, the party is a method in the bar code by addition, subtraction, multiplication, Division, opinins Mo, and so after the results or the results of data, or the result is converted to the data that corresponds to a location in one of the ntehs detection accuracy is valid, just make a bit of the inverse operation, the operation that results in comparison with the original data, such as the same as the data is valid, such as different then the data is not valid, this scenario is the most simple and most primitive anti-counterfeit. PrintNet software to complex product environment " interpuntion and output the integration of integrated management " solution possible.
printNet系统的模块式设计分为几个应用部分,如数据处理工具、设计工具、产品制卡工具以及方案解决工具,其中技术含量最高的是对设计工具printLayout的操作,它除了设计页面格式和设置变量外,还可由操作员在转换工具中编程,以便对数据库中的变量内容在输出时进行运算操作,现在生产中应用的大多是给一维条码加校验位或是防伪加密,其方一法是将条码中的数据经过加、减、乘、除、取莫等运算后,将结果或将结果中的几位至于数据后,或将结果转换成对应符号放在数据中的某个位置,如须检测某一数据是否准确有效,只要把校验位上的数进行逆运算,把运算结果与原数据比较,如相同则数据有效,如不同则数据无效,这种方案是最简单最原始的防伪加密的方法。printNet软件系统使得在复杂产品环境下的&排版与输出一体管理&的集成解决方案成为可能。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。