加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In this dissertation, we mainly address related techniques in anonymity communications based on current settings.
在以上的应用中,仅仅使用传统的加密技术不能达到用户的匿名要求。
-
Intercepting a coded Italian radio message, Skorzeny used his own reconnaissance to determine Mussolini was being imprisoned at Campo Imperatore Hotel, a ski resort at Gran Sasso, high in the Apennine Mountains. On 8 September 1943, Skorzeny joined the team to rescue Mussolini in a high-risk glider mission.
在截获意大利加密无线电信息后,斯科尔兹内使用他的侦查手段确认了墨索里尼被监禁在亚平宁山脉大萨索山的一个滑雪胜地--帝王台酒店。1943年9月8日,斯科尔兹内在一个高风险的滑翔行动中加入了营救墨索里尼的小组。
-
If further refinement is to be performed then the aposteriori error estimators are used as a guide as to show the refinement mightbe accomplished most efficiently.
尽管加密的方法几乎总是根据后验误差估计来进行自适应,但对于移动网格方法来说,我们还没有看到使用后验误差估计构造控制函数的文献。
-
This article firstly analyse the conception and related technology of MEC, the architechure of Wireless Application Protocol cluster and application programming model. And deeply research for its security credit system, including encrypt arithmetic, Public Key Infrastructure theory, Wireless PKI technology and so on.
本文首先分析了移动电子商务的概念和相关技术,WAP协议簇的体系结构和应用编程模型,并对其安全信用体系进行了较为深入的研究,包括加密算法、PKI原理、WPKI技术等方面。
-
Finite field multiplication is the basic arithmetic operation of many cryptosystem and coding theory.
有限域上的乘积运算是许多加密系统和编码理论的一种基本运算。
-
This paper analyzes the security in a mobile telephone network with emphasis on its identification authentication, data encryption, key assignation and integrity authentication.
分析了移动通信网络中的不安全因素,重点讨论了移动通信网络中的身份认证和密钥分配,数据加密与完整性检测方案,并对其安全性进行了详细分析。
-
This article presents some background knowledge, including the symmetric and asymmetric encryption system in cryptography field, the developments of the elliptic curve cryptosystem and PKI.
本文介绍了密码学领域里的对称加密体制和非对称体制、椭圆曲线的发展现状和PKI架构。
-
There are two basic types of cryptography: asymmetric
有两种基本类型的加密:不对称
-
NetSIT is secure because of application of cryptographics and reliable because of atomicity of transaction protocol.
NetSIT安全性体现在它综合利用公钥和对称密码体制,为交易协议提供了很强的加密和认证手段。
-
To achieve security in the networks, it is important to be able to encrypt and authenticate messages sent between the users.
为了实现网络安全,一个重要的方法是网络用户传送加密和可鉴定的消息。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。