加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The method is as follows:(1) encrypt at control signal line of CPU to prevent the abnormal retrieval by CPU emulator;(2) encode the data and address of the program code to prevent the operation of dissembler;(3) do a pattern checking to prevent the execution of illegal reverse tracking program.
我们所提出的方法如下:(1)由CPU中的M1控制讯号线加密以防止由CPU模拟器做非正常之撷取程式;(2)将程式码的资料及位址重新编码,以防止反组译程式的运作;(3)额外加一颗CPLD做特殊图样比对以防止不正当逆向追踪程式的执行。
-
We research on distributed database encryption technology and its application of C/S mode in this paper.
本文就C/S模式下的分布式数据库加密技术进行研究。
-
The software makes it possible for traditional paper documents management to be taken place by advanced and effective electronic document image management and meanwhile, provides multiple functions, such as classification, search, reading, PDF conversion and data encryption of the files.
该软件使得传统的纸质文档管理被高级且高效的电子文档图像管理所取代,同时提供多种功能,诸如分类,搜索,阅读,PDF 转换以及文件数据加密成为可能。
-
In. Net platform invocation components can be achieved for arbitrary document RSA encryption operation Window applications.
在。Net平台引用此组件,实现可以对任意文件进行RSA加密操作的窗体应用程序。
-
The cert and key files are created automatically by dovecot when you install it.
加密的证书和密钥文件会在dovecot安装时自动创建。
-
Please select a mounted volume in the drive letter list.
请在驱动器列表中选择一个已载入的加密卷。
-
The method to update the dynamic viscosity of the material in the aluminum alloy profile extrusion is yielded. The convergence criterion is also discussed.
给出了迭代收敛的判据,并且实现了网格的局部加密,不仅提高了计算效率,而且保证了模拟质量。
-
This embodiment shows how the method of the invention can be used for encryption using dynamical systems with continuous variables.
这体现的说明方法的发明可以用来加密用动力系统与连续变量。
-
The path of least resistance is to get an e-mail security gateway, which is analogous to a firewall for e-mail.every message going in or out pases through the gateway,allowing security policies to be enforced (where and when messages can be sent),virus checking to be performed,and messages to be signed and encryp ted.
阻力最小的道路就是采用电子邮件安全网关,它相当于电子邮件的防火墙。进出的每一条信息都要经过网关,网关可以实施安全政策(信息在何时向何地发送)、执行病毒检查并给信息签名和加密。
-
With no encryption, much like for postcards, email activity is plainly visible by any occasional eavesdropper.
与没有加密,很像为明信片,电子邮件活动,显然是有形的任何偶尔eavesdropper 。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。