英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

Most of existing encryption methods can not be applied effectively in the multimedia encryption which has a lot of data. Therefore, multimedia information hiding and encryption has become an important and challengeable task.

目前的加密方法中大多并不能完全有效地用于数据量大的多媒体信息的加密,因此,多媒体信息的隐藏和加密成为一个重要的挑战课题。

The screw entry point was located at the tip of transverse process. The average inclination angle should be 10°-20° headward and 30°-40° toward neutral line respectively. The screw was inserted and entered into the vertebral body along the external cortex of pedicle. The integrity of cortical bone around screws, the distance to segmental blood vessels and the penetration of cortex were observed after operation to evaluate the accuracy and safety of screw placement. Among 160 thoracic pedicle screws that were implanted in 34 cases, 148 screws (92.5%) were accurately inserted inside the costotransverse unit, and 12 screws (7.5%) were misplaced according to the image of X-ray and CT thin-slice scan.

应用椎弓根外内固定技术2004/2007年在中山大学附属第三医院骨科治疗34例患者,固定前采用CT加密扫描测量进钉点、进钉点至椎体前缘的深度、进钉角度和直径,固定中椎弓根钉入点为横突尖,进钉方向为平均向头侧倾斜10°~ 20°、与中线成角30°~40°,顺椎弓根外侧皮质进入椎体,固定后CT加密扫描观察螺钉周围的皮质骨是否完整、是否靠近节段血管、是否穿透皮质骨,评价置入钉的准确性和安全性。34例患者共置入160枚胸椎椎弓根螺钉,固定后CT加密扫描和X射线片观察到148枚(92.5%)螺钉置入准确,12枚(7.5%)螺钉发生错置。

From 2004 to 2007, 34 cases were treated with extrapedicular screw fixation in Department of Orthopaedics, Third Affiliated Hospital of Sun Yat-sen University. The screw entry point, angle, depth and diameter were measured and defined on the thoracic vertebrae pedicle by CT thin-slice scan in standard prone for all cases before operation. The screw entry point was located at the tip of transverse process. The average inclination angle should be 10°-20° headward and 30°-40° toward neutral line respectively. The screw was inserted and entered into the vertebral body along the external cortex of pedicle. The integrity of cortical bone around screws, the distance to segmental blood vessels and the penetration of cortex were observed after operation to evaluate the accuracy and safety of screw placement.

应用椎弓根外内固定技术2004/2007年在中山大学附属第三医院骨科治疗34例患者,固定前采用CT加密扫描测量进钉点、进钉点至椎体前缘的深度、进钉角度和直径,固定中椎弓根钉入点为横突尖,进钉方向为平均向头侧倾斜10°~20°、与中线成角30°~40°,顺椎弓根外侧皮质进入椎体,固定后CT加密扫描观察螺钉周围的皮质骨是否完整、是否靠近节段血管、是否穿透皮质骨,评价置入钉的准确性和安全性。34例患者共置入160枚胸椎椎弓根螺钉,固定后CT加密扫描和X射线片观察到148枚(92.5%)螺钉置入准确,12枚(7.5%)螺钉发生错置。

Steg B(superscript +)-Tree, which uses steganographic technologies to overcome above mentioned weakness is presented by hiding the existence of data so that an adversary could get no information about whether the protected data ever exists without correct object name and access key.

介绍一种新的着重于隐藏数据的存在性的加密手段-隐文加密(Steganography,隐写术)来对重要文件的存储进行加密,该方法采用隐文B树Steg B(上标+ Tree建立UNIX系统的文件索引,并通过隐藏表将隐文B树索引隐蔽起来,使攻击者无法知道重要信息的存在,从而使要保护的信息更安全。

In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.

本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。

Add close software commonly usedly to be used not only rise to be bothered quite, and normally must set adds close password, if was forgotten,add close password, be afraid also cannot open even ourselves confidential document.

常用的加密软件不仅使用起来比较麻烦,而且通常必须设定加密密码,假如遗忘了加密密码,恐怕连我们自己也无法打开机密文件了。

It is deduced that is calculated from the decrypted block and not the ciphered one due to the fact that 4.01 and 4.05 have a lot of ipl blocks in common, which, when decrypted, are similar, but they are totally different in its encrypted form.

这是通过对加密模块的计算得出的推论,通常情况下,从4.01到4.05系统,出于初始装入程序的加密模块的加密形式不一样,使得我们不能破译它。

But if what we have is a random OTP, enciphered by simple columnar transposition, and the message, first with the OTP applied, and then enciphered by Playfair, then it is not at all clear how we can apply techniques analogous to those used against these two ciphers in the double encryption case.

但是,如果我们有一个随机的OTP ,加密由简单的柱状换位,并邮件时,先与检察官办公室申请,然后由加密playfair ,那么,它现在还不很清楚,我们如何能够适用技术类似于那些用来对付这两个密码在双重加密的情况。

The present invention is one opening hardware safety platform enclosed inside one casing and with relaxed application environment, powerful attack resistance and high reliability. The present invention has several enciphered algorithms, supports several kinds of application service, has high versatility, and may be used also in ciphering server, VPN ciphering gateway, SSL safety gateway, safety router, hardware fire wall and other safety devices.

本发明是一个开放式的硬件安全平台,组件封装在一个机壳内,对应用环境的要求低,抗攻击能力强,可靠性高;由于本发明提供多种加密算法、支持各种应用服务,通用性极高,也可以广泛应用于加密服务器、VPN加密网关、SSL安全网关、安全路由器、硬件防火墙等安全设备中。

In order to find more efficient tweakable enciphering schemes and more implementation methods,we propose generalized tweakable enciphering schemes.

为发现更多高效的可调加密方案以及更多的可调加密方案的实现方法,提出广义可调加密方案。

第6/100页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。