英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

The DH protocol, ElGamal encryption and ElGamal signature scheme, DSA are extended to Hypereliptic curves, and a new message recovery signature scheme based on Hyperelliptic curves is presented. And it is proved that this new message recovery signature scheme is not strong equivalent to HC-ElGamal signature scheme.

将DH协议、ElGamal加密体制、ElGamal签名和DSA推广到了HC上,提出了一个基于超椭圆曲线的消息恢复签名方案,并证明了这个消息恢复签名方案与HC-ElGamal签名方案不是强等价的。

This article describes a new management mode to meet the requirements of editing system of the station operation detailed rules ,introduces the database management method of station operation detailed rules in detail,as well as the solutions about ichnography drawing of stations and mutual browse based on the GIS technologies.

针对《车站行车工作细则》编制系统,提出一种新的构建模式,系统采用数据字典与元数据的数据库管理方法,以及基于GIS技术的站场平面图绘制与图文互访的方案,并针对《站细》业务流程的安全性要求提出一套完整的数字加密方案。

Chaotic map ; identity identifier ; Hash function ; encryption

混沌映射;身份认证标识; Hash函数;加密

Encryption systems and their ilk are technologies of disconnection.

加密系统还有它们的同类都是隔离的技术。

At the same time,according to the characteristics of human vision system,the original ima.

同时,根据人类视觉系统的特点,对原始图像进行分块处理,将加密后的水印分别以不同的强度嵌入并提取,给出了改进的嵌入提取方案。

A robust watermarking algorithm based on repeat imbedding technology was proposed.

提出了一种基于重复嵌入技术的鲁棒水印算法,采用置乱技术对水印进行伪随机化和水印加密处理,水印检测时采用了一种新的三取二判决技术。

If you need to impersonate, consider threading issues

如果ViewState里有敏感信息的话,加密

People urgently call for a better solution for Mobile Payment. One of the solutions for this problem is as follows. Firstly, through comparison and analysis, point out the existing problem, improvable aspects and referencable facts in Mobile Commerces secure payment.

问题的解决方案是,首先分别从移动电子商务的技术标准、业务模型和加密技术方面,对比分析当前移动电子商务安全支付存在的问题、需要改进的方面和可以借鉴的因素。

This will also have the side-effect of encrypting your password in database for added security.

这也将有副作用加密您的密码在数据库中为增加安全性。

Chaotic encryption applies a new research approach to solve security of information in computer network and security communication inaugurate.

混沌加密在计算机网络和安全通信方面的应用为解决信息安全问题开辟了一种新的研究途径。

第62/100页 首页 < ... 58 59 60 61 62 63 64 65 66 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。