英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

Making use of seismic data is able to characterize reservoir, and to improve reservoir management during the development of new fields as well as the infilling well and enhanced oil recovery in old fields. Seismic technique has now extended into production phase from exploration phase.

无论是开发新的油气田,还是在老的油田钻加密井、扩边井,乃至提高油气采收率,使用地震资料均能够较完整地刻画油藏的特征,改善油藏管理,为了适应油气田开发和开采的需要,地震技术已从勘探领域延伸到开发领域,正在逐渐形成一门新的学科——开发地震。

Study shows that the water injection wells should not be arranged within 100m fault distance and the infilling test should be done to effectively decrease the injection pressure.

通过研究得出,在距断层100m以内不布注水井,开展加密试验,以有效降低注水压力,并对注水压力高的套损修复井,严格控制注水量,防止造成二次套损。

Yesterday he was still fine and there were no signs for that. Also the police will check whats happen to him. If there should be an interest I'll inform you all from Chakra about the inhumation in his home town Luedenscheid middle/end next week. Regards, D...

与大葱作物不同,I2P底层同时支援TCP/UDP协议及SSU中介,最大的不同是他没有中央伺服器,通过Kad与FF形成高动态、可伸缩的分布式网路,用户可以自由建立、访问加密站点、分布式聊天、BT等。

Prior to encryption, rotors are set to their initial positions.

之前,加密,成立转子是其最初的立场。

To encryption, rotors are set to their initial positions.

之前,加密,成立转子是其最初的立场。

"Please insert the usb key in order to apply this update !"

意思是:为应用这个更新,请插入USB加密狗。

In cryptography,the additional characters added to a plaintext message,to ensure that its length is an integral number of blocks for encryption by a block cipher.

在密码学中,为了使明文信息的长度为分组密码加密中所用的块的整数倍,而在明文中添加的附加字符。

In order to protect the integrality of the message, the method of digital signature is adopted.

本论文方案中设计实现的基于JPEG图片的伪装和加密的秘密信息交换方法,具有很好的伪装和防止篡改的能力,嵌入的算法具有较强的不可感知性和鲁棒性。

The purpose of this article is to show the interaction between Crypto++ and .

本文的目的是显示加密之间的相互作用++和。

Moreover, TSPA scheme possesses mutual authentication security attribute, and is capable of establishing secure tunnels between mutually authenticated clients and servers to protect subsequent service access authorization intermediately followed.

TSPA的另一个鲜明特点是具有对客户端和服务端的双向认证功能,并能在认证的客户端和服务端之间构建一条加密的安全隧道,用于保护认证后的访问授权等操作。

第64/100页 首页 < ... 60 61 62 63 64 65 66 67 68 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。