英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

Strong DES encryption algorithm and double password protection make sure that your confidential information is for your eyes only!

强烈的DES加密算法和双重密码保护,以确保您的机密资料是为你的眼睛只!

For instance, the idea of Public Key Encryption which was patented in the US.

一个很好的例子是在美国获得专利的公钥加密

Services on the MTR Airport Express were strengthened while Hongkong Tramways and the Peak Tram extended services into early morning.

机场快线加密班次,电车和缆车也延长服务时间至清晨。

In the scheme we employ the CMSs signed data format and enveloped data format to encoding the public key message transfer in authentication. So the PKINIT-CMS scheme can offer an approach to combine the Kerberos with PKI pellucidly .

在传递的公钥认证相关消息的签名和信封数据部分的格式采用加密消息语法中的SignedData格式和EnvelopedData格式来封装,这样为Kerberos与PKI的透明结合提供了途径。

As the tetrahedral grids exist in the majority area, the pentahedral prism grids are adopted near the boundary, which meets the SST model's requirement of mesh in the boundary layer. Pressure recovery factors under different number of grids are calculated so as to decrease the error from coarse mesh, then the suitable number of grids is obtained.

流场大部分区域为四面体网格,在边界附近采用加密的五面体棱柱型网格,满足了SST模型对边界层网格的要求;为了减少网格过粗引起的汁算误差,还通过计算不同网格数下尾水管的压力恢复系数来优选出合适的网格数目。

The former receivers randomly perform an arbitrary unitary operation on each of the particles, which is equivalent to eneryption of the particle with a random key and ensures the security of the present pro- tocol.

先前的接收者在每个粒子上随机地执行一个任意的幺正操作,相当于用一个随机的密钥加密粒子,确保了这个方案的安全性。

Firstly,the wavelet-based contourlet coding using an SPIHT-like algorithm is utilized on the plain image,and as a result,the compressed datum stream could be achieved which is then mapped to a 3D bit matrix. Afterward,a chaotic sequence is generated by Lorenz chaotic map,and it is preprocessed to a bit sequence which is used to permute and substitute the elements of the 3D bit matrix achieved above. In the end,the processed 3D matrix is mapped back to datum stream,and the encrypted compressed image could be achieved if decoding and inverse transform are performed on the datum stream.

首先采用基于小波的Contourlet变换的类等级树集合分割编码算法对明文图像进行压缩,得到压缩数据流,然后将压缩数据流映射为一个三维位矩阵;利用Lorenz混沌映射产生混沌序列,并对其进行预处理得到比特值序列,根据比特值序列对上述三维位矩阵进行置乱和替代操作;将置乱和替代后的位矩阵重新映射为数据流,并对其进行解码和反变换操作,得到加密后的压缩图像。

The protocol can effectively prevent against the collusion attacking by buyer and the third party, the collusion attacking by seller and the third party, and the intermediate personate attacking.(3) A new buyer-reseller watermarking protocol is proposed in the thesis.

提出了一种新的交互式买方—卖方数字水印协定,通过采取新的水印嵌入和加密计划,有效地阻止了买方与第三方、卖方和第三方的合谋攻击,以及中间人攻击。

PGP Desktop Professional can be used in combination with other PGP encryption solutions to provide multiple layers of security.

PGP桌面专业可以与其他PGP加密解决方案的结合,提供多个安全层。

This is because PGP is based on a powerful new technology called "public key" cryptography.

因为PGP基于一种功能强大的称作"公匙"加密的技术。

第74/100页 首页 < ... 70 71 72 73 74 75 76 77 78 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。