英语人>网络例句>加密 相关的搜索结果
网络例句

加密

与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this paper,we simply introduces the whole design scheme of security network access server; subsequently, we deeply analyse the principle and structure model of RADIUS and TACACS in the distributed security authentication system, and more explain the idea and implementation of design. On the other hand, in order to authencating、authorizing and accounting more securely, efficiently and accurately to the remote users, we put forward a series of key techniques which are used in analysis such as MD5 encryption arithmetic、packet retransfer、buffer storage、interprocess communication and so on, and prove the compatibility of the system through employing the commercial software Shiva AccessManager.

本论文首先简要介绍了《安全网络访问服务器》的总体设计方案;之后,深入分析了分布式安全认证系统RADIUS和TACACS的原理与结构模型,并进一步详细阐述了安全认证模块的设计思想和实现,深入剖析了系统中引用的MD5加密算法、数据包重发机制、缓冲区存储、进程间通信等技术,这些技术使得系统能安全、高效、准确地对远程用户进行认证、授权和计费,而且通过使用商用软件Shiva AccessManager的测试验证了该系统的通用性。

However, we'll reveal you one secret: the new algorithm is based on the work with prime numbers.

然而,我们会给告诉你一个秘密:新的加密算法是建立在质数的基础上的。

Comparing the isoline revivification, detailing, section analysis and 3-d images of the gridding result, from which indicated that the gridding project of hydrologic map is reasonable in this thesis.

6通过对栅格化成果进行等值线还原、加密、剖面分析和三维图像比较分析,结果表明,本文提出的水文等值线图栅格化方案是合理的。

In the practical applications, we don't need to revoke all illegal users immediately.

而实际的广播加密应用上,并不是所有的非法使用者都一定要马上被注销其权限。

Browse 8 Unbounded Unbounded Unbounded Following the visit 6 and later a major technological breakthrough in addition to Microsoft-based browser full-transparent proxy encryption, the unbounded browse 8 opening of a new invention called the road to the Super Eagles agent server connection technology to coordinate a global search for a variety of resources for users to use a proxy server, fast, unlimited capacity, and technology platform for the global network free basis.

无界浏览8是继无界无界浏览6之后又一个重大技术突破,除了具备基于微软浏览器的全透明加密代理之外,无界浏览8启用了新发明的名为雄鹰之路的超级代理服务器连接技术,能够搜寻协调全球各种代理服务器资源供用户使用,速度快,容量无限大,并为全球网络自由技术平台奠定基础。

It's encrypted, you could put it outside you're root directory for 100% security.

它们都是加密的,你可以百分之一百安全地将它们放置在根目录之外。

The optical image encryption with rotating invariance based on joint transform correlator is studied.

其次,本文开展了基于联合变换的旋转不变光学图象加密的研究并作了计算机模拟分析。

Using the program the wind fields around several buildings with different body shapes are analyzed. The final results of grid division and refinement are presented. The final wind velocities around the building and wind pressures on the building surface are obtained and also compared with those from the wind runnel test.

采用计算程序对几种不同体型建筑物的流动风场进行了模拟计算,给出了计算区域的网格剖分和加密结果,获得了离散后的流场的风速和风压模拟结果,并与风洞试验结果进行了比较。

PE code, research PE file encryption and shell sabot code examples.

PE 相关代码,研究PE文件加密及加壳脱壳的事例代码。

At last,a preliminary visual 3D model system for coal seam is established based on coal seem 3D model and using OpenGL and Vc~6.0.Currently a part of research results has been applied to Mine Survey Geological Information System(MSGIS3.0),including constrained triangulation of coal bed suface, coal bed scaleboard contours with fault,part encrypt of contours,excellent turn of triangle,space encrypt,any direction profile of coal bed and so on.

论文的部分研究成果已经应用于煤矿地质测量空间信息系统MSGIS3.0中,主要表现为通过煤层底板表面的约束三角剖分,实现了煤层底板等高线的断层处理、等高线的局部加密、三角形优化、空间插值、任意切割煤层剖面等方面。

第81/100页 首页 < ... 77 78 79 80 81 82 83 84 85 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。