加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Encryption is a tool, not a black box solution to protecting your privacy.
加密只是一种工具,不是一个黑盒子式的保护你的个人保密权的解决方案。
-
Karl Wolfe , retired Sergeant with a top secret crypto clearance for the US Air Force, witnessed about them during the NPC press conference occurred in May 9, 2001, at Washington DC; the press conference was organized by Dr.
卡尔沃尔夫,退休警长的绝密加密关美国空军(在兰利空军基地位于弗吉尼亚州),目睹了他们在全国人民代表大会新闻发布会上发生在2001年5月9日,在华盛顿特区的新闻发布会是由博士。
-
Applied widely in the data encryption, pseudorandom sequences can be generated not only by hardware but also by trace function, and it is found that the sequences generated by trace function are much better than those generated by hardware, especially in the aspects of correlation properties.
摘要伪随机序列被广泛应用于数据加密,它既能利用硬件产生,也可以利用有限域上的迹函数来生成,并且由后者生成的序列的密码特性远远优于前者,特别是在相关函数方面更是如此。
-
On the database file itself is encrypted or the provision of transport layer security on how to protect?
对数据库文件自身进行加密或者提供传输层上的安全保护怎么样?
-
Transposition is one of two methods used for encryption and cryptography.
移项是加密和解密中使用的两种方法之一。
-
Creating a Transposition Table - Transposition is one of two methods used for encryption and cryptography.
移项是加密和解密中使用的两种方法之一。
-
This implies that the truncated 256 bit hash the same cryptographic security as the 128 bit hash.
这意味着,被截断的256位散列一样的128位散列加密的安全性。
-
Encryption and digital signatures are techniques to expand the dynamics of trust into a new territory.
而加密技术和数字签名则正是一种把信任动力学扩展到新领域的技术。
-
As to the procedure of obtaining evidence, the writer points out some procedures which are illegal and will result in the invalid of E-mail; as to the authenticity, several methods to identify were concluded and their advantages and disadvantages are also listed. In addition, the writer points out that the laws in force on the authenticity of E-mail were very macroscopic and vague. And there are not concrete laws in effect to identify the authenticity of E-mail without electronic signature and encryption. So the writer explains his views that each links of E-mail's lifecycle should be deeply analyzed and checked to exclude the possibilities of unauthenticity of E-mail.
就取证程序方面,该部分则指出了哪些取证程序是违反法律并可能会导致电子邮件无效;就电子邮件真实性的问题,本文主要从现有立法归纳出几种认定电子邮件真实性的具体方式,并阐述了这些方式的利弊,同时笔者还在该部分指出,现行法律对于电子邮件真实性问题的认识,仍仅停留在宏观层面,显得过于宽泛,尤其是针对未经签署电子签名和加密的电子邮件真实性的认定问题,现行法律没有进行具体规范。
-
The program uses unbreakable 256-bit AES encryption to provide you with peace of mind that your data is safe.
该软件使用牢不可破的256位AES 加密技术对你进行保护,让你放心数据的安全性。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。