英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Chapter 4 presents five design criteria of S-boxes of block ciphers, develops a method of constructing large S-box by use of algebraic group operation, proves the balance property of these large S-box, tests the strict avalanche and independence of avalanche variables properties of S-boxes in NEA cipher, analyses the nonlinearity and best linear approximation of the S-box, and finally defines the differential of input/output of S-boxes of this cipher and analyses the distribution of them.

第二部分即第三章,提出了一种新的分组密码类NEA(NEA-4A,NEA-8A,NEA-4B,NEA-8B),完整地描述了该密码类的加解密过程和密钥协议;证明了NEA-4B和NEA-8B的完全对合性和没有不动点的性质;分析了该密码类的安全特征;具体地介绍了实现该类密码的途径;给出了NEA-4A的计算机C语言程序和样本数据。

A short list of features include: Multiple user account capability, Drag and drop operation for insertion of user name and password, Printing function for hard copy of passwords, Password protected database functionality, Internal security features to help maintain privacy from "over the shoulder" intrusion using our -Hide/Show password function, Descriptive titles allowing the same username to be used repeatedly, Configurable random password generation, Memo section for noting important info about password, like inception date, expiration date or special site instructions, Method of storing and launching relative URL information for quick access to the web site the particular password might pertain, Ability to disable Splash screen after registration, Configurable timeout function for unattended program lock-up, Ability to copy username and password to clipboard without entering that particular record, Ability to clear clipboard from within program and upon program exit, Full program help files.

短名单的功能包括:多用户帐户的能力,拖放操作插入的用户名和密码,打印功能,为的硬拷贝密码,密码保护数据库的功能,内部的安全功能,以协助维持隐私,从"肩膀"入侵使用我们的-hide/show密码功能,描述性的标题,让相同的用户名被反复使用,可配置的随机密码的一代,备忘录节注意到重要的信息密码,如成立日期,到期日或特别的指示,网站的方法,储存和开展相对网址的资料,以便快速存取该网站的特定密码,可能涉及,有能力,要禁用初始屏幕上注册后,可配置的超时功能,为无人值守程序锁起来,有能力复制的用户名和密码到剪贴板没有进入特定的纪录,能力要清除剪贴板从内部程序后,程序退出,全面计划,帮助文件。

The design uses a matrix keyboard to complete the password entry, and through the password entered by the user default passwords and procedures to compare. If the password is correct, then the security lock will be open.

本设计采用矩阵式键盘来完成密码的输入操作,通过用户输入的密码与程序预设的密码进行比较,如果密码正确无误,那么锁就会被安全的打开。

This invention provides a method for transferring third party landing based on IP network including: a door network station carries a ciphered KEY generated randomly by a service server to send a link request to a third party network station so as to avoid transmission of user ciphered codes and ensure absolute security of user codes, besides, since the third party network station calls back the Web server by copying the ciphered KEY to verify the cryptographic key so as to secure the absolute safety of shaking hands, since the door network station does not transfer user ciphered codes with the third party network station, which is not necessary to synchronize with the door station about codes, thus the requirement of complicated maintenance to synchronization on ciphered codes to the third party is reduced.

本发明提供了一种基于IP网络转接第三方登陆的方法,其关键是,由门户网站携带业务服务器随机生成的加密KEY向第三方网站发送链接请求,避免了用户密码的传输,因而保证了用户密码的绝对安全性。再有,由于第三方网站通过复制加密KEY回调Web服务器,由Web服务器进行密钥验证,因而又保证了握手的绝对安全性。应用本发明,由于门户网站与第三方网站之间不传递用户密码,使得第三方网站无需与门户网站进行密码同步等机制的处理,在大大提高安全性的同时,降低了对第三方网站对于密码同步机制等复杂维护的要求。

This paper first analyses and summarizes the ststus quo and evolution trend of encryption, some common used cryptograph are introduced, including the algorithms used in symmetric cryptosystem and asymmetirc cryptosystem. We describe the theory of each algorithms and compare the elliptic curve cryptosystem with the other two asymmetric cryptosystems to show the advantages of this algorithm. Second, the principle of ECC is discussed, including the math foundation of ECC, basic conception of elliptic curves, constructiong idea of ECC, operation on the elliptic curve and so on. Third, the current attacks of ECC were analyzed deeply, and an algorithm based on limited prime number field was constructed. We analyzed its realizability in theory, and implement it by using certain function of MIRACL software package. Latter half in this paper, the implementation model of a simple elliptic curve encryption system which based on GF has been introduced. The paper also put a deep analysis on the algorithm of point addition and point multiplication.

本文首先对密码技术的发展现状及其发展趋势进行了分析和综述,详细的介绍了私钥密码系统和公钥密码系统的发展,说明各种算法的原理和优缺点,并给出了一些典型的密码体制的简要分析,重点将椭圆曲线算法与其它几种公钥密码算法比较,说明椭圆曲线算法的优势;其次,探讨了椭圆曲线密码体制的原理,包括椭圆曲线密码的数学基础、基本概念、椭圆曲线密码体制的构造思想等问题;第三作者对椭圆曲线的攻击现状作了详细的分析,针对所使用的大素数域F_p,设计了素数域上安全椭圆曲线产生的算法,从理论上做了可实施性分析,从软件上做了具体实现;在本文的后半部分,提出了一个简单的基于有限素数域上的椭圆曲线加密方按算实现模型,并对SECES中设计的点加和点乘运算进行了深入分析。

The Biosystematic Codes index contains the BIOSIS Biosystematic Code for an organism and the corresponding organism classifier discussed in the source document.

生物系统密码的索引包括一种生物体BIOSIS生物密码和在源文档中分类讨论的相应的生物有机体的BIOSIS生物密码,这些生物密码放在括号中,后面跟着分类,分类后面跟着新的分类,这些新分类可以在源分类里讨论时鉴别出来。

Select a database to open it, help to see this help and about to read author and copyleft details. To open a database it is also required a password because they are ciphered.

要打开一个数据库也需要输入密码,因为它们已被加密保存了,点击&新建&可创建一个需要输入名称与密码的数据库(密码未输将不作加密保护)。

Rule 3 - Password Scamming 规定 3-密码骗局 Asking for another players password for any reason will not be tolerated.

对于任何的理由欺骗另外的一个玩家密码的将不会被宽容。

First of all, the structure from the message, the message is divided into 3 parts: the first message, at the style, MAC address, so that packet transmission to reach the safety of the international financial sector standards; Secondly, the encryption method from the point of view, this The most prominent of the two systems were encrypted administrator password is encrypted on the card to encrypt passwords, especially for card encryption, the use of soft encryption service interface technology, using the work key, master key, the original password through the ciphertext key algorithm through two different DES encryption key to come up, we can imagine, I want to work at the same time key, master key, the text of the original secret password to a more difficult task, If the re-solution of the two DES, can be said to be completely impossible!

首先从报文结构上来看,报文分为3部分:报文头、报文体、MAC地址,使报文传输的安全性达到了国际金融行业的标准;其次,从加密方式来看,本次系统最突出的两个加密分别是对管理员密码进行加密、对卡密码进行加密,特别是对卡密码的加密,运用的是软加密服务接口技术,运用工作密钥,主密钥,原始密码通过算法得到密钥密文通过两次不同的DES加密才得出的密钥,可想而知,想要同时得到我的工作密钥,主密钥,原始密码密文本来就比较困难了,要是再解两次DES,可以说是完全不可能实现的!

According to password which establishes, uses two pressed keys realizations password the input function, after the password input is correct, locks opens, if inputs three passwords are not correct, locking presses a key 3 seconds, simultaneously discovered reports to the police the sound, after has not pressed a key presses down 3 kinds, only then opens the pressed key locking function; Otherwise still had the pressed key in 3 seconds to press down, relocked presses a key 3 seconds time and reports to the police

根据设定好的密码,采用二个按键实现密码的输入功能,当密码输入正确之后,锁就打开,如果输入的三次的密码不正确,就锁定按键3秒钟,同时发现报警声,直到没有按键按下3种后,才打开按键锁定功能;否则在3秒钟内仍有按键按下,就重新锁定按键3秒时间并报警

第1/100页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。