英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

In many fields related to information security, people use Hardware Cryptographic System, such as cryptographic processor、 cryptographic accelerator、smartcard or USB key, to provide high speed data operation and to improve the security of the whole system.

在很多涉及信息安全的系统中,人们采用了诸如高速数据密码卡、密码机、智能卡、USB KEY等硬件密码设备来提高密码运算速度和系统的安全性。

The information security technique will gradually acta highly anticipated role in the development of the network technology.

由于信息安全技术的支撑点是现代密码技术,而现代密码技术的核心是各种密码算法,因此,专用密码算法芯片在信息安全技术中起着至关重要的作用,信息安全技术发展到今天也被称为已经进入了芯片密码年代。

First of all, the installation of EMF, generated during the installation process a password set operation to insert the disc, EMF detection site on the password, and enter the corresponding account, and then run the program to Magic.exe enter your password, this password is entered after EMF password.

首先安装EMF,在安装过程中生成一张密码盘,操作时插入该盘,EMF检测盘上的密码,并进入相应的账号,然后运行Magic.exe程序会要你输入密码,这个密码就是以后进入EMF的密码。

Using the theories of probability, algebra, logical function in cryptology and spectral theory comprehensively, the dissertation investigates the properties and constructions of orthomorphic permutations, omni-direction permutations, quick trickle permutations and generalized orthomorphic permutations.

分组密码是现代密码学中一个重要的研究分支,而置换理论在分组密码中占有重要的地位,任何没有信息扩张的密码体制都可以看作是置换的结果,如数据加密标准DES可以看作是明文在密钥控制下的置换,公钥密码体制RSA可以看作是一种多项式置换,因此,研究置换的有关性质和构造具有重要的理论意义和应用价值。

Compared with Elliptic Curve Cryptosystems, Hyperelliptic Curve Cryptosystems has obvious security advantages , therefore the theory of HCC has caused the crypto circle's extensive attention in recent years.

与椭圆曲线密码体制相比,超椭圆曲线密码体制具有明显的安全性优势,因而,近几年来超椭圆曲线密码理论备受密码学界的重视。

Compared with Elliptic Curve Cryptosystems, Hyperelliptic Curve Cryptosystems has obvious security advantages , therefore the theory of HCC has caused the crypto circles extensive attention in recent years.

与椭圆曲线密码体制相比,超椭圆曲线密码体制具有明显的安全性优势,因而,近几年来超椭圆曲线密码理论备受密码学界的重视。

You don't have to remember hundrets of your passwords, logins, pin codes and other important pieces of information, you have to remember only one password to access Nyx Password Storage.

你不必记得hundrets您自己的密码,登录信息,密码和其他重要信息,你必须记住,只有一个密码来存取店的密码存储。

In cryptography,a cipher produced by a composition of a number of substitution and transposition cipher s.

密码学中,由替代密码和置换密码结合使用而构成的一种密码。

The average percent value of G C (49.3%) was less than that of A T (50.7%), there was a bias of the content of G, T in the third codon; The number of transition G-A and T-C were 22, 15 respectively, which were higher than that of transition A-G and C-T, the number of tranversion C-A, T-G is 2 respectively, and other tranversion patterns didnt occur; the probability of transition was higher than that of tranversion , Ts/Tv = 9.5-19, there was the highest number of transition in the third codon. The gamma parameter a of the lst,nd and 3rd codon positions were 0.00572,0.01237 and 1.05239 respectively, they showed that there was adifferent substitution rate at different codon position. Frequences of synonymous codon usage were relatively biased. The average rates of synonymous and nonsynonymous substitution were 0.0787, 0.0011 respectively, there was a significant difference between dS and dN (Z = 4.713, p.01), and the low ratio( CD = 0.0284 .3) of dN/dS ratio impled that there were selective constraints against the nonsynonymous sites in cyt-b gene, The distribution of nonsynonymous codon substitution pattern related to Grantharm distance indicated that the purified selection at 2nd codon positions was more intensive than that at 1st codon positions. The phylogenetic trees supported the view of the double origin of Chinese goose, which means that domestic Chinese goose was derived from Anser cygnoides and domestic European goose, and Yili was derived from Anser anser.

碱基含量分析可知,序列的G C含量(49.3%)<A T含量(50.7%),密码子第三位点的G、T含量都有较强的偏倚性;序列间G→A和T→C的转换数(22次和15次)高于A→G和C→T的转换数(10次和9次),C→A、T→G颠换数均为2次,其余颠换模式均未发生;转换数明显高于颠换数,Ts/Tv=9.5~19,密码子第三位点的转换数最高,呈现了相当强烈的转换偏倚性;密码子第一、二和三位点的gamma分布参数α值分别为0.00572、0.01237和1.05239,表明密码子第一位点的替换速率变异最大,第二位点次之,第三位点的替换速率变异相对较小;编码同一氨基酸的同义密码子并非随机使用,表现出一定程度的使用偏倚性;同义替换速率和非同义替换速率分别为0.0787和0.0011,dS与dN值间的差异极显著(Z=4.713,p<0.01),而ω=0.0284,明显小于0.3,表明雁属鹅细胞色素b基因序列经历了中度净化选择作用;单步非同义替换(Sing-step nonsymonymous codon substitution,SSNCS)分布模式与Grantharm距离之间的关系说明密码子的三个位点所受的净化选择强度不同;构建的最大简约树与邻接树拓扑结构一致,支持中国家鹅的双起源学说,即除伊犁鹅外的其它中国鹅品种起源于鸿雁,伊犁鹅和欧洲的郎德鹅、莱茵鹅起源于灰雁。

To change your Pin, please browse the Library webpage at http://library.cfhc.caritas.edu.hk and select " Online Catalogue ". Click on the " Change Password " button and enter your Patron Barcode, the original Pin and the new Pin. Then, key in your new Pin in the Confirmation Pin box to confirm and select the " OK " button to exit from your record.

如欲更改密码,请先进入图书馆首页 http://library.cfhc.caritas.edu.hk ,按顺序点选&线上目录&→&更改密码&,请输入您的读者条码,预设密码和新密码,然后在&确认密码&框再输入一次新密码以作确认,并按&确定&退出读者记录。

第20/100页 首页 < ... 16 17 18 19 20 21 22 23 24 ... > 尾页
推荐网络例句

The reasons of iron ions content overproof in grade Ⅱ desalting water system,such as variation water quality,contamination of regenerant , operation adjustment of pretreatment system and switching operation of bed were discussed.

对二级脱盐水系统中铁离子含量超标的原因,如来水水质发生波动、再生剂受到污染、预处理系统操作调整、床体运行切换等进行了论述。

You were hired to drum up new business, so go and do it.

公司雇你招徕新业务,你就做你的事好了。

Who is in possession of this?

这是谁的?