英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Charon takes your password and compares it to the one that is registered for you in the Charon database.

Charon拿你的密码和它数据库中登记的你的密码相比较。

As a variant of differential cryptanalysis, impossible differential cryptanalysis is a simple and effective technique, and it is also one of the most frequently used cryptanalytic methods.

不可能差分分析作为差分分析的一种变体,是一种简单有效的密码分析方法,也是目前最常用的密码分析方法之一。

This paper briefly introduce basic knowledge of cryptology and method of cryptography and cryptanalysis in classical cryptology by using the number theory in mathematics.

本文通过使用数学中的数论知识,浅要介绍了密码学的基本知识以及传统密码学中的加密,解密方法。

Public key cryptography , combined with the traditional symmetric cryptograph and the message digest technology , can provide confidentiality , integrity and proof of origin .

公钥密码技术结合传统的对称密码技术及信息摘要技术,可提供信息的保密性、完整性和信源确认,是多种安全应用的基础。

Cryptography plays an important role in modern life in politics, economy, military and daily life.

密码学在当今的政治、经济、军事和日常生活中起着越来越重要的作用。不经意传输协议是设计一些重要密码协议的基础。

The electronic mailbox password that the parents of an American soldier hopes to get son of be killed in battle, in order to arrange his letter, dan Yahu company rejects to offer a password all the time, the ability after adjudicating till the court agrees to offer.

一名美国士兵的父母希望得到阵亡儿子的电子信箱密码,以整理他的信件,但雅虎公司一直拒绝提供密码,直到法院判决后才同意提供。

The user would normally be required to pay the extortionist money in order to receive the password, but apparently the virus writer made one small, critical error in coding: placing the password in the code.

病毒作者的最大错误是不该在代码中包含出售的密码。如果需要的话,解锁密码是mf2lro8sw03ufvnsq034jfowr18f3cszc20vmw。这是我们论坛页面的一个简化版本。

Analysis, design and implementation of finite automaton public-key cryptosystem and digitial signatures are studied.

本文的工作是关于有限自动机公开钥密码和数字签名的安全性分析,体制设计及实现,以FAPKC85的安全性为出发点,主要考虑了公钥密码安全性分析中常。。。

This thesis is composed of following parts: the fundamental theory of the modern cryptology is briefly researched, in which the mathematic model of cryptology, data encrypt principle and Galois field theory related with elliptic curve crypto is discussed.

研究了现代密码学相关的基本理论,介绍了密码系统的数学模型、数据加密原理和与椭圆曲线加密密切相关的有限域理论; 2。

The effect of codon content in 3rd codon position shows much grater than the other positions.

碱基含量对该碱基在第三密码位的分布的影响要远大于其他的两个密码位。

第42/100页 首页 < ... 38 39 40 41 42 43 44 45 46 ... > 尾页
推荐网络例句

What would he tell Judith and the children?

他将怎样告诉朱迪丝和孩子们呢?

I this is at that time, the opinion with peacockish true girl is full of in a heart.

这就是当时的我,一个心中布满虚荣的女孩子真实的想法。

Oh, and I bought myself a new laptop," he said."

哦,我还给我自己买了一个新笔记本"他说。"