英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

The basis of building secure hyperelliptic curve cryptosystems is constructing secure hyperelliptic curve over finite field, therefore firstly must select an hyperelliptic curve suitable to build cryptosystem.

建立有限域上安全超椭圆曲线密码体制的基础是构造有限域上安全的超椭圆曲线,因而应当首先选择适于建立密码体制的超椭圆曲线。

If a member forgets their password, then they have to invoke one of these methods to recover.

如果用户忘记他们的密码,他们能够使用这些方法中的一个来重新获得自己的密码。

A kind of knap sack public-key cryptosystem which is based on intractability of factoring big integer was proposed to introduce a trusted authority. TA generates the RSA public key and the private key with the RSA algorithm which transforms the primitive public key of knap sack public-key cryptosystem to the ordinary knap sack sequence, and it is publicize as a public key of knap sack public-key cryptosystem.

通过引入可信中心机构TA,TA用RSA算法生成RSA公钥和私钥,用RSA公钥把背包公钥密码体制的原始公钥变换成普通的背包序列作为背包公钥公布,提出了一种基于大数难解问题的背包公钥密码体制。

The result of relative syn- onymous codon usage analysis shows a high bias of codon usage toward the codon with A or T ending.

相对密码子使用值的计算结果表明,高表达基因强烈偏好以A或T结尾的密码子,并确定了TTA和ATA等10个密码子为杨树的主要偏爱密码子。

Another nice feature is that you can password protect your file in order to make sure no one can download it unless they are given the password first.

另一个不错的特点是,你可以用密码保护你的文件,以确保没有人可以下载它,除非他们获得的密码第一。

Chin's team then inserted two quadruplet codons into the gene that codes for the common protein calmodulin, and assigned an "unnatural" amino acid to each quadruplet.

Chin团队然后将两个四字母密码子插入到普通的钙调和蛋白的基因中,并且分配了一个"特异"氨基酸到每一个四字母的密码子中去。

Joseph Rochefort had worked for several months to read the secret Japanese Naval code called J-N-Twenty-Five. If he could read enough of the code, Mister Rochefort would be able to provide Admiral Nimitz with very valuable information. Admiral Nimitz could use this information to make the necessary decisions to plan for battle.

约瑟夫。罗切福特研究日本海军密码"J-N-Twenty-Five"长达数月,如果他能够读懂这些密码,他就能够给尼米兹上将提供有价值的信息,尼米兹上将将采用这些信息为即将开始的战斗做出必要的决策。

Scalar multiplication is the main operation in ECC. It determines the speed of encryption / decryption in ECC.

椭圆曲线密码算法中最主要的运算是数乘运算,数乘运算的效率决定了椭圆曲线密码算法的加解密速度。

Some key technical issues on USBCK which is a simplified HCM are studied, and the security of Kerberos is analyzed. The Kerberos system based on the USBCK is presented, and the improved Kerberos system is the securer than the primitive Kerberos system.

研究了一类简化的HCM—USB密码钥设计的关键技术,然后在分析Kerberos系统安全性的基础上,将USB密码钥应用于该系统,使其安全性得到了显著提高。

A few months later, a new special prosecutor (the county let the previous one go) assured me in a brief meeting that he wouldnt challenge my right to the shield law. I took the witness stand once in a preliminary hearing in April 1999. I testified that an individual at one point had offered the Enquirer access codes to Chiquitas voicemail, and I had given the information to Gallagher, since I wasnt sure what we could do with it.

没过几个月,新的特别检察官(县里让前任特别检察官走人了)在一个碰头会上向我保证,他不会挑战我的盾牌法权利。1999年4月,我在预备听证会中站到了证人席上,作证说有一个人在某个时间向《问询报》提供了进入奇基塔公司语音信箱的密码,由于我不知道该如何处理这个密码,就把该信息给了加拉格尔。

第43/100页 首页 < ... 39 40 41 42 43 44 45 46 47 ... > 尾页
推荐网络例句

What would he tell Judith and the children?

他将怎样告诉朱迪丝和孩子们呢?

I this is at that time, the opinion with peacockish true girl is full of in a heart.

这就是当时的我,一个心中布满虚荣的女孩子真实的想法。

Oh, and I bought myself a new laptop," he said."

哦,我还给我自己买了一个新笔记本"他说。"