英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Lastly, we study a model of the heat flow cryptosystem base on a linear pseudoparabolic equation. The C-N difference scheme arithmetic of the encryption and decryption problems is designed. Then the numerical simulation is done through computer programming. So by analysing the simulation data we deduce many regularly conclusions on the influence of the key functions to the encryption and decryption operations, which establish the theoretical base for the application of this cryptosystem.

最后,文章研究了一类基于线性伪抛物型方程的热流密码体制模型,设计了加、解密问题的C—N差分算法并通过计算机编程进行了数值模拟,得出了一些不同密钥函数对加、解密作业影响的规律性结论,为该密码体制的现实应用奠定了理论基础。

In this paper, we discuss the method of error-correcting codes on the design of block ciphers.

本文对分组密码设计中的纠错码方法进行了系统地研究,在概括纠错码和分组密码基本知识的基础上,着力讨论了S盒和P置换设计中的纠错码原理与方法,得到了一些有价值的结果。

Bounded one-way function is a new cryptographic primitive proposed for the foundation of practical cryptography.

有界单向函数是一个新的密码学概念。有界单向函数是为了研究设计更为灵活、更实用的密码系统的基础而提出的。

We describe the algebraic characteristic of the public-key cryptosystems based on algebraic structures such as elliptic curves,bilinear pairings,as well as braid group s,with the emphasis on the difficulties of constructing public-key cryptosystems based on non-commutative algebraic structures.

通过分析基于椭圆曲线、双线性对以及基于辫子群的公钥密码体制的代数学特征,着重讨论了构建基于非交换代数的公钥密码体制所面临的困难。

There are already so many articles written on how to recover or reset a password that I'm not going to reinvent the wheel, but instead will guide you to the best online resources that I used to crack my Windows XP password.

现在已经有这么多篇文章,就如何收回或重新设定一个密码,我不想重新发明轮子,而是将引导您到最佳的网上资源,我用来打击我的windows xp的密码。

There are already so many articles written on how to recover or reset a password that I'm not going to reinvent the wheel, but instead will guide you to the best online resources that I used to crack my Windows XP password.

现在已经有这么多篇文章,就如何收回或重置一个密码,我不想重新发明轮子,而是将引导您最佳的网上资源,我用了打击我的Windows XP的密码。

You may NOT see the password displayed, but the system recognises that you are actually typing it.

系统将会让你输入密码,你输入的密码是不可见的,但是系统可以正常识别到你的录入

And through comparison with DES and analyses of security, the block cipher presents high degree of security, confusion and diffusion, and is easy to be realized.

通过仿真,说明了该分组密码体制是可行的;通过对其安全性进行分析并与DES相比较,说明该分组密码体制具有较高的安全性,具有很好的混乱特征和扩散特征,并易于实现。

A sequence of three adjacent nucleotides in transfer RNA designating a specific amino acid that binds to a corresponding codon in messenger RNA during protein synthesis.

反密码子在蛋白质合成过程中,传送者RNA中的相关密码子与某种氨基酸结合,在传送RNA过程中出现的三个相邻的核□酸序列

A password-protected database can′t be made replicable, nor can a password be assigned to a replicated database.

设有密码保护的数据库是无法成为可同步复制的,而且也无法对同步复制的数据库指定密码。

第46/100页 首页 < ... 42 43 44 45 46 47 48 49 50 ... > 尾页
推荐网络例句

What would he tell Judith and the children?

他将怎样告诉朱迪丝和孩子们呢?

I this is at that time, the opinion with peacockish true girl is full of in a heart.

这就是当时的我,一个心中布满虚荣的女孩子真实的想法。

Oh, and I bought myself a new laptop," he said."

哦,我还给我自己买了一个新笔记本"他说。"