英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

By taking advantage of the non-conjugate transformation and multiple variant equations on braid group s, two intractable problems are proposed, and the hardness of these problems comes from the enlarged amount of va.

辫子群是一种新兴的适用于量子计算机时代的公钥密码平台,辫子群上已知的用于公钥密码系统的一些难解问题和基于这些难解问题的公钥加密算法都受到不同程度的攻击。

The other side of the coin, cryptanalysis, is the art of breaking such secret ciphers and reading the information, or perhaps replacing it with different information.

硬币的另一面,密码分析,是打破这种秘密的密码和读取的信息,或者根据不同的信息取代它的艺术。

As Langdon and a gifted French cryptologist, Sophie Neveu, sort through the bizarre riddles, they are stunned to discover a trail of clues hidden in the works of Leonardo Da Vinci----clues visible for all to see and yet ingeniously disguised by the painter.

当罗伯特·兰登与法国的密码破译天才索菲·奈芙,在对一大堆怪异的密码进行整理的过程中,发现一连串的线索竟然在众目睽睽之下但仍被作者巧妙地隐藏在达·芬奇的艺术作品中!

Be in be affected the game of tiring-room purloin network of all of computer science department " challenge Online "," yellow Yi Qunxia passes Online "," adventurous island Online "," devildom Online "," Online of hot-blooded all corners of the country "," 3 國 group flower 傳 Online ",, and on the long-range server that backstage sends player message be astonished guest to appoint, goods of the game account of the player that causes above network game, equipment, money missing, bring the loss of different level to game player.

在被感染计算机系统的后台盗取网络游戏《挑战Online》、《黄易群侠传Online》、《冒险岛Online》、《魔界Online》、《热血江湖Online》、《三國群英傳Online》、《希望游戏Online》、《卓越之剑Online》玩家的游戏帐号、游戏密码、仓库密码、角色等级等信息,并在后台将玩家信息发送到骇客指定的远程服务器上,致使以上网络游戏的玩家的游戏帐号、装备物品、金钱等丢失,给游戏玩家带来不同程度的损失。

Please check the documentation of your program installation instruction (see the card inside the paper CD-ROM holder), you should have a program description printed at the top of card, which contains the password to install your selection, you must be sure to follow the instruction in the multimedia setup screen, this information will assist you with identifying your password phrase or you may fill out the attached form below.

请查看安装程序的说明文件,在卡上印刷有一个文件安装程序的说明,包括选择安装的密码,你必须按照多媒体上的安装设置操作,这些信息将帮助你识别密码,你也可以填写以下的表格。

Hyperelliptic curves cryptography is one kind surpassing of ellipse curve cryptography.

在同等安全水平下,HECC比ECC所用的基域小,并且在同样的定义域上,HECC可以提供更多的曲线,这样可以用于密码学中的安全的曲线的选项便增多了,由于这些优点使得HECC在近几年来,在密码界中受到越来越多的重视。

Never keep your pin numbers written down in your wallet or purse, as if you lose it or it's stolen a fraudster will have both your cards and their pins.

永远保持你的密码写在你的皮夹或钱包如,如果你失去它或它的被盗行骗,将你的两个卡及其密码。

In addition, we compared the codon preferences among poplar, Arabidopsis thaliana, Oryza sative, Homo sapi- ens and Escherichia coli, and poplar was found to be most similar to A.thaliana and least similar to E.coli.

将杨树的密码子使用频率与拟南芥、水稻、大肠杆菌和人等不同模式生物种比较后发现,杨树密码子的偏爱性与同为双子叶植物的拟南芥最为相似,与人和大肠杆菌之间的差异较大。

The new encryption systems effectively solve the problem of one way error diffusion in a single cellular automata system and acquire large key space with small rule radius.

新的复合元胞自动机密码系统很好地解决了单一元胞自动机密码系统中存在的误差单向扩散的问题,并且能够以较小的规则半径获得大密钥空间。

The Genetic Code and the Origin of Life celebrates the 50th anniversary of the discovery of the double helix.

遗传密码和生活分子生物 Living beings 学 Biological情报部门(没有数的起源遗传密码和生活的起源庆祝双螺旋的发现的50周年纪念日。

第49/100页 首页 < ... 45 46 47 48 49 50 51 52 53 ... > 尾页
推荐网络例句

What would he tell Judith and the children?

他将怎样告诉朱迪丝和孩子们呢?

I this is at that time, the opinion with peacockish true girl is full of in a heart.

这就是当时的我,一个心中布满虚荣的女孩子真实的想法。

Oh, and I bought myself a new laptop," he said."

哦,我还给我自己买了一个新笔记本"他说。"