英语人>网络例句>密码的 相关的搜索结果
网络例句

密码的

与 密码的 相关的网络例句 [注:此内容来源于网络,仅供参考]

You no longer have to know the cryptic code of the ACAD.MNS file.

你不再需要认识类似密码一样的acad.mns文件了。

This paper summarizes the development and applications of information security technologies, especially the cryptogram technology.

文章综述信息安全技术,特别是密码技术的发展与应用。

The structure is simple and flexible. Some usual block cryptogram can be applied to the new structure.

结构简单、灵活,可以将常用的安全分组密码算法应用于该结构。

In addition, the existing of quantum non-cloning theory leads to the birth of quantum cryptograph.

再者,由量子态不可克隆的特性产生了量子密码学。

The important impact of quantum computation on modern cryptograph is talked about.

介绍了量子计算理论对现代密码学的重要影响,建立了量子保密通信模型,给出了几类量子攻击模式。

Cryptograph plays a more important role in this e-age.

在这个电子时代里密码学起着更重要的作用。

Information Security is a new integrative intersectional subject inosculate with modem cryptograph, computer network Security and secrecy communicate theory.

信息安全是一门融合现代密码学、计算机网络安全和保密通信理论的综合交叉性新兴学科。

Elliptic curve cryptograph is based on the difficulty of solving discrete logarithm on elliptic curve domain, and therefore it has higher security than other cryptography.

椭圆曲线密码机制是基于椭圆曲线域上求离散对数难度,因此具有更高的安全性。

Ad Hoc networks ; Key management ; Identity-based cryptograph system ; Signeryption

Ad Hoc 网络;密钥管理;基于身份的密码体制;签密

Any good cryptographer with spare time is poking at those designs.

所有好的密码学家即使在闲暇时间也在谈论这些设计。

第63/100页 首页 < ... 59 60 61 62 63 64 65 66 67 ... > 尾页
推荐网络例句

The concept of equivalent rotationally rigidity is offered and the formula of rotationally rigidity is obtained.

主要做了如下几个方面的工作:对伸臂位于顶部的单层框架—筒体模型进行分析,提出了等效转动约束的概念和转动约束刚度的表达式。

Male cats normally do not need aftercare with the exception of the night after the anesthetic.

男猫通常不需要善后除了晚上的麻醉。

Its advantage is that it can be used in smaller units.

其优点在于可以在较小的单位中应用。