英语人>网络例句>数据加密算法 相关的搜索结果
网络例句

数据加密算法

与 数据加密算法 相关的网络例句 [注:此内容来源于网络,仅供参考]

The localfile is encrypted using the Blowfish algorithm, and you can edit information in a spreadsheet-likelayout.

本地文件被加密使用 Blowfish 算法,和你能够在似电子数据表的规划中编辑信息。

Checksum, CRC, hash algorism, message digest, digital autograph and public denskey system are thetechnology to transmit relative data, confidential information and veracity confirmation through compuer or internet, and couldbe applied to the government network.

校验和、循环冗余校验码、散列算法、消息摘录、数字化签名和公共密钥加密系统是可用于INTERENT网或用计算机传送的有关数据、信息加密和真实性确认的技术。

Considering that magic cube is easy to disarrange and hard to solve, I designed the Magic Cube Stream Cipher: the main part is a virtual cube filled with data; by turning the magic cube many times, original data are disarranged and new ones are generated; new data serve as current secret key, which is a part of the key stream.

我根据魔方"打乱容易恢复难"的特性,设计了魔方流密码算法:主体是一个由数据构成的虚拟魔方;利用多次魔方变换改变数据"魔方"的整体状态并生成新的数据;以此作为本次加密运算的密钥。

The secret hash digital signature is a new siganture method that combines the ideas of RSA public-key algorithm, MD5 one-way hash function and permutation code at the same time.

保密散列数字签名算法利用RSA公钥密码体制的原理、MD5单向散列函数和排列码加密的思想,构造了一种能够快速实现数据保密、数字签名的签名方案。

This paper presents tour route clustering algorithm based on Isometric Encryption and Case Reasoning.It firstly processes the tourists' sensitive attribution using random isometric rotation transformation,then uses case reasoning to analyze the tour route on transformed dataset.

提出了基于等距加密和案例推理的旅游线路聚类算法,首先对旅游者的敏感属性进行随机等距旋转变换,再对变化后的数据集使用案例推理方法进行旅游线路的聚类分析。

Firstly,the wavelet-based contourlet coding using an SPIHT-like algorithm is utilized on the plain image,and as a result,the compressed datum stream could be achieved which is then mapped to a 3D bit matrix. Afterward,a chaotic sequence is generated by Lorenz chaotic map,and it is preprocessed to a bit sequence which is used to permute and substitute the elements of the 3D bit matrix achieved above. In the end,the processed 3D matrix is mapped back to datum stream,and the encrypted compressed image could be achieved if decoding and inverse transform are performed on the datum stream.

首先采用基于小波的Contourlet变换的类等级树集合分割编码算法对明文图像进行压缩,得到压缩数据流,然后将压缩数据流映射为一个三维位矩阵;利用Lorenz混沌映射产生混沌序列,并对其进行预处理得到比特值序列,根据比特值序列对上述三维位矩阵进行置乱和替代操作;将置乱和替代后的位矩阵重新映射为数据流,并对其进行解码和反变换操作,得到加密后的压缩图像。

This scheme is based on the PRIMAR protection scheme, adopt Blowfish algorithm to encrypt, use Hash function (SHA-1) and Cyclic Redundancy Check to make sure the data integrity, and adopt DSA signature.

该方案基于PRIMAR保护方案发展而来,采用Blowfish分组算法对海图信息加密保护,通过SHA-1哈希函数和CRC循环冗余校验确保传输数据的完整性,并采用DSA算法进行签名认证。

With PKI, the encrypting and decrypting functions are comprised of mathematical algorithms and the keys are represented by numbers.

对于PKI,加密和解密功能由数据算法和由数字代替的密钥组成。

Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured.

cryptocx加密和解密数据使用标准的封装算法,以确保你的信息是完全担保。

Considering that magic cube is easy to disarrange and hard to solve, I designed the Magic Cube Stream Cipher: the main part is a virtual cube filled with data; by turning the magic cube many times, original data are disarranged and new ones are generated; new data serve as current secret key, which is a part of the key stream.

我根据魔方&打乱容易恢复难&的特性,设计了魔方流密码算法:主体是一个由数据构成的虚拟魔方;利用多次魔方变换改变数据&魔方&的整体状态并生成新的数据;以此作为本次加密运算的密钥。

第4/5页 首页 < 1 2 3 4 5 > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。