英语人>网络例句>篡改 相关的搜索结果
网络例句

篡改

与 篡改 相关的网络例句 [注:此内容来源于网络,仅供参考]

All of these convenience people's work and life . However, because of technique reasons or attackers, the information may be wiretap, distort, or delete in deliver of process, information security suffered to threaten seriously.

然而,由于技术原因和人为攻击等因素,信息在传输的过程中很可能被窃听、篡改、重放和删除,网络通信的安全受到了严重威胁。

The most direct and effective technical means to prevent the illegal wiretapping or fabrication of information transmitted on the network is believed to be cryptography.

为了使网络中所传输的信息不被非法地窃取或篡改,密码学被认为是最直接、最有效的保护信息安全的技术手段。

The key technologies of which are hash function zero knowledge proof and digital signature.

消息完整性及真实性认证是防止消息被篡改、删除、重放和伪造的一种有效方法,其关键技术为:哈希函数、零知识证明和数字签名。

He brilliantly parodied Mies van der Rohe's dictum that "less is more" in his motto "too much is never enough", and his buildings revel in the amoeboid plans, Swiss cheese-holes, stick columns and kidney-shaped swimming pools so characteristic of the age.

他才华横溢地篡改了密斯·凡德罗的名言&少即是多&,将之变成多无止

These modern boxlike buildings do violence to the beauty of the old city.

这些现代的盒式建筑破坏了古城的美丽市容。7。曲解,篡改

Philippine Presidential frontrunner Miriam Defensor Santiago says today she will stage a national crusade to save democracy against another Watergate or what she termed as "wholesale cheating" in the tabulating results or this week's election.

菲律宾总统竞选的绝对胜出者今天说她要在全国范围内发起一场捍卫民主抨击政治丑闻的运功,这件篡改本周选举结果的政治丑闻被她称做&全体欺诈&。

Part II; Analyze two cases ,War of Chi-Bi and the battles over the regions of Jing and Yi, combined with the history facts and comparison with relative works, concretely explain which method the author used to distort history, to uglify and dwarfy Sun-Wu regime.

论文第二部分,是通过小说中&赤壁之战&、&荆益之争&两个个案分析,结合史实和相关作品做横向、纵向的对比,具体说明小说作者是怎样&篡改&历史,以矮化、丑化孙吴集团的。

The method has some characteristics:(1) it adapts to medical images authentication due to the high Signal-to-Noise when the watermark was embedded into images.(2) It ensures the fragileness of watermark when it combines with the statistical information of wavelet coefficient to choose the embedding position.(3) It has a strong localization ability for tampering because of the characteristics of wavelet decomposition in the space-frequency domain.(4) It uses the secret key which can resist the malice attack even if opening the algorithm completely to protect the proposed method.

本算法具有以下几个特点:(1)图像嵌入水印后具有较高的信噪比,适用于医学图像的认证;(2)结合小波系数的统计信息来选择嵌入水印的位置,保证了水印的易碎性;(3)小波分解在空频域的特性使得算法对篡改具有很强的定位能力;(4)利用密钥对算法进行保护,即使公开算法,也能抵挡恶意攻击。

Mr Goodman would certainly regard that view as too optimistic: his book's final section presents Christianity—with its "usurpation" of the word Israel to mean a world-wide community of believers—as incorrigibly hostile to Judaism.

这种观点,古德曼看来显然过于乐观。他在书的最后部分写道:基督教篡改&以色列&的意义,称其为遍布天下的信徒之家,而且它对犹太教的敌意根深蒂固,难减丝毫。

DDMRA only recoveries incorrupted data items by malicious transactions to avoiding re-excution of innocent operations while transaction dependency methods undo-redo all operations of malicious transactions. In BDDMRA, benign blind writes can write bad data items to normal state thus corresponding malicious operations are not necessary to undo-redo and it will speed up recovery process.

DDMRA算法通过仅仅将恶意事务篡改的数据恢复到正常版本而无需全部&撤销-重做&事务中的所有操作从而避免了无辜操作的重复执行;BDDMRA算法分析了存在盲写事务条件下基于数据依赖的恶意事务恢复方案,善意的盲写事务可以将已破坏的数据恢复到正常状态,无需&撤销-重做&相关恶意操作,从而加快了恢复过程。

第14/26页 首页 < ... 10 11 12 13 14 15 16 17 18 ... > 尾页
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?