英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

Keywords: identity-based encryption, digital signature, matrix canonical decomposition

中文关键词:基于身份的公钥密码,数字签名,矩阵经典分解

The pupose of the research is to develops public key encryption and digital signature shemes based on matrix canonical decomposition problem, or matrix diagonalization problem over Z/n, the ring of integers with modulo-n addition and multiplication in particular, where n is an RSA modulus.

本课题研究基于矩阵经典分解问题,特别是Z/n上矩阵对角化问题的公钥密码与数字签名算法,其中n是一个RSA模数。新算法采用由一个矩阵多项式构成的多维单向陷门函数,其单向性由矩阵对角分解问题(即通过相似变换将矩阵化为对角型的问题)的复杂性来保障,对该函数求逆的陷门由矩阵的特征值或特征向量提供。

Understanding of the data encryption methods used by the Angel Cartel and its allies.

关于天使企业和他的盟友使用的数据密码技术方法的理解

Castanet's next version promises additional security, with password access and encryption.

下一版本的castanet将通过口令访问和加密增加安全性。

A symmetric image encryption algorithm that has a 128 bit key was proposed based on cellular neural network and coupled map lattice model.

基于细胞神经网络和耦合映像格子模型,提出了一种密钥长度为128 bit的对称图像加密算法。

Because of its cost-effective encryption and authentication framework, TESLA protocol is to be in line with the characteristic and security needs of wireless sensor networks to some extent.

TESLA协议凭借其低成本高效率的加密技术和认证框架,在一定程度上符合了无线传感器网络的特点和安全需求。

If there is an express integrity and the corresponding ciphertext But achieving deciphering function, which is derived encryption keys.

如果有完整的明文和对应的密文可是实现破译功能,即得出加密密钥。

In this paper, we use a light-weight encryption scheme called Privacy Homomorphism that supports operations over ciphertext for our purpose.

因此在这篇论文中,我们利用了轻量化的加密演算法且能提供在密文上做资料计算的方法Privacy Homomorphism来达成我们的目标。

"Data encryption: Process of disguising information as " ciphertext ,"or data that will be unintelligible to an unauthorized person."

资料加密:将信息伪装成密码文件或使未经许可的人无法识别的资料的方法。

Based on the current stage of network data security is not an ideal situation, using advanced encryption algorithm and ciphertext REQUEST primer mechanism for the security of the data design.

本文基于现阶段网络数据安全并不理想的情况下,采用了先进的加密算法以及密文索机制引进行了数据安全设计。

第11/60页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher