英语人>网络例句>encryption 相关的网络例句
encryption相关的网络例句

查询词典 encryption

与 encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]

The synchronous measurement scheme of combining the wire encryption control survey and strip topography mapping was taken in the course of the engineering survey for the Xilongchi Pumped Storage Power Station , located in Shanxi Province.

在山西西龙池抽水蓄能电站施工测量中,采取导线加密控制测量和带状地形图测绘的同步测量方案,利用全站仪开展导线控制测量与碎部测量同步进行,最后用微机进行测量后的数据处理工作。

The new encryption systems effectively solve the problem of one way error diffusion in a single cellular automata system and acquire large key space with small rule radius.

新的复合元胞自动机密码系统很好地解决了单一元胞自动机密码系统中存在的误差单向扩散的问题,并且能够以较小的规则半径获得大密钥空间。

Of course, if we find that the local node in the wireless LAN equipment has been illegal attacker encryption, they can not normally enter the local wireless LAN, we can force the wireless device node parameter setting back to default, to restore the specific ways to view the corresponding wireless node equipment manuals, usually as long as we press the wireless node equipment in the control panel button to complete the reset function to restore the task parameters.

当然,要是我们发现本地无线局域网中的节点设备已经被非法攻击者加密,自己不能正常进入本地无线局域网时,我们可以强行将无线节点设备的参数设置恢复到默认状态,具体恢复方法可以查看对应无线节点设备的操作说明书,通常情况下我们只要按下无线节点设备控制面板中的reset功能按钮来完成参数设置恢复任务。

Lastly, this paper analysis the safety problems that may happened between WAP terminal and data center when they are communicating. In addition, this paper proposes a encryption algorithm based on the theory of shared secret key in order to improve the wireless protocol.

本文最后针对ITS中WAP终端与数据中心通信的环节上可能出现的安全隐患做了分析,同时也提出了一个基于共享密钥的加密算法对移动协议进行了改进。

Encryption allows people with "need-to-know" privileges to view sensitive information with ease while effectively blocking access to unauthorized parties.

加密后的文件只允许有&需要认识&特权的人轻易浏览敏感信息,同时有效阻止非法用户进入文件。

In this thesis, GSM mobile phone encryption security system design is mainly researched.

本文致力于GSM加密手机系统的安全性设计研究。

The platform is designed to combine ease of programming with powerful features such as over the air programming and debugging, adhoc mesh networking, innovative power management, built-in encryption and easy interface to a variety of sensors and effectors.

开发平台将程序开发的轻松性和一些功能强大的特性设计结合在一起,比如,空中编程和编译,临时性mesh网络,新颖的电源管理,内置加密及与多要传感器和效应器轻松连接

Designing encryption algorithms is a challenging business that should be left to cryptographers.

设计加密演算法是一个极具挑战性的任务,而且是属於密码学家的任务。

D k E k (P=P 计算机专业英语 10-17 Chapter 10 Computer and Network Security 10.2 Modern Cryptography- Data Encryption DES has been studied by many of the world's leading cryptographers, but no weaknesses have been uncovered. To crack a DES-encrypted message a hacker or commercial spy would need to try 255 possible keys.

前略为了打开一个DES加密的报文,黑客或商业间谍需要试验前略为了打开一个DES加密的报文, DES加密的报文种可能的密钥, 255种可能的密钥,这种搜索在世界上最快的巨型机上也需好几天的计算机时间。

It also makes sense to prevent potential eavesdroppers from spying on your data stream, so a combination of filtering and encryption will provide all the

这是最低限度的安全,您应该适用。它也使意识,以防止潜在的间谍窃听从您的数据流,因此相结合的过滤和加密将提供一

第58/60页 首页 < ... 52 53 54 55 56 57 58 59 60 > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher