英语人>网络例句>hash 相关的网络例句
hash相关的网络例句
与 hash 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on chaotic theory combined with one time password authentication technology, an identity authentication scheme was presented which can resist attacks in common and resolve ordinary one time password unresisting small number attack and insecurity problems of transmitting plaintext iteration times and easily finding the security leak of collisions in traditional Hash function.

基于混沌理论和一次性口令认证技术,提出一种可以抵御常见攻击的身份认证方案。

In order to reduce the cost of matching, we used multiple scale technique. 4. We presented a novel method of searching for similar fragments of 3D curves. with this method, a hash vector is associated with each fixed-length fragments of 3D sherd. Each vector consists of low frequence component of Fourier-Like spectrum for the distance between profile curve and the centroid.

依据样条曲线的基本理论,研究了基于B样条的轮廓曲线的匹配方法,给出了由轮廓曲线不变量曲率和挠率构造的相似不变量的选取以及基于相似矩阵的匹配算法,并对该算法的时间复杂度作了估计,同时,将多尺度技术引入到物体轮廓的匹配问题中。

If you are looking for an application to check more hash algorithms, then you can have a look at Checksum verifier.

如果你正在寻找一个应用程序,检查更多的散列算法,那么你可以在看校验和验证。

Experimental results show that the hash function based on the Web site achieves the goal of the distributed Web crawler.

单处理机系统受限于CPU的处理能力和磁盘存储的容量,不可能具备这种处理海量信息的能力,更不必说跟上Web信息的飞速增长了。

The key technologies of which are hash function zero knowledge proof and digital signature.

消息完整性及真实性认证是防止消息被篡改、删除、重放和伪造的一种有效方法,其关键技术为:哈希函数、零知识证明和数字签名。

Dev/urandom is similar, but when the store of entropy is running low, it'll return a cryptographically strong hash of what there is.

dev/urandom 基本相似,但是当存储大量图谱进行低级运算时,它将返回一个足够强度的密码哈希值。

In this paper, by considering the convenience of consumers, we use group blind signature technology with the character of hash chain to create the dividable and anonymous e-cash. Thus the users can consume not only in the home mobile domain but also visit mobile domain without register and authentic. We use off-line e-cash to increase the efficiency of payment exchange. Under the fair principle of all participators, we set a convenient and secure mobile payment.

因此,以消费者使用上的最大便利性为考量,本研究利用群体盲签章加入杂凑链之特性的方式来产生可分割的匿名电子现金,让消费者不只可以在主系统业者的网域内作消费,当其到漫游业者的网域内消费时,也不需要额外的认证及注册过程,并采用离线验证的方式来增加付款交易的效率性,在考虑各角色公平的原则下,提供一个方便、安全的行动付款系统。

Each words in the alphabet will be assigned an invertible hash-code.

字母表中的每一个字将被分配一个可逆的哈希代码。

Compared with traditional vector filtering, our new algorithm can filter out more irrelated tuples and improves the performance with 10%.

本文还研究了连接运算的加速技术,针对传统的位向量过滤技术的不足,提出了对称位向量加速技术和动态内外关系角色转换的Hybrid-Hash连接算法。

But overnet v0.52 and a ed2ktool v0.4, ed2k-hash, give out the same result as mldonkey's.

我估计应该是ed在前几个版本的时候自行对ed2k协议做了点改动,而em则没有理会。

第23/31页 首页 < ... 19 20 21 22 23 24 25 26 27 ... > 尾页
相关中文对照歌词
Re-Hash
Hash Pipe
EZ Wider With Hash
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。