英语人>网络例句>密 相关的搜索结果
网络例句

与 密 相关的网络例句 [注:此内容来源于网络,仅供参考]

The method for encoding a position interpolator includes generating key data and key value data to be encoded by extracting, from a first animation path constituted by the position interpolator, a minimum number of break points, which can bring about an error of no greater than a predetermined allowable error limit between the first animation path and a second animation to be generated by the extracted break points, encoding the key data generated in step, and encoding the key value data generated in step.

用于对位置内插器进行编码的方法包括:通过从由位置内插器构成的第一动画路径中提取最小数量的断点,生成将被编码的钥数据和钥值数据,这些断点可以在第一动画路径和将由所提取的断点生成的第二动画路径之间引起不大于预定的可允许误差极限的误差;对在步骤中生成的钥数据进行编码;以及对在步骤中生成的钥值数据进行编码。

Experimental synchronous rotor internal mixer and two kinds of 55L synchronous rotor internal mixer, consulted a number of published articles at home and abroad, then, for the first time, formed four kinds of physical model and the corresponding mathematical model which related to the mixed stock between the mixing chamber side and the top of the rotor wing, to the mixed stock between the two rotors and to the mixed stock at the various temperatures of the mixing chamber. And from the character of model, the author gave the relevant analytic solutions and finite element approximation arithmetic solutions during the experimental process of the synchronous rotor internal mixer.

因此,本文作者在XM—1.7实验用同步转子炼机和两种50L同步转子炼机上进行了大量的实验,并参阅国内外已发表的文献和资料,首次建立了同步转子炼机混炼过程中,胶料在转子棱峰与炼室壁之间、胶料在两同步转子之间和炼室中混炼胶温度变化的四种物理模型及其相应的数学模型,并根据所建模型的特点,分别给出了相应的解析解或有限元数值解。

Different from all other current file encryption systems which are also based on DES, our Enhanced File Encryption System is following X9.17 key generation standard to ensure the strength of the primary key, utilizing Cipher Block Chaining mechanism to hold the text structure, and introducing cache technique and Bit / Byte mapping algorithm to enhance the efficiency while reducing the complexity of the system.

与当前许多基于 DES 的文件加系统不同,我们的增强型文件加系统采用 X9.17钥生成规范确保用户主钥的强度,采用文分组链接方式保护文的结构信息,并且通过缓存技术和位/字节映射算法提高系统的执行效率、降低系统的复杂度。

Leaves scattered; petiole 3–5 mm, densely spreading rust-colored setose; leaf blade elliptic-ovate, ovate, or oblong-lanceolate, 8–16 × 4–9 cm, papery-leathery, abaxially very densely rust-colored setulose, especially on veins, adaxially bullate, densely shortly setulose, immediately glabrescent, secondary veins 2 pairs arising from base, fine veins distinctly raised abaxially, impressed adaxially, base shallowly cordate to rounded, margin slightly revolute, sparsely dentate,± setiform-ciliate, apex acuminate, caudate, or acute. Inflorescences axillary, racemose or corymbose, 1–4 cm, ca. 10-flowered, densely tomentulose; bracts rhombic-triangular, 5–8 × 4–5 mm, leathery, densely tomentulose.

叶星散 叶柄3-5毫米,被平展锈色具刚毛;叶片椭圆状卵形,卵形,或者长圆状披针形, 8-16 * 4-9 厘米,纸质革质,背面非常浓锈色具小刚毛,在脉上的特别是,正面具泡状隆起,具小刚毛的被短的,立即后脱落,次脉2 对生于基部,清楚的细脉背面突起,正面凹陷,基部浅心形到圆形,花序腋生,总状或伞房状,1-4厘米,约10花,被被微绒毛;苞片菱形三角形, 5-8 * 4-5 毫米,革质,被被微绒毛。

Key management is the core problem of network system security, which deals with the correlative problems from key being generated to ultimately destroyed; it includes system initialization, key generation, key encasement, key distribution, key storage, key renovation, key destruction, etc. Thereinto key distribution and key storage are the two most intractable taches of key management.

钥管理问题是网络系统安全中首要的核心问题,它是处理钥自产生到最终销毁的整个过程中的有关问题,包括系统的初始化,钥的产生、装入、分配、存储、更新、吊销和销毁等内容,而钥的分配和存储是钥管理中最为棘手的两个环节。

Based on the elliptic curve cryptosystem, a multi-key sharing scheme in which the Lagrange interpolation polynomial is used and the cheaters can be detected is presented.

文章利用拉格朗日插值的思想,提出了一种基于椭圆曲线的可防欺诈的动态多钥共享方案;方案中每个参与者的子钥可以不受限制的重复使用,因此在更新主钥的时候,无需更改参与者的子钥,从而减少了可信中心与参与者之间的通信量;方案可灵活地增删参与者,且安全性是基于椭圆曲线离散对数问题的难解性,因而其安全性比在有限域上更高;方案实现过程中解决了检验子钥真伪的问题。

Following are the main results of this thesis: Detailedly analyze some related schemes concerning group key management, We reconstruct a tree key management scheme, in comparison with Logical Key Hierarchy and One-way Function Tree schemes, we find that it has good performance of key storage, re-key communication costs and calculation of group manager.

本论文的主要研究成果如下:对目前存在的多播组钥管理方案进行了详细的研究分析,提出了一种改进的树型管理方案,与逻辑钥分层方案和单向函数树方案进行分析比较,它在钥存储、钥更新、通信量以及组管理者的计算量方面均有较好的性能。

At the same time,Security of RSA is based on the difficulty in resolving a large number.The public key and the secret key are functions of a pair of large prime numbers.The difficulty in converting the cipher text into the plaintext through the public key equals to that of resolving the product of two large prime numbers.

RSA 的安全基于大数分解的难度,其公开钥和私人钥是一对大素数的函数,从一个公开钥和文中恢复出明文的难度等价于分解两个大素数之积。

The conception, studied objects and basic constituents of non-Smith strata are elaborated from theory level: Non-Smithian strata are the strata that have undergone mixing of different degrees, thus were deformed, metamorphosed and displaced into disorder totally or partially. They are the disorder parts in orogenic belts. Melange is the solo studied object of non- Smithian stratigraphy. The slices in melange is one of the basic constituents of non- Smithian strata, and also one of the basic units in the non-Smithian mapping. The slices used in this paper refer to blocks divided by small-scale tectonic boundaries and have certain constitutes. Superslices used in this paper refer to a set of slice association with similar tectonic deformation bounded by large-scale tectonic mixing.

从理论上阐述了非史斯地层的概念、研究对象和基本构件:非史斯地层(non-Smithian strata)是指那些经历过不同程度的混杂建造,并经历了变位,变形、变质,全部无序或部分无序的地层,主要指造山带地层中的无序部分;混杂岩是非史斯地层的唯一研究对象;混杂岩中的构造岩片是非史斯地层基本构件之一,亦是非史斯地层和地质填图基本单位之一,岩片是指以构造拼合边界所分割的具有一定物质构成的地质体;物质建造形成于同一大的构造旋回期(如晋宁期、加里东期、海西期等)、亲源关系切、大致经历了相似变形、变质历程的一套岩片组合体被称之为超岩片。

Later, figuratively at midnight, the attacker gains access to the unattended terminal and inputs to it the recorded host-terminal traffic, thus masquerading as the host to the terminal. The terminal deciphers the recorded ciphertext,using the recorded encrypted session key.

话路中的内容包括由终端钥加的话路钥,然后,形象的说法是在午夜,窍者登录到无人注意的终端,将记录下的主机-终端信息流输入给它,冒充是主机输给终端的,终端用记录下的加的话钥将记录的文解

第2/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Methods: Five patients with parkinsonism or dystonia were assigned to general anesthesia using an modified endotracheal tube.

本实验依照人体实验之相关规定进行,五位患有帕金森氏症或肌张力异常的病人接受神经立体定位手术。

If you can benefit from this book, it is our honour.

如果您能从本书获益,这将是我们的荣幸。

The report also shows that the proportion of unmarried men and women living together has doubled between 1986 and 2006, with 13 per cent of those aged 16 to 59 now cohabiting.

报告还指出,从1986年至2006年,英国未婚男女同居的比例增长了一倍,在16岁至59岁的人群中,有13%的人同居。