英语人>网络例句>密码文 相关的搜索结果
网络例句

密码文

与 密码文 相关的网络例句 [注:此内容来源于网络,仅供参考]

Detailed use tutorial refers to server of accessary Word documentation mail to set an example please: Server: Pop.gmail.com user: Cyqyong password:***** port: 995 SSL visit: It is the author adds: Project of software of institute of our northing computer Team Terminator group.

详细的使用教程请参见附带的word文档邮件服务器设置样例:服务器:pop.gmail.com 用户:cyqyong 密码:*****端口:995 SSL访问:是作者附:我们北航计算机学院软件工程的Team Terminator团队。

The use of password protection for documents, is one of the most commonly used approach.

使用密码对文档进行保护,是一种最常用的做法。

It is not necessary to password protect the document while preparing it for review.

Note|在进行审阅文档准备时,没有必要密码保护。

In accordance with the problem that the fast implementation of elliptic curve cryptosystems relies on the efficient computation of scalarmultiplication, this paper improves the mixed binary and ternary method to express n, generalizes the mixed binary, ternary and quinary method toexpress n .

椭圆曲线密码体制的快速实现依赖于标量乘的有效计算,该文改进n的二进制和三进制的混合表示方法,并且将其推广到n的二进制、三进制和五进制的混合表示。

There are three copies of R fragment in the S mt-genome, and each copy contains two closely adjacent open reading frames: orf355 and orf77. Among these three copies two BamHI fragments were cloned, and the sequence analysis showed that cox1 and cox2 gene lies upstream of the R region in each fragment, respectively. However, they locate in different strands and head to head with R. In this study, we found that:(1) The expression of cox1 and cox2 is not affected by the transcription of R region;(2) The two copies of R region transcribe in large amount in the microspores, and produce transcripts of 1.6kb and 2.8kb, respectively, in the sterile microspores; However, the abundance of these two transcripts is reduced in the fertility restored microspores, realized through the mRNA decay, and this reduction occurs at the uninucleate microspore stage;(3) In the sterile microspores, the 5 terminus of the 1.6kb transcript contains a palindrome region that can fold into a stem-loop.

本研究发现:(1) cox1和cox2的转录没有受到R区转录的影响;(2)两个拷贝的R区在在不育花粉中高丰度表达,其转录本大小分别为1.6kb和2.8kb;而在育性恢复的花粉中,这两个转录本的丰度被大大降低,进一步分析表明这一结果是通过mRNA分子的降解途径来实现的,此降解过程发生在单核花粉期;(3)在不育花粉中,1.6kb转录本的5′末端具有一段可形成茎环结构的迴文对称序列,而在可育花粉中,其5′末端短缺了9个碱基;(4)在不育花粉和育性恢复的花粉中,R区转录本的加尾位点都集中位于一个3′茎环结构之后;(5)不管是在不育花粉还是育性恢复的花粉中,orf77区域内均在第52位和100位核苷酸处发生了不同频率的C向U的编辑,从而形成UGA终止密码;(6)不管是orf55-orf77的成熟转录本还是转录前体分子,都已被加上了Poly尾巴,表明已进入降解途径;在以上实验结果的基础上,本研究对S型CMS花粉育性的恢复机理进行了如下推测:在不育花粉和育性恢复的花粉中,orf77区域内均发生了终止编辑,即由RNA编辑产生了提前终止密码子。

However, in 1997, Biham and Shamir announced a novel attack called Differential Fault Analysis.

直到1997年Biham与Shamir提出了错误差分攻击法(Differential Fault Anaylsis,DFA) [2-3],证明在假设的错误情况发生之下,只需要少数的明文与错误密文对,便可以破解DES密码器。

Considering RSA is one of the most widely used cryptosystems,this paper proposes a confirmer signature scheme based on RSA for the first time.

考虑到RSA是应用最广泛的公钥密码体制之一,该文提出了一种完全基于RSA的证实数字签名方案,分析表明,该方案是一种安全高效的证实数字签名实现方案。1概述Chaum引进了证实数字签名[3]的概念。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

This paper generalizes the conclusion of Perfect nonlinear S-boxes by Nyberg(1991), and introduces the conception of inverse regular generalized vector Bent function. It shows that for inverse regular generalized vector Bent function f with even variables, m is no more than half of?. It also shows that when the input dimension n is odd, the regular generalized vector Bent function and the inverse regular generalized vector Bent function do not exist. This may prevent the cryptology designer from seeking the inexistent function.

摘要该文完善并拓展了Nyberg(1991)的关于广义向量Bent函数性质的结论,相应于Nyberg给出的正则广义向量Bent函数,提出了&负则的广义向量Bent函数&的概念:得到有偶数个输入的负则的广义向量Bent函数输出维数也不大于输入维数的一半;证明了奇数个输入的正则和负则的广义向量Bent函数都不存在,这些结果的给出,可使密码设计者避免一味去寻找某类不存在的函数。

The Guardian can reveal that a team of 20 top scientists assembled by Mr Venter,led by the Noble laurate Hamilton Smiith,has already constructed a synthetic chromosome,a feat of virtuoso bio-engineering never previously achieved.Using lab –made chemicals,they have painstakingly stitched together a chromosome that is 381 genes long and contains 580,000 base pairs of genetic code.

家长可以显示一个20人的团队的顶尖科学家通过文特的带领下,高贵的laurate汉密尔顿Smiith,已经建造了一个合成染色体,这一壮举的演奏家生物在以前从未达到使用化学实验室,他们之前在刻意的染色体缝长和包含381基因遗传密码的580,000降到了现在的碱基对。

第3/5页 首页 < 1 2 3 4 5 > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher