• Please input the cipher code will register.

    输入注册密码

    youdao

  • Its cipher code is basically the golden standard of Internet security, and it doesn't sell subscriber lists.

    密码网络安全上可称得上金牌标准而且出售用户名单

    youdao

  • In order to keep pace with the accreditation of wireless network and cipher code, the wireless public key system is researched.

    为了适应无线网络认证加密需要,无线公钥体系进行了研究。

    youdao

  • Electronic certification service systems shall be built by entities qualified for producing cipher code products for commercial uses.

    电子认证服务系统应当具有商用密码产品生产资质单位承建。

    youdao

  • The record and statistic of telephone charging, the control of user grade and cipher code telephone are developed deveploped in this system.

    系统可以实现电话话单记录话费统计结算、用户话机权限控制密码电话等功能。

    youdao

  • Used present microprocessor AT89C51 as control part, designed a electronic trick lock. It can be set up some cipher code, changed many times and kept cipher code.

    利用目前使用的处理器at89c 51作为控制元件设计了一种电子密码锁

    youdao

  • The invention relates to a digital cipher code protection device, especially a grille window small display screen cipher code theft-proof device used for ATM and counter of bank.

    发明涉及一种数字密码保护装置特别是用于银行自动取款机柜面使用的格子显示屏数字密码防盗器。

    youdao

  • After an initial killing spree, he continued to hold the Bay Area in thrall with threatening letters accompanied by blocks of cipher code, which newspapers printed like the morning crossword.

    这个凶犯大开杀戒之后,寄出带有密码积木恐吓信,让加州地区的人们一直惊恐万分。报纸这些密码印刷成类似晨报上的字谜游戏。

    youdao

  • By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    利用RS两锁密码协议构造一种非对称公钥叛逆者追踪方案。

    youdao

  • In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods.

    基于网络数据传输安全问题信息安全领域的重要课题之一,本文分析现有数据加密方法的基础上,数据传输系统应用一种基于分组密码新概念的新算法排列加密算法。

    youdao

  • Single bit and multiple bits diffusion code and the method of constructing authentication code and block cipher used with them is suggested in this paper.

    本文提出了比特比特扩散以及它们构造认证码和分组密码方法

    youdao

  • Indeed, America and Britain were so deeply penetrated that the Russians soon found out about Venona, changing their codes and cipher machines on October 29th 1948—"Black Friday" for code-breakers.

    毫无疑问的,美国英国非常清楚苏联很快就发现了Venona的存在,并更改了了他们的密码密码1948年10月29号—译码者的“黑色星期五”。

    youdao

  • Indeed, America and Britain were so deeply penetrated that the Russians soon found out about Venona, changing their codes and cipher machines on October 29th 1948—"Black Friday" for code-breakers.

    毫无疑问的,美国英国非常清楚苏联很快就发现了Venona的存在,并更改了了他们的密码密码1948年10月29号—译码者的“黑色星期五”。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定