基于这一模型,设计了一个称为基于全非奇异矩阵的代替置换网络的密码结构。
Based on this model, a new crypt structure called completely nonsingular matrix based substitution permutation network is designed.
平面文件适配器拾取密码文件,并将其转换为数据处理程序要求的数据结构(补充有关目标服务的信息)。
The flat file adaptor picked up the password file and converted into a data structure required by the data handler, complete with information about the target service.
包含了记忆挑战,单词谜团,字母密码,句子结构和拼凑图片。
There are memory challenges, word jumbles, letter ciphers, sentence constructions, and patchwork pictures.
首先,本教程将介绍一些基本的Xforms开发,包括文本输入、密码模糊文本输入和所需的的数据结构。
First, the tutorial will address some of the basics of XForms development including text entry, password obscuring text entry, and the data structures that are required.
我开发了一个j2me类,它包含几个用于生成asn . 1数据结构的方法,我还展示了如何利用用户的密码生成一个Kerberos密钥。
I have developed a J2ME class that contains several useful methods for the authoring of ASN.1 data structures, and I have also showed how to generate a Kerberos secret key from a user's password.
代码中将用户名和密码存储在MQCSP结构中,并在调用时将指向此结构的指针psecurityparms传递给该函数。
The username and password are stored in a MQCSP structure, and a pointer to this structure, pSecurityParms, is passed into the function when it is called.
您还了解了密码破解者如何在内部和外部使用技术攻击您的基础结构。
You also saw how password crackers use techniques both internally and externally to your infrastructure.
从结构上来讲,基因包含三个区域:称为启动子的调节区域;与其并列的编码蛋白质的密码子区域;以及3'端尾部序列。
Structurally, a gene is formed by three regions: a regulatory region called the promoter juxtaposed to the coding region containing the protein sequence, and a “3’ tail” sequence.
这类恶意软件能够对计算机操作系统和嵌入式设备进行隐蔽探测,记录网络内部结构、口令密码等信息。
This kind of malicious software can hide the computer operating system and embedded devices, recording the internal structure of the network, password password and other information.
本文对这三种密码协议的执行时间、结构特性以及实现分析的软件复杂度给出了客观的评估。
The thesis also objectively evaluates the performance of time delay, structure properties and software complexity of the above three cryptographic protocols.
国外有关电子商务的安全技术,虽然其结构或加密技术等都不错,但受到了外国密码政策的限制,因此强度普遍不够。
Abroad one-commerce security technology, although its structure or encryption technology is good, but is limited by the foreign password policy, so the strength of the common enough.
在MSR框架结构下定义了密码协议的秘密性和认证性。3改进了协议模型和攻击者模型,主要解决了攻击者模型中出现的无限循环状态。
Under the MSR framework, the definitions about secrecy and authentication are proposed3 Protocol model and intruder model is improved to solve the infinite state of intruder model.
根据WPS文件的结构特点,本文利用DOS中的文件句柄功能编制一汇编语言源程序,可以方便地找出加密文书文件的密码。
Based on the structure of-WPS's file and file handles access in DOS, the paper gives a assembly language program, which is designed to find the cryptic code of the files encrypted in WPS.
将上述方案的设计思想扩展到所谓的“一般存取结构”,对现有的可视密码方案提出了一个一般性的改造方案。
The design of above scheme is extended to the so-called "general access structure", a general reconstructed scheme is proposed for the existing visual cryptography schemes.
“这可能涉及第一个遗传密码的基本结构,”加拿大安大略省汉密尔顿·麦克马斯特大学的物理学家拉尔夫·普瑞兹说。
"This may implicate a universal structure of the first genetic codes anywhere," said astrophysicist Ralph Pudritz of McMaster University in Hamilton, Ontario.
本文利用HSP-方法证明了该等式成立,并且证明中不涉及到密码群并半群的结构定理。
This thesis gives a new proof by HSP-method, never referring to the construction theorem of cryptogroups.
目的对广东地区汉族人群的甘露聚糖结合凝集素结构基因第一外显子第54位密码点突变(GGC54GAC)进行初步筛查。
Objective To screen the point mutation at the codon 54(GGC54GAC) in the first exon of the mannan binding lectin (MBL) gene in Hans from Guangdong.
我猜你想将一个字符串编码的用户的用户名,密码和姓氏为一三线结构,添加标签的文件是。
I suspect you want split a string encoding a user's Username, password and surname into a three line structure, adding tags to document which is which.
介绍一种可控密码防伪包装技术的结构特点、作用原理及实际防伪效果。
It also introduced the working principles and construction features as well as practical effects of the controllable crypto anti-forgery packaging technology.
您可以选择性地指定密码,指出是否要保护这个结构 (让使用者无法四处移动工作表)以及是否要保护活页簿的视窗。
You can optionally specify a password, indicate whether you want the structure protected (so users cannot move sheets around), and indicate whether you want the workbook's windows protected.
本文针对传统密码芯片结构固定,算法单一的缺点,提出了一种新的密码芯片的设计方法。
Aiming at the shortcomings of immobility structure and single algorithm of the traditional cryptographic chip, this paper presents a new method to design cipher chip.
RUC模型和RCA模型为可重构密码处理结构的研究提供了基本的参考结构、分析方法和设计准则。
RCA and RUC provide a structural sketch, analysis methods and design rules for the research of reconfigurable cipher processing architecture.
替代和置换部分组成了具有良好密码特性的SP网络结构。
The substitution and the permutation formed the SP network architecture with desirable cryptographic property.
它突破了传统密码由键盘、触摸屏等设备输入的局限,尤其适用于结构简单的嵌入式设备。
It breaks through the limitation of the traditional password inputting method and is especially suitable for embedded device.
本文分析了常用对称密码算法DES、3des和AES的可重构性,利用流水线、并行处理和可重构技术,提出了一种可重构体系结构。
In this paper, based on the analysis about the reconfiguration of the DES, 3des and AES, we propose a reconfigurable architecture, which combines reconfiguration technology with pipeline, par.
指出了分组密码的多次迭代使对称置换结构复杂化,可以选择对称置换作为分组密码算法的扩散部分来设计。
This paper shows that Hi-times substitute makes permutation structure more complicity, so symmetrical permutation can be chosen as the diffusion module in block cipher algorithm design.
翻译起始区(TIR)的二级结构是影响翻译效率的决定性因素,同时密码子的偏好性问题也是个至关重要的方面。
The secondary structure of the translation initiation region (TIR) is a determinant factor for translation initiation rate, meanwhile, codon preference plays an important role, too.
遗传信息的传递是从核酸序列三联密码子的转录和翻译,到合成具有完整结构的功能蛋白质的全过程。
The whole process of genetic information regulation and transduction involves three major steps: transcription and translation of the genetic code and the synthesis of the functional protein.
SAFER系列密码算法的总体结构采用SP网络,它的设计具有其独到的几个特色。
The general structure of SAFER block ciphers adopts SP network. It's design has some original features.
SAFER系列密码算法的总体结构采用SP网络,它的设计具有其独到的几个特色。
The general structure of SAFER block ciphers adopts SP network. It's design has some original features.
应用推荐