直接计算法安全、合理且简便,可代替传统试算法而应用于工程设计。
These direct calculation methods are quite different from the traditional trial and error method and more reliable and easy, which can be used in engineering design instead of trial and error method.
经分析,方案中的协议与算法安全、简洁、高效,降低了软硬件实现的系统开销,可广泛应用于计算机与无线通信等网络环境。
Further detailed analysis justifies its brevity, security, high efficiency, and thus considerable improvement on system overheads regarding software and hardware application.
使用强大的算法密钥将所有数据都进行单向加密意味着您的数据非常安全,但是使用时很不方便。
Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.
安全调查人员最近证明,利用MD5算法允许他们伪造可用的证书。
Security researchers have recently demonstrated exploits against the MD5 algorithm which allowed them to forge usable certificates.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
要数字签署大型文件,首先使用这些算法用一种安全的方式压缩(计算固定长度的哈希码)文件,然后再用私钥签署。
For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.
维护机密性和完整性的典型解决方案涉及使用现有的安全协议和加密算法。
Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
本文不打算详细介绍这些算法,仅介绍一些php安装,它包括您需要适度(或特别)保持数据安全的所有内容。
This article doesn't go into the blow-by-blow details of these algorithms, but just about any PHP installation will include all you need to keep your data moderately (or extremely) secure.
安全性组件包含各种安全性算法和机制的IBM实现。
The security components contain IBM implementations of various security algorithms and mechanisms.
对称算法的性能比非对称算法的性能快,但是在参与者之间安全地传递秘钥会引起分发问题。
Symmetric algorithms have faster performance than asymmetric algorithms, but passing the secret key securely between participants poses a distribution problem.
与MD 5算法的128位输出相比,sha算法更安全,它产生160位输出。
The SHA algorithm is more secure, producing a 160-bit output compared to the MD5 algorithm's 128-bit output.
NET开发人员通常需要花费大量的时间,在不同的binding中对安全、算法、策略等进行配置,这其中充满了不必要的挑战。
NET Developers needed to configure security Settings, algorithms, policies in various bindings elements in an often time consuming manner, resulting in a challenge larger than necessary.
可以使用ssl. KeyManagerFactory . algorithm安全性属性配置缺省算法。
The default can be configured using the ssl.KeyManagerFactory.algorithm security property.
通过适当的说服工作,增加身份验证方案的安全性可以像对当前密码输入代码应用控制算法一样简单。
With the appropriate persuasion, increasing the security of your authentication schemes can be as easy as applying these control algorithms to your current password entry code.
这三个安全性提供者可能已经实现了您需要的算法。
These three security providers may have implemented the algorithms you need.
为SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法的库。
Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.
您可以开发更安全的算法,当前这个算法只是作为一个例子。
I'll leave it to you to develop a more secure algorithm, this one's just for example's sake.
非洲商业法规一体化组织负责监督执行八部商业法规(一般商业法、安全交易法、公司法、仲裁法、债务回收法、破产法、核算法、货物公路运输法)。
OHADA oversees eight business laws (general commercial, secure transactions, company law, arbitration, debt recovery, bankruptcy, accounting and transportation of goods by road).
最后,密码分析学的进步可以使任何加密机制或算法变得不再安全,因为总是有新奇的破解方法被找出来。
Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered.
这篇教程的主旨并不是示范用户身份验证的安全性。取而代之,本文将演示如何在众所周知的登录和创建帐户的算法中使用Xforms。
This tutorial does not purport to be an example of security in user authentication; instead, it will demonstrate the usage of XForms in the well-known algorithm for logging in and account creation.
hashcash提出质询的方式是,当通过安全散列算法(SecureHash Algorithm)进行散列时,要求“minters”生成 一个字符串(戳记,stamps),在它们的散列中有很多前导零。
The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
MD 5密码加密算法支持更为可靠的密码,从而进一步提高了安全性。
The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.
研究和建立创新性安全理论和系列算法,具有重要的现实意义。
Study and set up innovative safe theory and serial algorithms, have important realistic meanings.
如果您需要,您还可以导入安全认证,并且用对于Web服务调用和消息返回的安全算法来创建SOAP安全认证。
If you need to, you can also import security certificates and create SOAP security configurations with security algorithms for the Web service calls and message returns.
在IEEE - 14测试系统的计算结果表明,算法反映了安全因素和经济因素的关系,有助于建立电力市场中合理的用户电价体系。
Numerical result from IEEE-14 test system shows that the presented algorithm reflects the relationship of security and economy and is helpful to construct reasonable pricing system in power market.
不久前,计算机科学家和密码学家专门小组发表了一篇论文,建议用于商业安全的对称算法至少要用90位的钥匙。
A while ago an AD hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least90bits for symmetric algorithms used in commercial security.
类型属性指出了hash算法,例如消息摘要算法5 (MD5)或安全哈希算法(SHA - 1)。
The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).
用于检索“安全哈希算法”修订版的掩码,该修订版更正了SHA中的一个未发布的错误。
A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA.
安全散列算法是数字签名等密码学应用中重要的工具。
Secure hash algorithms are important tools for cryptographic applications such as digital signatures.
应用推荐