• 直接安全、合理简便代替传统算法应用工程设计

    These direct calculation methods are quite different from the traditional trial and error method and more reliable and easy, which can be used in engineering design instead of trial and error method.

    youdao

  • 分析,方案中的协议算法安全简洁高效,降低了软硬件实现的系统开销,可广泛应用于计算机与无线通信等网络环境。

    Further detailed analysis justifies its brevity, security, high efficiency, and thus considerable improvement on system overheads regarding software and hardware application.

    youdao

  • 使用强大的算法密钥所有数据都进行单向加密意味着的数据非常安全但是使用时很方便

    Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.

    youdao

  • 安全调查人员最近证明利用MD5算法允许他们伪造可用证书

    Security researchers have recently demonstrated exploits against the MD5 algorithm which allowed them to forge usable certificates.

    youdao

  • 这种攻击并不意味着整个互联网或者SSL安全已经突破的确意味着厂商应该不再用MD 5作为签名算法

    This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.

    youdao

  • 数字签署大型文件首先使用这些算法一种安全的方式压缩(计算固定长度的哈希码)文件,然后签署

    For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.

    youdao

  • 维护机密性完整性典型解决方案涉及使用现有安全协议和加密算法

    Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.

    youdao

  • 本文打算详细介绍这些算法介绍一些php安装包括需要适度(特别)保持数据安全所有内容。

    This article doesn't go into the blow-by-blow details of these algorithms, but just about any PHP installation will include all you need to keep your data moderately (or extremely) secure.

    youdao

  • 安全组件包含各种安全算法机制IBM实现

    The security components contain IBM implementations of various security algorithms and mechanisms.

    youdao

  • 对称算法性能对称算法的性能但是参与者之间安全传递引起分发问题

    Symmetric algorithms have faster performance than asymmetric algorithms, but passing the secret key securely between participants poses a distribution problem.

    youdao

  • 与MD 5算法128输出相比sha算法安全,它产生160位输出。

    The SHA algorithm is more secure, producing a 160-bit output compared to the MD5 algorithm's 128-bit output.

    youdao

  • NET开发人员通常需要花费大量时间不同binding安全算法策略等进行配置,这其中充满了不必要的挑战

    NET Developers needed to configure security Settings, algorithms, policies in various bindings elements in an often time consuming manner, resulting in a challenge larger than necessary.

    youdao

  • 可以使用ssl. KeyManagerFactory . algorithm安全属性配置缺省算法

    The default can be configured using the ssl.KeyManagerFactory.algorithm security property.

    youdao

  • 通过适当说服工作增加身份验证方案安全可以当前密码输入代码应用控制算法一样简单

    With the appropriate persuasion, increasing the security of your authentication schemes can be as easy as applying these control algorithms to your current password entry code.

    youdao

  • 三个安全提供者可能已经实现需要算法

    These three security providers may have implemented the algorithms you need.

    youdao

  • SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法

    Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.

    youdao

  • 可以开发安全算法当前这个算法只是作为一个例子

    I'll leave it to you to develop a more secure algorithm, this one's just for example's sake.

    youdao

  • 非洲商业法规一体化组织负责监督执行商业法规(一般商业法、安全交易法、公司法仲裁法债务回收法、破产法货物公路运输法)。

    OHADA oversees eight business laws (general commercial, secure transactions, company law, arbitration, debt recovery, bankruptcy, accounting and transportation of goods by road).

    youdao

  • 最后密码分析学进步可以使任何加密机制算法变得不再安全因为总是有新奇的破解方法找出来。

    Finally, cryptanalysis advances can render any cryptographic mechanism or algorithm insecure as novel methods of breaking them are discovered.

    youdao

  • 篇教程主旨不是示范用户身份验证安全取而代之,本文演示如何众所周知登录创建帐户算法使用Xforms

    This tutorial does not purport to be an example of security in user authentication; instead, it will demonstrate the usage of XForms in the well-known algorithm for logging in and account creation.

    youdao

  • hashcash提出质询的方式通过安全算法(SecureHash Algorithm)进行列时,要求minters生成 一个字符串戳记,stamps),它们的散列中很多前导零。

    The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.

    youdao

  • 网络系统主要安全技术数据加密RSA算法密钥系统安全的一种体制

    The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.

    youdao

  • MD 5密码加密算法支持更为可靠密码从而进一步提高了安全

    The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.

    youdao

  • 研究建立创新性安全理论系列算法具有重要现实意义

    Study and set up innovative safe theory and serial algorithms, have important realistic meanings.

    youdao

  • 如果需要,您可以导入安全认证并且对于Web服务调用消息返回安全算法创建SOAP安全认证。

    If you need to, you can also import security certificates and create SOAP security configurations with security algorithms for the Web service calls and message returns.

    youdao

  • IEEE - 14测试系统计算结果表明算法反映安全因素经济因素的关系有助于建立电力市场合理用户电价体系

    Numerical result from IEEE-14 test system shows that the presented algorithm reflects the relationship of security and economy and is helpful to construct reasonable pricing system in power market.

    youdao

  • 不久前计算机科学家密码学家专门小组发表了论文建议用于商业安全对称算法至少要用90位的钥匙

    A while ago an AD hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least90bits for symmetric algorithms used in commercial security.

    youdao

  • 类型属性指出hash算法例如消息摘要算法5 (MD5)安全哈希算法(SHA - 1)。

    The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).

    youdao

  • 用于检索安全哈希算法修订版掩码修订版更正了SHA中的一个发布的错误

    A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA.

    youdao

  • 安全散列算法数字签名密码学应用中重要工具

    Secure hash algorithms are important tools for cryptographic applications such as digital signatures.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定