• In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.

    算法信息安全领域主要应用验证数据完整性签名认证。

    youdao

  • When discussing the cloud, there are many characteristics that should be discussed, including: multi-tenancy, security, data integrity verification, retrieval expectations, and exit strategies.

    讨论时,许多特性应该加以讨论,其中包括多租户安全性数据完整性验证恢复期望值以及退出策略。

    youdao

  • Verification reads the backed-up data to verify its integrity. This step takes extra time, but verification helps ensure that your backup is successful.

    验证读取备份数据证实完整性步骤需要额外的时间验证有助于确保备份成功的。

    youdao

  • Verification reads the backed-up data to verify its integrity.

    验证读取备份数据证实完整性

    youdao

  • Verification reads the backed-up data to verify its integrity.

    验证读取备份数据证实完整性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定