When you store a value, the client determines the hash value from the key and the server used to store it.
当存储一个值时,客户机会从这个键确定出散列值以及它原来存储在哪个服务器上。
The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.
使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。
For such a trusted entity, the hash value and signature are calculated and shipped as part of the their AIX installables and stored in TSD on the destination system.
对于这样的可信实体,对应的散列值和签名是作为其AIX可安装文件的一部分进行计算和分发的,并存储在目标系统上的TSD中。
When you get a value, the client determines the same hash value from the key and chooses the same server to get the information.
当获取一个值时,客户机会从这个键确定出相同的散列值并会选择相同的服务器来获取信息。
The algorithms are designed so that the probability of two different sets of data computing the same hash value — a collision — is extremely small.
而所用密码算法在设计上要使从两组不同数据得到同一个散列值——即“碰撞”——的概率极其小。
If an object's hash value can change when its state changes, be sure you don't allow its state to change while it is being used as a hash key.
当对象的状态更改时如果对象的散列值发生变化,确信当状态作为散列关键字使用时您不允许更更改其状态。
A hash is very much like a fingerprint and the hash algorithm is constructed so that the smallest change in the source produces a completely different and unpredictable hash value.
哈希非常类似于指纹,通过构建哈希算法,即使是源中的最小更改也会产生完全不同和不可预知的哈希值。
Append the value to the hash value keyed on the field name if it already exists, as this will enable the simple print out of every combination of the field no matter which of the fields matched.
如果值存在,则将其追加到与字段名关联的散列值后,因为这样做将启用每个字段组合的简单输出,而不管哪些字段匹配。
When the directories are distributed, this hash value maps to a specific entry in a specific directory server in the back end.
在分布目录时,这个散列值映射到特定后端目录服务器中的特定条目。
Hash value is calculated on the basis of the RDN of the entry.
散列值是根据条目的RDN计算出来的。
When asked to validate a password, the Membership service hashes the presented password, then compares the hash value with its copy.
当验证密码时,会员服务将当前密码散列,并与它的拷贝值进行比较。
The sender creates a message digest (also called hash value, fingerprint/thumbprint, or watermark) based on the contents of the message.
发送方根据消息的内容创建消息摘要(也称为哈希码、指纹或者水印)。
Next, it computes hash value for the interface uuid and checks if uuid has a valid format.
接下来,它计算接口uuid 的散列值,检查 uuid 的格式是否有效。
A keyword's hash value is typically computed by combining the associated values of its keysig with its length.
关键字散列值通常这样计算:将关键字的keysig关联值和关键字长度结合。
Using the hash function, each row is put in a bucket with other rows that have the same hash value.
通过哈希函数,将具有相同哈希值的行放在一个bucket中。
Not only is the hash value dependent on the contents of the list, but the specific algorithm for combining the hash values of the individual elements is specified as well.
不仅仅散列值取决于list的内容,而且还规定了结合各个Element的散列值的特殊算法。
The String class specifies a similar algorithm to be used for computing the hash value of a String.
String类规定类似的算法用于计算 String 的散列值。
To retrieve an item from a subtree, you compute a hash value from the column you chose when creating the index.
从子树中检索一个项目,当您创建索引时,可以从所选的列中计算出一个hash值。
The generated hash value is numeric, and I use this value as single index key for the string being indexed.
生成的hash值是数值型的,我使用这个值作为被索引的字符串的索引键。
This hash value is then mapped to a bucket for storage or for getting a value of the row.
然后这个hash值被映射到一个桶中存储,或者获得一个行值。
In one example, the search for exact strings can be implemented by generating a hash value for the string, and then indexing this hash value.
在一个示例中,对精确字符串的搜索可以通过为字符串生成一个hash值,然后为这个hash值创建索引来实现。
You can explicitly search for a known hash value with point ranges, in other words ranges with identical start and stop keys.
可以使用点范围(即开始键和终止键相同)显式地搜索一个已知的hash值。
Even if an attacker gained access to the hashed version of your password, it's not possible to reconstitute the password from the hash value alone.
即使一个攻击者获得权限看到你经过hash的密码,也不可能只从hash值重建密码。
This hash value is what's finally included in the actual signature, and generating the signature is the only step for which symmetric vs. asymmetric encryption is any different.
hash值最终包含在实际签名中,生成的签名是非对称与对称仅有的不同之处。
The Rainbow tables technique pre-computes the hash value, saving time at the expense of creating very large tables.
Rainbow表方法是预先算出hash值,通过创建很大的表格而节省时间。
The session id is a 32 byte long MD5 hash value.
sessionid就是个一32位的md5hash值。
This is required, because the hash value is the address of the object and you need to maintain this if you move the object.
这是必需的,因为散列值是对象的地址,并且如果您移动该对象,则需要维护它。
Now for this same binary, the hash value stored in TSD is extracted and matched with the run-time calculated hash value.
现在对于这同一个二进制,将提取TSD中存储的散列值并与运行时计算的散列值进行匹配。
In hindsight, I realize that the best way to obfuscate this link would be to use an MD5-generated hash value, effectively hiding all voter information.
然后,我又意识到能使这个链接更具迷惑性的方法是使用一个MD 5生成的哈希值,从而有效地隐藏所有投票者的信息。
In hindsight, I realize that the best way to obfuscate this link would be to use an MD5-generated hash value, effectively hiding all voter information.
然后,我又意识到能使这个链接更具迷惑性的方法是使用一个MD 5生成的哈希值,从而有效地隐藏所有投票者的信息。
应用推荐