• When you store a value, the client determines the hash value from the key and the server used to store it.

    存储一个时,客户机会这个确定散列以及原来存储哪个服务器上

    youdao

  • The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.

    使用加密算法的保密性这样一个事实保证,生成哈希匹配明文在计算上不可行的

    youdao

  • For such a trusted entity, the hash value and signature are calculated and shipped as part of the their AIX installables and stored in TSD on the destination system.

    对于这样可信实体,对应的签名作为AIX安装文件的一部分进行计算和分发的,存储目标系统TSD中

    youdao

  • When you get a value, the client determines the same hash value from the key and chooses the same server to get the information.

    获取一个时,客户机会这个确定相同散列会选择相同的服务器获取信息。

    youdao

  • The algorithms are designed so that the probability of two different sets of data computing the same hash value — a collisionis extremely small.

    而所用密码算法设计上使不同数据得到同一个散列——即“碰撞”——概率极其小。

    youdao

  • If an object's hash value can change when its state changes, be sure you don't allow its state to change while it is being used as a hash key.

    对象状态更改如果对象发生变化确信当状态作为散列关键字使用允许更更改状态。

    youdao

  • A hash is very much like a fingerprint and the hash algorithm is constructed so that the smallest change in the source produces a completely different and unpredictable hash value.

    非常类似于指纹通过构建哈希算法,即使中的最小更改也会产生完全不同不可预知的哈希

    youdao

  • Append the value to the hash value keyed on the field name if it already exists, as this will enable the simple print out of every combination of the field no matter which of the fields matched.

    如果存在,则追加字段关联散列值后,因为这样做将启用每个字段组合简单输出,而不管哪些字段匹配。

    youdao

  • When the directories are distributed, this hash value maps to a specific entry in a specific directory server in the back end.

    分布目录这个散列映射特定目录服务器中的特定条目

    youdao

  • Hash value is calculated on the basis of the RDN of the entry.

    散列根据条目RDN计算出来的。

    youdao

  • When asked to validate a password, the Membership service hashes the presented password, then compares the hash value with its copy.

    验证密码时,会员服务将当前密码列,拷贝进行比较

    youdao

  • The sender creates a message digest (also called hash value, fingerprint/thumbprint, or watermark) based on the contents of the message.

    发送根据消息内容创建消息摘要称为哈希码、指纹或者水印)。

    youdao

  • Next, it computes hash value for the interface uuid and checks if uuid has a valid format.

    接下来计算接口uuid散列检查 uuid 的格式是否有效

    youdao

  • A keyword's hash value is typically computed by combining the associated values of its keysig with its length.

    关键散列通常这样计算:将关键字keysig关联和关键字长度结合

    youdao

  • Using the hash function, each row is put in a bucket with other rows that have the same hash value.

    通过函数具有相同哈希放在一个bucket中。

    youdao

  • Not only is the hash value dependent on the contents of the list, but the specific algorithm for combining the hash values of the individual elements is specified as well.

    不仅仅取决于list内容而且规定结合各个Element散列特殊算法

    youdao

  • The String class specifies a similar algorithm to be used for computing the hash value of a String.

    String规定类似算法用于计算 String 的散列

    youdao

  • To retrieve an item from a subtree, you compute a hash value from the column you chose when creating the index.

    中检索项目创建索引时,可以从列中计算出一个hash

    youdao

  • The generated hash value is numeric, and I use this value as single index key for the string being indexed.

    生成hash数值型使用这个作为被索引的字符串索引

    youdao

  • This hash value is then mapped to a bucket for storage or for getting a value of the row.

    然后这个hash被映射存储或者获得一个值。

    youdao

  • In one example, the search for exact strings can be implemented by generating a hash value for the string, and then indexing this hash value.

    示例中,精确字符串搜索可以通过字符串生成hash然后这个hash值创建索引实现

    youdao

  • You can explicitly search for a known hash value with point ranges, in other words ranges with identical start and stop keys.

    可以使用范围(即开始终止相同)式地搜索一个已知hash

    youdao

  • Even if an attacker gained access to the hashed version of your password, it's not possible to reconstitute the password from the hash value alone.

    即使一个攻击者获得权限看到经过hash密码可能hash重建密码。

    youdao

  • This hash value is what's finally included in the actual signature, and generating the signature is the only step for which symmetric vs. asymmetric encryption is any different.

    hash最终包含实际签名中,生成签名是非对称与对称仅有的不同之处。

    youdao

  • The Rainbow tables technique pre-computes the hash value, saving time at the expense of creating very large tables.

    Rainbow方法是预先算出hash,通过创建很大表格节省时间

    youdao

  • The session id is a 32 byte long MD5 hash value.

    sessionid就是个一32的md5hash

    youdao

  • This is required, because the hash value is the address of the object and you need to maintain this if you move the object.

    必需因为对象地址并且如果移动对象,需要维护

    youdao

  • Now for this same binary, the hash value stored in TSD is extracted and matched with the run-time calculated hash value.

    现在对于同一个二进制,将提取TSD存储运行时计算的散列值进行匹配

    youdao

  • In hindsight, I realize that the best way to obfuscate this link would be to use an MD5-generated hash value, effectively hiding all voter information.

    然后,意识到使这个链接更具迷惑性的方法使用一个MD 5生成哈希从而有效地隐藏所有投票者的信息。

    youdao

  • In hindsight, I realize that the best way to obfuscate this link would be to use an MD5-generated hash value, effectively hiding all voter information.

    然后,意识到使这个链接更具迷惑性的方法使用一个MD 5生成哈希从而有效地隐藏所有投票者的信息。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定