• Run an md5 algorithm against the binary class files.

    二进制文件运行md5算法

    youdao

  • The MD5 algorithm is the DE facto hashing standard for digests.

    MD 5算法事实上标准摘要哈希算法

    youdao

  • Use this algorithm for improved security over the MD5 algorithm.

    使用这个算法可以改善MD 5演算法安全性

    youdao

  • A web site update auto-checking system is designed by the MD5 algorithm.

    通过MD 5算法设计了一个网站更新自动检测软件。

    youdao

  • Attack technology of MD5 algorithm is analyzed and researched deeply in this paper.

    论文MD5算法攻击技术进行深入分析研究。

    youdao

  • Now the MD5 algorithm will falsely verify that the signature matches the new contents.

    因此MD 5算法错误地认为签名内容是匹配的。

    youdao

  • This text has described the analysis, design and its realization course on MD5 algorithm.

    本文论述MD 5校验算法分析设计及其实现过程

    youdao

  • The SHA algorithm is more secure, producing a 160-bit output compared to the MD5 algorithm's 128-bit output.

    与MD 5算法128输出相比sha算法安全,它产生160位输出。

    youdao

  • It can also use a password encrypted with the MD5 algorithm as opposed to the plain text password of LILO.

    使用一个通过MD 5算法加密密码不是LILO文本密码。

    youdao

  • To validate credentials, the user password is hashed using the MD5 algorithm and compared to the stored value.

    为了验证认证,会使用MD 5演算法杂凑使用者密码储存做比较。

    youdao

  • This paper introduces the MD5 algorithm and security analysis. A new keyed hash algorithm based on MD5 is proposed.

    介绍MD 5算法对它的安全性能分析,提出了基于MD5键控散列算法。

    youdao

  • To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm.

    实现攻击攻击需要使用MD 5算法签署证书CA购买若干ssl证书。

    youdao

  • The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication.

    设计一个模拟系统用户安全登录界面采用MD5算法实现用户登录口令的安全认证

    youdao

  • Security researchers have recently demonstrated exploits against the MD5 algorithm which allowed them to forge usable certificates.

    安全调查人员最近证明利用MD5算法允许他们伪造可用证书

    youdao

  • MD5 algorithm is an authentication method used in a broad research field. The data encryption techniques are summarized in this paper.

    MD 5报文摘要算法一种应用广泛身份认证算法,该文首先对数据加密技术进行了简要的概述。

    youdao

  • This paper introduces MD5 algorithm, then gives the whole framework and schemes of design and implementation of important modules in IP-CORE.

    文章介绍了MD5算法给出了IP核整体架构及其重要模块设计实现方案

    youdao

  • The authors analyzed the principle of the MD5 algorithm in details, and discussed a improved method that the application of MD5 algorithm in distanced-identity authentication.

    作者详细分析了MD5算法实现原理,然后提出MD 5算法远程身份认证的实际应用实现。

    youdao

  • A large number of security questions appear while storing data, the data that usually store needing at present are encrypted then stored, it is a good choice to use MD5 algorithm.

    针对数据存储时候存在大量安全问题,目前通常需要存储数据进行加密然后再存储应用MD 5算法一个不错选择

    youdao

  • MD5 algorithm is used to implement the authentication process. DES algorithm combined with asymmetric encryption and digital signature to ensure the safety of information transmission.

    MD 5算法用来实现身份认证过程DES算法结合非对称加密数字签名技术保证信息安全传输。

    youdao

  • This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.

    这种攻击并不意味着整个互联网或者SSL安全已经突破的确意味着厂商应该不再用MD 5作为签名算法

    youdao

  • The GUI tools do not expose controls that enable selection of the certificate signing algorithm, and they default to MD5 signatures.

    GUI工具不能公开那些支持选择证书签名算法控件因此默认支持MD 5签名。

    youdao

  • Instead, the clear-text passwords are hashed using an MD5 hash algorithm by the plug-in applications and are stored in this hashed form in the database.

    插件应用程序使用MD 5算法明文密码进行列计算,数据库中存储散列形式的密码。

    youdao

  • Changing to a more complex algorithm, say from MD5 to SHA-2, 16 does little to restore password integrity.

    变更复杂算法,比方MD 5变更SHA - 2,16恢复秘密的完整性没什么作用。

    youdao

  • For added benefit, using a one-way encryption algorithm or hash, like MD5 14 or Blowfish, 15 will make decrypting the password impossible.

    为了更多利益利用单向加密算法散列MD 514Blowfish,15使密码解密成为不可能

    youdao

  • I'll explain the use of message digest algorithms in the next article of this series, but for now just note that I'm going to use the MD5 message digest algorithm in the Kerberos client.

    系列篇文章解释消息摘要算法使用但是现在只要知道Kerberos客户机使用MD 5消息摘要算法

    youdao

  • The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).

    类型属性指出hash算法例如消息摘要算法5 (MD5)安全哈希算法(SHA - 1)。

    youdao

  • The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.

    MD 5密码加密算法支持更为可靠密码从而进一步提高了安全性

    youdao

  • Each check attribute constitutes an MD5 hash (a message digest algorithm commonly used in generating cryptographic hashes) of the following concatenated string.

    每个check属性组成以下连接字符串MD 5列(一种通常用于生成加密列的消息摘要算法)。

    youdao

  • Based on RSA algorithm of unsymmetrical cryptographic system and MD5 message-digest algorithm, the paper presents a digital signature scheme based on IC card.

    基于非对称加密系统中的RSA算法MD 5报文摘要算法上,提出一种基于IC卡的数字签名方案

    youdao

  • Based on RSA algorithm of unsymmetrical cryptographic system and MD5 message-digest algorithm, the paper presents a digital signature scheme based on IC card.

    基于非对称加密系统中的RSA算法MD 5报文摘要算法上,提出一种基于IC卡的数字签名方案

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定