• PPT from the linguistic point of view that this is meme and gene analysis of language differences, by reading this article can help readers master secret algorithm has a deeper understanding.

    本篇ppt语言学角度分析基因语言区别通过阅读本篇文章可以帮助读者对算法一个更深理解

    youdao

  • An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.

    对称密钥(公钥)算法用于交换对称算法中使用加密密钥以及用于数字签名

    youdao

  • Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).

    另一个流行秘密密钥加密系统国际数据加密算法(IDEA)。

    youdao

  • A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.

    对称算法要求消息发送方接收方使用同一个通常被称作秘钥密码术

    youdao

  • Many experts know the basic "PageRank" algorithm, but no one know its detail, which is top commercial secret.

    许多专家都认识PageRank算法但是没有知道的更多,因为这最高商业机密

    youdao

  • Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.

    Kerberos定义了用户密码进行处理生成一个密钥算法

    youdao

  • An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.

    对称算法使用不同密钥消息进行加密解密;其中个秘必须秘密的,一个密钥通常是公开的。

    youdao

  • I will now use the temporary secret key to encrypt the original padded byte array from Step 3 using the DES-CBC algorithm.

    现在使用这个临时密钥des -cbc算法加密第3中得到附加后的字节数组

    youdao

  • Kerberos defines an algorithm to generate a secret key from the user's password.

    Kerberos定义一种利用用户密码生成密钥算法

    youdao

  • So far, I have discussed the low-level methods of the ASN1DataTypes class and implemented the algorithm for generating a secret key from the user's password.

    到目前为止讨论了ASN1DataTypes底层方法实现了利用用户密码生成密钥算法

    youdao

  • SECRET is a new algorithm for scalable linear regression trees.

    SECRET一个关于可伸缩线形回归树的算法

    youdao

  • By using SP algorithm and error correction code technology, a combating burst error and large capacity data hiding method for secret transmission was proposed based on images.

    采用SP交织算法纠错编码,给出一种基于图像的抗突发误码容量数据嵌入隐秘传输方法

    youdao

  • This is one of the secrets of meteorites algorithm, named for the meteorite secret.

    一个关于陨石秘密算法名字陨石秘密

    youdao

  • An ideal threshold scheme is constructed from Maximum Distance Separable (MDS) codes, the recovery algorithm in this scheme can detect cheating, recover the correct secret and identify cheaters.

    最大距离可分构造了一个理想门限体制体制中的秘密恢复算法可以正确恢复秘密,并可检测出伪造的秘密份额,确定伪造者的身份。

    youdao

  • The multiple iterative digital image hiding algorithm based on chaos sequences is introduced, with which a secret image can be hidden in one carrier image through many images.

    提出基于混沌序列数字图像迭代混合算法利用图像的迭代混合可以幅图像通过一组图像隐藏起来。

    youdao

  • Steganalysis is a kind of attacking behavior against steganography algorithm, with the purpose to reveal the existence of secret message in the digital media.

    写分析针对算法揭示数字媒体秘密信息存在性目的攻击行为

    youdao

  • An algorithm based on singular value decomposition (SVD) is proposed, which hides secret information in singular value vector.

    给出一种基于矩阵奇异分解(SVD)和奇异值量化信息隐藏算法

    youdao

  • To make hiding information have better sheltered performance, research has been done in embedded algorithm and treat secret information.

    为了使隐藏信息具有良好隐蔽性能,通常嵌入算法秘密信息的处理两个方面展开研究

    youdao

  • The experimental results show that the index partition algorithm improved the robustness of the secret information during the transmission.

    实验表明索引划分算法提高了秘密信息在传输过程中的鲁棒性

    youdao

  • To improve the encoding efficiency of the current visual secret sharing schemes, a novel encoding algorithm, self-adaptive multi-pixel encoding (SME), was proposed.

    提高可视图分存方案编码效率,提出基于自适应像素编码的可视密图分存算法

    youdao

  • In our paper, we propose a novel frequency domain embedding algorithm based on the correlation analysis, which can solve effectively to hide the secret information of large capacity.

    本文以内容相关性为基础提出一种新的基于相关性分析频率嵌入算法解决信息隐藏中由于秘密信息容量大无法有效操作的问题。

    youdao

  • Time-based cache attacks analyzes the time difference in the execution of algorithm over a processor, and recovers the secret key.

    基于时间缓存攻击是指通过分析处理器算法不同执行时间恢复密钥攻击。

    youdao

  • On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.

    研究基于RS A密钥算法智能卡认证技术基础上提出了基于散列函数的智能卡访问认证方法

    youdao

  • By using this algorithm, a secret text can be replaced by a pubilic text. The algorithm can survive from communication noise.

    其效果算法可以实现段普通文本掩饰机密文本的传输,并且算法具有一定的抵抗干扰的能力。

    youdao

  • Large scale integrated circuit ASIC and processors can realize the implementation of customized user algorithm, pretreatment and function of secret protection.

    大规模集成电路asic处理器实现用户算法定制预处理以及保密功能

    youdao

  • The authors designed the communication system of the teaching platform and the pseudo random number generator to generate secret keys of the algorithm.

    设计了实验平台通信系统算法过程中产生密钥随机序列发生器

    youdao

  • The secret key of next period is derived from the current secret key via key-update algorithm which is arranged in system after a period end.

    每个周期结束时,利用周期,由系统设置好的更新算法产生一个周期

    youdao

  • The proposed method made use of the LSB matching method based on particle swarm optimization algorithm to embed the secret data and maintain image quality.

    同时采用基于粒子优化LSB替换算法嵌入隐秘信息,取得了很好的图像质量嵌入效果。

    youdao

  • The advantages of this algorithm were, rapidity of encryption, carried out easily by computer, ampliative secret key space and so on.

    算法加密速度快易于计算机实现密钥空间优点

    youdao

  • In chapter 7, it produces researches of encryption algorithm, secret-key's produce, and its use, management security.

    第七加密算法密钥,以及在一卡通系统产生使用管理提出了安全性研究

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定