• The security components contain IBM implementations of various security algorithms and mechanisms.

    安全性组件包含各种安全性算法机制IBM实现

    youdao

  • Configure the environment for SOAP security: SOAP security protocols require access to the libraries that implement SOAP security algorithms.

    SOAP安全配置环境:SOAP安全协议需要访问实现SOAP安全算法

    youdao

  • This class is used by derived classes to instantiate security algorithm suites, and contains properties that describe the security algorithms.

    派生使用此类实例安全算法并且此类还包含描述安全算法属性

    youdao

  • If you need to, you can also import security certificates and create SOAP security configurations with security algorithms for the Web service calls and message returns.

    如果需要,您可以导入安全认证并且对于Web服务调用消息返回的安全算法创建SOAP安全认证。

    youdao

  • With the appropriate persuasion, increasing the security of your authentication schemes can be as easy as applying these control algorithms to your current password entry code.

    通过适当说服工作增加身份验证方案安全性可以当前密码输入代码应用控制算法一样简单

    youdao

  • These three security providers may have implemented the algorithms you need.

    三个安全性提供者可能已经实现需要的算法

    youdao

  • NET Developers needed to configure security Settings, algorithms, policies in various bindings elements in an often time consuming manner, resulting in a challenge larger than necessary.

    NET开发人员通常需要花费大量时间不同binding安全算法策略等进行配置,这其中充满了不必要的挑战

    youdao

  • Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.

    RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可数据加密规则,支持改善的安全性能。

    youdao

  • A while ago an AD hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least90bits for symmetric algorithms used in commercial security.

    不久前计算机科学家密码学家专门小组发表了论文建议用于商业安全对称算法至少要用90位的钥匙

    youdao

  • The existing algorithms of network security situation prediction depended on the initial training data, and the objectivity of predicting results was insufficient.

    现有网络安全态势预测算法初始训练数据依赖性强,预测结果客观性

    youdao

  • Using the symmetric algorithms and the asymmetric algorithms together security performance of the application system is improved.

    对称密码算法对称密码算法共同使用,增强了应用系统安全性

    youdao

  • We presented several new algorithms of model checking epistemic logics, and explore their applications in verifications of security protocols.

    我们给出了一些新的模型检测算法探讨它们安全协议验证中的应用

    youdao

  • The frangibility, security and location ability of the two algorithms are all validated by computer simulations.

    两种算法懦弱性、安全性定位才能通过了盘算机试验给与验证

    youdao

  • Speed, precision and security of the related algorithms altogether determine the efficiency and safety of the information system.

    密码算法安全准确快速的实现决定信息安全体系安全性和实用性。

    youdao

  • The core problem of information security is encryption algorithms.

    本文讨论有关信息安全核心问题加密算法。

    youdao

  • RSA security is based on complex problem of large number factoring, and factorization algorithms that attack RSA system in use are introduced simply.

    RS A密码系统安全性基于大数分解困难问题。文中简要地介绍了目前攻击RSA密码系统的常用大数分解算法

    youdao

  • The algorithms and protocols are the base of modern information security technology.

    这些算法协议构成了现代信息安全技术基础

    youdao

  • In addition, the scheme also builds conditions for a more sophisticated load-balancing algorithms and security policy.

    方案构建更加精细的负载均衡算法安全策略创造了条件

    youdao

  • Block cipher is one of the most important encryption and decryption algorithms in information security.

    分组密码算法是信息安全领域最为重要解密技术之一

    youdao

  • As the basis and core of information security, cryptography also attracts more and more attention. Brute force attack on symmetric cipher algorithms is an important direction of cryptography.

    密码学作为信息安全基础核心越来越受到人们关注,而暴力破解对称密码算法密码学研究一个重要方向

    youdao

  • In these two algorithms, chaotic sequences control some parameters of wavelet transform or decide the hiding location to improve the algorithm itself security.

    两种算法中,混沌序列控制小波变换某些参数决定数据的隐藏位置提高算法本身安全性

    youdao

  • The algorithms have good security and the mean of watermark sequences is close to zero, preparing for following two algorithms.

    算法安全性,且生成水印序列均值近似零,后面两种水印技术做准备

    youdao

  • The paper also tentatively discusses several related encryption algorithms to improve the security and analyzes the plaintext key space, ciphertext key space and encryption strength.

    同时对这种加密算法明文密码空间密文密码空间加密强度等作了初步的分析

    youdao

  • It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.

    研究功耗分析如何破解密码算法中的密钥的关键技术以此为基础提出防御功耗分析的安全密码算法非常必要的。

    youdao

  • Kinds of typical algorithms widely used are listed, such as DES, RSA and MD5, and we also discuss the security of them.

    本章中列举了DESRSAMD 5,目前已经得到广泛使用几种成熟算法讨论这些典型算法安全性

    youdao

  • Related conception is introduced at first, then the principle and security of conventional cryptology, modern symmetrical encryption algorithms and asymmetrical encryption algorithms are analysed;

    首先阐述密码学相关概念然后传统密码技术现代对称密码算法对称密码算法及其安全性进行分析;

    youdao

  • Finally, basing on the core idea of improved association rule learning algorithms, this thesis designs and achieves simple models of network security audit.

    最后根据改进关联规则学习算法核心思想,对网络安全审计模型进行了设计给予实现

    youdao

  • The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

    加密算法安全性很大程度上取决于暴力破解的不可行性

    youdao

  • The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

    加密算法安全性很大程度上取决于暴力破解的不可行性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定