• DRBD使用Linux加密应用程序编程接口因此完整性算法使用方面比较灵活的。

    DRBD USES the Linux crypto application programming interface and is therefore flexible on the integrity algorithm used.

    youdao

  • 通过提供强大的基于标准加密完整性算法ssl系统开发人员用户保证数据Internet不会受到危害。

    By providing strong, standards-based encryption and integrity algorithms, SSL provides system developers and users with confidence that data will not be compromised in the Internet.

    youdao

  • 系统入侵检测系统主机系统等多数据源主动收集数字证据通过完整性算法保证数字证据传输和存贮过程中的完整性

    The integrity of digital evidences was protected by integrity algorithm, which was collected and stored from intrusion detection systems and host systems.

    youdao

  • 数据签名哈希算法用于提供数据完整性机制

    Digital signatures and hash algorithms are mechanisms used to provide data integrity.

    youdao

  • 证书完整性使用算法校验的。

    The integrity of the certificate is checked using the hash algorithm.

    youdao

  • 维护机密性完整性典型解决方案涉及使用现有安全协议和加密算法

    Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.

    youdao

  • 变更复杂算法,比方MD 5变更SHA - 2,16恢复秘密的完整性没什么作用。

    Changing to a more complex algorithm, say from MD5 to SHA-2, 16 does little to restore password integrity.

    youdao

  • 完整性目的我们开发完整分代算法

    For the purpose of completeness we will develop the complete generational algorithm.

    youdao

  • 日益复杂网络环境下多种拓扑算法结合使用才能保证拓扑的完整性正确性

    In more and more complex network environment only combining multiple topology discovery algorithms guarantees the accuracy and completeness of the topology.

    youdao

  • 算法信息安全领域主要应用验证数据完整性签名认证

    In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.

    youdao

  • 基于此,研究了如何维持策略空间穿越中的安全信息完整性有效性,提出了基于安全信息的动态访问控制算法

    How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.

    youdao

  • 告警发生时间特性进行了分析,给出了一种自动伸缩关联窗口选择算法保证告警集合完整性

    After analyzing the temporal character of alarm, an auto-flexible correlation window selection algorithm is given to assure the integrity of alarm set.

    youdao

  • 结果表明算法能够满足保护需求,初步解决通信数据完整性一致性问题

    Analysis results show that this algorithm satisfied the requirement of protection and solve the consistency and integrity problem of communication data.

    youdao

  • 伪距最小二乘接收机自主完整性监测RAIM算法进行了分析。

    The characters of least squares residuals method belonging to receiver autonomous integrity monitoring(RAIM) were analyzed.

    youdao

  • 设计并实现一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证篡改定位恢复

    A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication, tamper localization and recovery.

    youdao

  • 分割结果对比分析表明改进后算法分割的完整性一致性上具有更好的效果。

    The result shows that the improved arithmetic works is better in integrality and consistency of image.

    youdao

  • 介绍内存数据库组织形式之后,本文重点分析了索引HASH算法以及数据完整性一致性保护

    After introducing the organization form of the memory database, it focuses on the HASH arithmetic of index and protection of integrity and consistence of the data.

    youdao

  • 仿真试验结果表明算法提高组合导航系统定位精度可靠性完整性方面有效的。

    The experimental results show that this algorithm is effective for the improvement of the locating accuracy, reliability and integrity of automatic vehicle integrated navigation system.

    youdao

  • 本文提出一种用于视频产品完整性认证实时视频水印的算法

    This paper proposes a real time watermarking algorithm in the bit domain for complete authentication.

    youdao

  • 认证阶段运用相同技术处理待检测图像,生成影子,认证算法实现图像完整性认证。

    In the authentication phase, the same technology is used to the suspect images, then using the image authentication algorithm to achieve integrity certification.

    youdao

  • 算法具有完整性保护能力

    The algorithm can provide the pseudo integrity protection ability.

    youdao

  • 众所周知加密算法认证完整性控制基础,因此我们还介绍选用加密算法原则

    As we know, the encryption is the footstone of authentication and integrity control, so we introduce the principle of choosing encryption algorithms.

    youdao

  • 针对压缩视频流完整性认证问题提出一种基于压缩传感(CS)的视频水印算法

    For the problem of integrity authentication about compressed video streams, this paper proposed a video watermarking algorithm based on Compressive Sensing (CS).

    youdao

  • 实验表明算法较高视觉质量同时修改进行准确定位,满足完整性认证水印要求

    Experimental results show that this algorithm has high visual quality, at the same time, can exactly localize the alteration, and really satisfies the requirement of complete authentication.

    youdao

  • 因此本文算法首先利用累积弥补帧帧差所得边界完整性得到准确运动对象定位

    So in this method, Firstly, using accumulating frame difference, we obtain the exact moving object localization which makes up the incompletely of the edge gotten by the frame difference.

    youdao

  • 通过网络教学平台中应用H -ECDSA混合型数字签名算法,达到了快速安全传输数据的目标,并保证了数据真实性完整性

    In E-teaching platform, H-ECDSA is applied. The hybrid digital signature algorithm can transmit data quickly and safely, guarantee the authenticity and security of data transmitted.

    youdao

  • 实验分析IC故障类型、一般故障诊断流程和进行扫描链本身完整性测试方案提出了种外加测试码向量生成算法

    In the experiments, the fault type of IC test bus, the fault diagnosis flow and the test principles were analyzed, and a fault diagnosis strategy of test bus was proposed.

    youdao

  • 实验结果表明,在保证流完整性前提算法召回准确率达到80%以上。

    Experimental results show that the proposed algorithm has recall and accuracy both over 80% under the requirement of complete flows.

    youdao

  • 实验结果表明算法分割效率高分割运动对象完整性精度较高

    Experimental results show that the segmentation algorithm is efficient and segmented moving object is complete and accurate.

    youdao

  • 实验结果表明算法分割效率高分割运动对象完整性精度较高

    Experimental results show that the segmentation algorithm is efficient and segmented moving object is complete and accurate.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定