• This paper discusses the principle and method of encryption using pseudo random sequence, and gives its implement on PLD.

    本文讨论随机序列实现加密保护原理方法可编程逻辑器件(PLD)实现的具体方法。

    youdao

  • Easy: use the identical method of encryption on any incoming user-supplied password and compare the result to your stored password.

    一个比较容易方法是:对用户提供的任何传入密码使用相同加密方法,结果存储密码比较

    youdao

  • This paper provides the method of encryption and name-change of DOS subdirectory, obtained by way of changing the subdirectory attribute without any software of tool.

    本文提供一种在没有任何工具软件情况下,通过改变目录属性

    youdao

  • It seems that every month, some hacker kid and his friends tie together 1,000 machines and crack the newest encryption method in a few days of raw, brute-force computational battering.

    大概每隔一个一些黑客及其朋友就会集合1,000台计算机最初几天强力进行计算破坏,从而使最新加密方法崩溃。

    youdao

  • An example of this would be a service provider that asks for a particular type of encryption method, for which the service requester doesn't have the security infrastructure to support.

    例如服务提供方要求采用一种特殊加密方法服务请求方没有支持这种加密方法安全基础架构

    youdao

  • Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.

    XML加密关于加密解密结构化信息,而规定密钥交换任何特定方法

    youdao

  • In addition to the encryptCompleteXmlFile method, I have now added the following two methods to service the encryption requirements of different types of data (encryption granularity)

    除了encryptCompleteXmlFile方法现在添加以下两个方法来为不同数据类型加密要求(加密颗粒度)提供服务

    youdao

  • The term WS-Policy refers to a framework that defines governance, such as the method of transport, and security, such as the level of encryption.

    术语WS-Policy定义治理例如传输方法安全性加密级别框架

    youdao

  • Both the Edge and the Guardian use a different encryption method to send E-mail and other forms of data.

    EdgeGuardian使用一种不同加密方式发送电子邮件其他形式数据

    youdao

  • This implementation only supports encryption of complete files, as illustrated in Listing 2. The EncryptCompleteXmlFile () method will do this job by calling the following methods in a sequence

    如 清单2 中所示,这个实现支持整个文件加密

    youdao

  • Is there a way to determine which encryption method (WEP, WAP, WAP2,...) is used just by analyze the traffic data of WiFi?

    有没有一种方法确定哪些加密方法(wep,wap,WAP2。)通过分析无线网络流量数据使用吗?

    youdao

  • The element content encryption method is invoked, which encrypts only the textual content of the CardNo element.

    调用元素内容加密方法它只对 CardNo 元素文本内容加密。

    youdao

  • Moreover, the encryption method is based on the extended index mechanism of database system, and can not be implemented on all databases.

    而且这种加密方式依赖数据库系统扩展索引机制不能所有数据库实现

    youdao

  • This encryption method can prevent the loss of disk and file replication caused by sensitive data leakage.

    这种加密方式防止磁盘丢失文件复制导致敏感数据泄漏

    youdao

  • This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.

    这种加密方式可以控制应用系统用户数据访问权限并且真实数据所有数据库用户可见的,安全的一加密方式。

    youdao

  • LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.

    LMHash容易此类攻击攻破,是因为没有使用现今常用加密过程引入salt”的方式。

    youdao

  • The encryption method has been used in a number of sensitive sectors in the country to achieve a certain effect.

    加密手段国内某些敏感部门曾进行了小范围应用达到一定效果

    youdao

  • This paper discusses the method of design and realization of digital chaos encryption system based on DSP.

    本文论述基于DSP数字混沌加密系统设计实现方法

    youdao

  • This encryption method uses quantum state as the key used for the encryption and decryption of information.

    这种加密方法是用量子状态来作为信息加密解密密钥

    youdao

  • This paper presents an image encryption method that combines disturbances of pixel addresses with the encryption technology of RSA systems.

    本文提出图象加密一种方法扰乱象素地址RSA体制加密技术相结合的方法。

    youdao

  • Based on the encryption method, a pirate tracing scheme is proposed for the copyright protection of digital data.

    根据所提的加密算法给出一种适用于数字数据版权盗版跟踪方案

    youdao

  • Based on the feasibility study and the analysis to the encryption algorithm, the paper presents a method of the real-time multi-point voice communication in network, which USES ADPCM and UDP.

    加密算法实现过程进行可行性研究分析基础上,阐述应用adpcm编码调制技术和UDP协议进行网络环境下实时多点语音通信方法

    youdao

  • The method will make up for the defects of SSL/TLS, which can't do the implementation of multiparty and multilevel encryption.

    这种方式可以弥补现在通行SSL/TLS加密协议不能实现多方多级重复加密的不足。

    youdao

  • Hardware encryption has high security because this method can relieve burden of MPU and has physical protection layer.

    硬件加密减轻微处理器负担,且具有物理保护,安全性较高

    youdao

  • This paper describes a new method in which a non-linear successive-displacement can be produced, and provides an algorithm of information bit-moving encryption.

    本文研究提出一种统计规律不明显的非线性随机序列的发生方法及其信息作非线性移位加密算法可以有效地提高密文的安全性。

    youdao

  • As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.

    混沌密码算法一种快速加密算法,安全性要求较高领域有着非常广阔应用前景

    youdao

  • Another feature provides an efficient encryption method that safeguards the security of encrypted symbols.

    特征提供了一种保护加密符号安全有效加密方法

    youdao

  • In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.

    针对信息网络安全重要性及严峻性,提出了汉字信息加密、在BMP图像文件中隐藏恢复及解密的方法。

    youdao

  • In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.

    针对信息网络安全重要性及严峻性,提出了汉字信息加密、在BMP图像文件中隐藏恢复及解密的方法。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定