• 最后分析抽样哈希技术长处不足提出多种技术相结合研究方向

    Finally, we analyze the advantages and disadvantages of sampling and hash techniques and present the future research trend of various techniques combined.

    youdao

  • 通过几何希技术加强兴趣几何约束,增加正确匹配兴趣点对数量。

    The geometry hashing technic is used to enhance the geometry constraint of interest points in order to improve the matching result.

    youdao

  • 通过提取文字特征结合用户密钥技术方案文本信息和用户信息嵌入到待传输文本中。

    By extracting the features of the characters together with the user secret keys and the hash technology, the scheme embeds the information of the text and the user into the transforming text.

    youdao

  • Salting这种技术可以用于生成随机数将该随机数用于计算密码哈希

    Salting is a technique in which a random number is generated in order to compute the hash for the password.

    youdao

  • 对于使用NTLMv 2创建哈希可能最大的不足在于Windows无法使用一种名为Salting技术

    Perhaps the biggest complaint with NTLMv2 created hashes is that Windows does not utilize a technique called salting.

    youdao

  • 之前的文章中我们讨论了ReplCache使用基于哈希一致性分布式技术实现一个网格数据容器

    In a previous article, we discussed ReplCache, which is an implementation of a grid data container using consistent hash based distribution.

    youdao

  • 我们用来产生记号技术基于页面内容计算MD 5哈希

    The technique we use to generate the token is based on computing an MD5 hash from the content of the page.

    youdao

  • 模式增加了分布式”特性,这是一基于哈希一致性的技术

    This mode addsdistributionbased on consistent hashing.

    youdao

  • 分析了当前比较典型P 2 P搜索技术指出这些搜索方法都是三种基本方法洪泛索引,结合一定的网络拓扑组合成的。

    Analyzed some typical P2P based search method and found they were composed by specific architecture and three basic methods: flooding, indexing and hashing.

    youdao

  • 介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全性没有损失,但是速度得到了提高。

    In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.

    youdao

  • 文章阐述数字签名技术原理并介绍了数字签名中的关键技术公钥加密体制哈希算法

    In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.

    youdao

  • 协议采用技术包括,对称密钥加密公共密钥加密、算法数字签名技术以及公共密钥授权机制

    The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.

    youdao

  • 协议采用技术包括,对称密钥加密公共密钥加密、算法数字签名技术以及公共密钥授权机制

    The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定