最后分析了抽样与哈希技术的长处与不足,提出了多种技术相结合的研究方向。
Finally, we analyze the advantages and disadvantages of sampling and hash techniques and present the future research trend of various techniques combined.
通过几何哈希技术加强兴趣点间的几何约束,以增加正确匹配的兴趣点对数量。
The geometry hashing technic is used to enhance the geometry constraint of interest points in order to improve the matching result.
通过提取文字的特征,结合用户密钥和哈希技术,该方案将文本信息和用户信息嵌入到待传输文本中。
By extracting the features of the characters together with the user secret keys and the hash technology, the scheme embeds the information of the text and the user into the transforming text.
Salting这种技术可以用于生成随机数,并将该随机数用于计算密码的哈希。
Salting is a technique in which a random number is generated in order to compute the hash for the password.
对于使用NTLMv 2创建的哈希,可能最大的不足在于Windows无法使用一种名为Salting的技术。
Perhaps the biggest complaint with NTLMv2 created hashes is that Windows does not utilize a technique called salting.
在之前的文章中,我们讨论了ReplCache,它使用了基于哈希一致性的分布式技术实现了一个网格数据容器。
In a previous article, we discussed ReplCache, which is an implementation of a grid data container using consistent hash based distribution.
我们用来产生记号的技术是基于从页面内容计算MD 5哈希值。
The technique we use to generate the token is based on computing an MD5 hash from the content of the page.
该模式增加了“分布式”特性,这是一种基于哈希一致性的技术。
分析了当前比较典型的P 2 P搜索技术,指出这些搜索方法都是由三种基本方法:洪泛、哈希和索引,结合一定的网络拓扑组合而成的。
Analyzed some typical P2P based search method and found they were composed by specific architecture and three basic methods: flooding, indexing and hashing.
介绍基于对称密码系统的可证明安全理论,利用平方哈希函数实现技术,对一种可证明安全算法DFC实施改进后,安全性没有损失,但是速度得到了提高。
In this paper, based on provable security theory, a provable security cipher DFC is improved on speed without lost of security by means of fast implementation of square hash function.
文章阐述了数字签名技术原理,并介绍了数字签名中的关键技术:公钥加密体制和哈希算法。
In this paper, the principles of digital signature is given, Meanwhile the key technology of digital signature: public key cryptography and Hash algorithms is introduced.
该协议采用的技术包括,对称密钥加密、公共密钥加密、哈希算法、数字签名技术以及公共密钥授权机制等。
The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.
该协议采用的技术包括,对称密钥加密、公共密钥加密、哈希算法、数字签名技术以及公共密钥授权机制等。
The protocol USES such technologies as symmetrical key encryption, public key encryption, Hasche algorithm, digital signature as well as public key authorization mechanism and so on.
应用推荐