欧路词典
  • 关闭
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片机,LM3S系列代码加密,介绍加密方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌系统图像加密法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司加密科面目狰狞亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

加密安全性很大程度上取决于暴力破解不可行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为加密服务集成商提供简单、易接口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传统对称性加密与公开密钥方法结合起来,兼备了优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,不要紧张。你始终可以从非加密分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

安全、加密网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

在系统网络体系结构(sna)产品中,对将要在某个网点上使作键标进行加密一种键(也称键标,也就是密钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采一定加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不可复制,多重加密,数据更加安全特点,于票据、证件、物品上,达到防伪目

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好实现多步置乱,对图像位置置乱法进行了改进,改进后法提升了混沌位置置乱加密速度,符合图像加密需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计机信息安全工作中,在大量信息共享基础上,选择特定重要信息,进行加密和解密可逆方法.举出简单加密程序和解密程序,最后探讨了加密技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES十进制加密实现过程和一种适合于不可靠信道(预付费系统与终端之间通信实现非接触无介质代码传送)加密法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池概念,将密钥预配置建立在多个密钥矩阵之上,节省了节点存储空间,增强了网络可扩展性。将加密传输机制应到密钥传输过程中,增强了密钥传输过程中安全性。

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


counterbore, counterboring, counterboy, counterbrace, counterbracing, counterbuff, counterbuffer, counter-camber, counterchange, countercharge,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片机,LM3S系列代码,介绍方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌系统的图像算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司科面目狰狞的亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

算法的安全性很大程度上取决于暴力破解的不可行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为务集成商提供的简单、易用口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传统的对称性与公开钥方法结合起来,兼备了者的优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,不要紧张。你始终可以从非的分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

它用安全、的网络具代替了 telnet、ftp、 rlogin、rsh 和 rcp 具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

在系统网络体系结构(sna)产品中,对将要在某个网点上使用的操作键标进行的一种键(也称键标,也就是钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采用一定的、正交化方法,生成了三维反向喷流流场分区对结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不可复制,多重,数据更安全的特点,用于票据、证件、物品上,达到防伪目的。

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱速度,符合图像的需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算机信息安全作中,在大量信息共享的基础上,选择特定重要的信息,进行和解的可逆方法.举出简单的程序和解程序,最后探讨了应用操作的技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES的十进制算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非触无介质代码传送)的算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池的概念,将钥的预配置建立在多个钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将传输机制应用到钥的传输过程中,增强了钥传输过程中的安全性。

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


countercoup, countercredit, countercry, counterculture, countercurrent, countercyclical, countercylinder, counterdeclaration, counterdeed, counter-deed,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片机,LM3S系列代码,介方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌系统的图像算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司科面目狰狞的亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

算法的安全性很大程度上取决于暴力破解的不可行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为服务集成商提供的简单、易用口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传统的称性与公开钥方法结合起来,兼备了者的优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,不要紧张。你始终可以从非的分启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

它用安全、的网络连工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

在系统网络体系结构(sna)产品中,将要在某个网点上使用的操作键标进行的一种键(也称键标,也就是钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采用一定的、正交化方法,生成了三维反向喷流流场分结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不可复制,多重,数据更安全的特点,用于票据、证件、物品上,达到防伪目的。

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好的实现多步置乱,图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱速度,符合图像的需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行和解的可逆方法.举出简单的程序和解程序,最后探讨了应用操作的技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES的十进制算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非触无介质代码传送)的算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池的概念,将钥的预配置建立在多个钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将传输机制应用到钥的传输过程中,增强了钥传输过程中的安全性。

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


counterdrug, counterearth, counteredge, counter-electrode, counterelectrophoresis, counterespionage, counteretch, counterevidence, counter-evolution, counterexample,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片机,LM3S列代码,介绍方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌图像算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司科面目狰狞亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

算法安全性很大程度上取决于暴力破解不可行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为服务集成商提供简单、易用接口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传对称性与公开钥方法结合起来,兼备了优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,不要紧张。你始终可以从非分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

它用安全、网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

网络体结构(sna)产品中,对将要在某个网点上使用操作键标进行一种键(也称键标,也就是钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采用一定交化方法,生成了三维反向喷流流场分区对接结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不可复制,多重,数据更安全特点,用于票据、证件、物品上,达到防伪目

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好实现多步置乱,对图像位置置乱算法进行了改进,改进后算法提升了混沌位置置乱速度,符合图像需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算机信息安全工作中,在大量信息共享基础上,选择特定重要信息,进行和解可逆方法.举出简单程序和解程序,最后探讨了应用操作技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES十进制算法实现过程和一种适合于不可靠信道(预付费与终端之间通信实现非接触无介质代码传送)算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池概念,将预配置建立在多个钥矩阵之上,节省了节点存储空间,增强了网络可扩展性。将传输机制应用到传输过程中,增强了钥传输过程中安全性。

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件观点;若发现问题,欢迎向我们指

显示所有包含 加密 的英语例句

用户正在搜索


counterfoil, counterforce, counterfort, countergirl, counterglow, counterguard, counter-indemnity, counter-induction, counter-inflationary, counterinsurgency,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片机,LM3S系列代码加密,介绍加密方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

提出了一个基于双一维混沌系统的图像加密算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司加密科面目狰狞的亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

加密算法的安全性很大程度上取决于暴力破解的可行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传统的对称性加密密钥方法结合起来,兼备了者的优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错紧张。你始终可以从非加密的分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

在系统网络体系结构(sna)产品中,对将在某个网点上使用的操作键标进行加密的一种键(也称键标,也就是密钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采用一定的加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有可复制,多重加密,数据更加安全的特点,用于票据、证件、物品上,达到防伪目的。

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重的信息,进行加密和解密的可逆方法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES的十进制加密算法的实现过程和一种适合于可靠信道(预付费系统终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦代表本软件的观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


counter-jerk, counterjumper, counterlath, counterlathing, counterlight, counterlode, counterman, countermand, countermarch, countermark,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,

用户正在搜索


countermove, countermovement, countermure, counteroffensive, counteroffer, counteropening, counterorder, counterpane, counterpart, counterphobic,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,

用户正在搜索


counter-potential, counterpressure, counterproductive, counterprofile, counterprogram, counterprogramming, counterproof, counterpropaganda, counterpropagation, counterpropeller,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片,LM3S代码加密,介绍加密方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌统的图像加密算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司加密科面目狰狞的亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

加密算法的安全性很大程度上取决于暴力破解的行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传统的对称性加密与公开密钥方法结合起来,兼备了者的优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,要紧张。你始终以从非加密的分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

统网络体结构(sna)产品中,对将要在某个网点上使用的操作键标进行加密的一种键(也称键标,也就是密钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采用一定的加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有复制,多重加密,数据更加安全的特点,用于票据、证件、物品上,达到防伪目的。

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行加密和解密的逆方法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES的十进制加密算法的实现过程和一种适合于靠信道(预付费统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节点的存储空间,增强了网络的扩展性。将加密传输制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦代表本软件的观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


counterreformation, counterreply, counterrevolution, counterrevolutionary, counter-revolutionary, counterrevolutionist, counterrotating, counterrotation, counterscarp, countersea,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片机,LM3S系列代码加密,介绍加密方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌系统图像加密算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司加密科面目狰狞亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

加密算法全性很大程度上取决于暴力破解不可行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为加密服务集成商提供简单、易接口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传统对称性加密与公开密钥方法结合起来,兼备了优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,不要紧张。你始终可以从非加密分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

全、加密网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

在系统网络体系结构(sna)产品中,对将要在某个网点上操作键标进行加密一种键(也称键标,也就是密钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采一定加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不可复制,多重加密,数据更加特点,于票据、证件、物品上,达到防伪目

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好实现多步置乱,对图像位置置乱算法进行了改进,改进后算法提升了混沌位置置乱加密速度,符合图像加密需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算机信息全工作中,在大量信息共享基础上,选择特定重要信息,进行加密和解密可逆方法.举出简单加密程序和解密程序,最后探讨了加密操作技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES十进制加密算法实现过程和一种适合于不可靠信道(预付费系统与终端之间通信实现非接触无介质代码传送)加密算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池概念,将密钥预配置建立在多个密钥矩阵之上,节省了节点存储空间,增强了网络可扩展性。将加密传输机制应到密钥传输过程中,增强了密钥传输过程中全性。

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


counterspy, counterstain, counterstaining, counterstatement, Counter-Strike, counterstroke, countersubject, countersuggestion, countersun, countersunk,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary片机,LM3S系列代码加密,介绍加密方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌系统的图像加密算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司加密科面目狰狞的亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

加密算法的安全性很大程度上取决于暴力破解的不可行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为加密服务集成商提供的简、易用接口函数

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传统的对称性加密与公开密钥方法结合起来,兼备了者的优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,不要紧张。你始终可以从非加密的分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

在系统网络体系结构(sna)产品中,对将要在某个网点上使用的操作键标进行加密的一种键(也称键标,也就是密钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采用一定的加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不可复加密,数据更加安全的特点,用于票据、证件、物品上,达到防伪目的。

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好的实现步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定要的信息,进行加密和解密的可逆方法.举出简加密程序和解密程序,最后探讨了加密应用操作的技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES的十进加密算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池的概念,将密钥的预配置建立在个密钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将加密传输机应用到密钥的传输过程中,增强了密钥传输过程中的安全性。

声明:以上例、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


countertorque, countertrade, countertrades, countertransference, countertrend, countertube, counterturn, counter-twilight, countertwist, countertype,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片机,LM3S系列代码加密,介绍加密方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌系图像加密算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司加密科面目狰狞亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

加密算法安全性很大程度上取决于暴力破解行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为加密服务集成商提供简单、易用接口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传称性加密与公开密钥方法结合起来,兼备了优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,不要紧张。你始从非加密分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

它用安全、加密网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

在系网络体系结构(sna)产品中,将要在某个网点上使用操作键标进行加密一种键(也称键标,也就是密钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采用一定加密、正交化方法,生成了三维反向喷流流场分区接结构网格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不复制,多重加密,数据更加安全特点,用于票据、证件、物品上,达到防伪目

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好实现多步置乱,图像位置置乱算法进行了改进,改进后算法提升了混沌位置置乱加密速度,符合图像加密需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算机信息安全工作中,在大量信息共享基础上,选择特定重要信息,进行加密和解密逆方法.举出简单加密程序和解密程序,最后探讨了加密应用操作技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES十进制加密算法实现过程和一种适合于不靠信道(预付费系端之间通信实现非接触无介质代码传送)加密算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池概念,将密钥预配置建立在多个密钥矩阵之上,节省了节点存储空间,增强了网络扩展性。将加密传输机制应用到密钥传输过程中,增强了密钥传输过程中安全性。

声明:上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


counterweigh, counterweight, counterword, counterwork, counterworker, countess, countian, counting, counting house, countingcup,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,
jiā mì
encrypt

Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.

Luminary单片机,LM3S系列代码方案。

Proposes pictureencryption algorithm based on the double unidimensional chaos system.

摘要 提出了一个基于双一维混沌系统的图像算法。

Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.

祭司科面目狰狞的亲卫队抬着他来主持更生仪式。

The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.

算法的安全性很大程度上取决于暴力破解的不可行性。

CSP layer provides briefness and wieldy function library for trader doing encrypt integration.

CSP层,即抽象设备层,其为服务集成商提供的简单、易用接口函数库。

Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.

将传统的对称性与公开钥方法合起来,兼备了者的优点。

If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.

如果出了什麽错误,不要紧张。你始终可以从非的分区启动。

That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.

它用安全、络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。

In SNA products, a key used to encipher operational keys that are to is used at a node.

在系统络体系(sna)产品中,对将要在某个点上使用的操作键标进行的一种键(也称键标,也就是钥)。

Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.

并在此基础上采用一定的、正交化方法,生成了三维反向喷流流场分区对接格。

RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.

RFID具有不可复制,多重,数据更安全的特点,用于票据、证件、物品上,达到防伪目的。

Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.

为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱速度,符合图像的需要。

The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.

分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行和解的可逆方法.举出简单的程序和解程序,最后探讨了应用操作的技巧.

In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.

详细描述了基于AES的十进制算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无质代码传送)的算法实现原理。

In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.

该方案提出了矩阵池的概念,将钥的预配置建立在多个钥矩阵之上,节省了节点的存储空间,增强了络的可扩展性。将传输机制应用到钥的传输过程中,增强了钥传输过程中的安全性。

声明:以上例句、词性分类均由互联资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。

显示所有包含 加密 的英语例句

用户正在搜索


country, country club, country house, country music, country of origin, country-and-western, country-born, country-bred, country-cut, country-dance,

相似单词


加罗韦人, 加洛林王朝的, 加麦兰, 加满, 加盟, 加密, 加密狗, 加密技术, 加密软件, 加密术,