Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码密,介绍
密方案。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码密,介绍
密方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维混沌系统的图像密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司密科面目狰狞的亲卫队抬着他来主持
生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
密算法的安全性很大程度上取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为密服务集成商提供的简单、易用接口函数库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性密与公开密钥方法结合起来,兼备了
者的优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非密的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网点上使用的操作键标进行密的一种键(也称键标,也就是密钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础上采用一定的密、正交化方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重密,数
安全的特点,用于票
、证件、物品上,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱
密速度,符合图像
密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行密和解密的可逆方法.举出简单的
密程序和解密程序,最后探讨了
密应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES的十进制密算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的
密算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码加密,介绍加密方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出一个基于双一维混沌系统的图像加密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司加密科面目狰狞的亲卫队抬着他来主持更生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度上取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽层,其为加密服务集成商提供的简单、易用接口函数库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性加密与公开密钥方法结合起来,兼者的优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出什麽错误,不要紧张。你始终可以从非加密的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加密的网络连接具代替
telnet、ftp、 rlogin、rsh
rcp
具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网点上使用的操作键标进行加密的一种键(也称键标,也就是密钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础上采用一定的加密、正交化方法,生成三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加密,数据更加安全的特点,用于票据、证件、物品上,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为更好的实现多步置乱,对图像位置置乱算法进行
改进,改进后的算法提升
混沌位置置乱加密速度,符合图像加密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全作中,在大量信息共享的基础上,选择特定重要的信息,进行加密
解密的可逆方法.举出简单的加密程序
解密程序,最后探讨
加密应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述基于AES的十进制加密算法的实现过程
一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省
节点的存储空间,增强
网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强
密钥传输过程中的安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码加密,介绍加密方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维混沌系统的图像加密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司加密科面目狰狞的亲卫队抬着他来主持生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度上取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性加密与公开密钥方法结合起来,兼备了者的优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非加密的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网点上使用的操作键标进行加密的一种键(也称键标,也就是密钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础上采用一定的加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加密,加安全的特点,用于票
、证件、物品上,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行加密和解密的可逆方法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES的十进制加密算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码加密,介绍加密方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个于双一维混沌系统的图像加密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
加密科面目狰狞的亲卫队抬着他来主持更生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函数库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性加密与公开密钥方法结合起来,兼备了者的优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非加密的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网点使用的操作键标进行加密的一种键(也称键标,也就是密钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此采用一定的加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加密,数据更加安全的特点,用于票据、证件、物品,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的,选择特定重要的信息,进行加密和解密的可逆方法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了于AES的十进制加密算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之,节省了节点的存储空间,增强了网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
声明:以例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S列代码加密,介绍加密方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维统的图像加密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司加密科面目狰狞的亲卫队抬着他来主持更生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度上取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函数库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性加密与公开密钥方法结合起来,兼备了者的优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非加密的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在统网络体
结构(sna)产品中,对将要在某个网点上使用的操作键标进行加密的一种键(也称键标,也就是密钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础上采用一定的加密、方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加密,数据更加安全的特点,用于票据、证件、物品上,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了位置置乱加密速度,符合图像加密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行加密和解密的可逆方法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES的十进制加密算法的实现过程和一种适合于不可靠信道(预付费统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码加密,介绍加密方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维混沌系统的图像加密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司加密科面目狰狞的亲卫队抬着他主持更生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度上取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函数库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性加密与公开密钥方法结合,
备了
者的
。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
果出了什麽错误,不要紧张。你始终可以从非加密的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网上使用的操作键标进行加密的一种键(也称键标,也就是密钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础上采用一定的加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加密,数据更加安全的特,用于票据、证件、物品上,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行加密和解密的可逆方法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES的十进制加密算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节的存储空间,增强了网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观;若发现问题,欢迎向我们指正。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码加密,介绍加密方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维混沌系统的图像加密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司加密科面目狰狞的亲卫他来主持更生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度上取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函数库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对性加密与公开密钥方法结合起来,兼备了
者的优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非加密的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网点上使用的操作标进行加密的一种
(
标,
就是密钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础上采用一定的加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加密,数据更加安全的特点,用于票据、证件、物品上,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行加密和解密的可逆方法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES的十进制加密算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码加密,介绍加密方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维混沌系统的图像加密算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司加密科面目狰狞的亲卫队来主持更生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性很大程度上取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为加密服务集成商提供的简单、易用接口函数库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性加密与公开密钥方法结合起来,兼备了者的优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非加密的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网点上使用的操作标进行加密的一
(
称
标,
就是密钥)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
并在此基础上采用一定的加密、正交化方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加密,数据更加安全的特点,用于票据、证件、物品上,达到防伪目的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加密速度,符合图像加密的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行加密和解密的可逆方法.举出简单的加密程序和解密程序,最后探讨了加密应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES的十进制加密算法的实现过程和一适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加密算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池的概念,将密钥的预配置建立在多个密钥矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将加密传输机制应用到密钥的传输过程中,增强了密钥传输过程中的安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。
Luminary monolithic integrated circuit, LM3S series code encryption, introduction encipherment scheme.
Luminary单片机,LM3S系列代码加,介绍加
方案。
Proposes pictureencryption algorithm based on the double unidimensional chaos system.
摘要 提出了一个基于双一维混沌系统的图像加算法。
Gamic's fierce Indri guards carry Gamic, their High Priest, to the offering ceremony.
祭司加狰狞的亲卫队抬着他来主持更生仪式。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加算法的安全性很大程度上取决于暴力破解的不可行性。
CSP layer provides briefness and wieldy function library for trader doing encrypt integration.
CSP层,即抽象设备层,其为加服务集成商提供的简单、易用接口函数库。
Hadorwould traditionary symmetry encryption and publicity secret key mode band together, have two both the virtue.
将传统的对称性加与公开
方法结合起来,兼备了
者的优点。
If something geos Very Wrong Way (tm), don't panic. Any way you still have unencrypted partition to boot from.
如果出了什麽错误,不要紧张。你始终可以从非加的分区启动。
That it is using secure, encrypted network connectivity tools instead of telnet, ftp, rlogin, rsh and rcp tools.
它用安全、加的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。
In SNA products, a key used to encipher operational keys that are to is used at a node.
在系统网络体系结构(sna)产品中,对将要在某个网点上使用的操作键标进行加的一种键(也称键标,也就是
)。
Using the program to generate 3-D multi-block abutting structured grid of reverse jet flow field with the controlling of concentration and orthogonalization.
在此基础上采用一定的加
、正交化方法,生成了三维反向喷流流场分区对接结构网格。
RFID has the feature against reproduction, combined encryption, and securer data on ticket, document, certificate, and items, for the purpose of anti-counterfeiting.
RFID具有不可复制,多重加,数据更加安全的特点,用于票据、证件、物品上,达到防伪
的。
Image array disturbed algorithm has been improved to implement multiple permute better.The algorithm shortens its encryption time, so it fits image encryption well.
为了更好的实现多步置乱,对图像位置置乱算法进行了改进,改进后的算法提升了混沌位置置乱加速度,符合图像加
的需要。
The text discusses computer's principle and method of special information encipher and decipher. The text indicates program example of encipher and decipher and its actual application.
分析在计算机信息安全工作中,在大量信息共享的基础上,选择特定重要的信息,进行加和解
的可逆方法.举出简单的加
程序和解
程序,最后探讨了加
应用操作的技巧.
In this paper, the authors described the decimal system encryption based on AES and its implementation in detail, and discussed a kind of encryption principle suitable for trustless channel.
详细描述了基于AES的十进制加算法的实现过程和一种适合于不可靠信道(预付费系统与终端之间的通信实现非接触无介质代码传送)的加
算法实现原理。
In this scheme we put forward the concept of matrix pool on which our key predistribution scheme is upbuilt,and encrpytion scheme is introduced into the process of key transfer.
该方案提出了矩阵池的概念,将的预配置建立在多个
矩阵之上,节省了节点的存储空间,增强了网络的可扩展性。将加
传输机制应用到
的传输过程中,增强了
传输过程中的安全性。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。