您要查找的是不是:
- A secret key algorithm that processes a stream of bits one bit at a time. 一次处理位流中一位的秘钥算法。
- Symmetric Key algorithm uses the same key to encrypt and decrypt the data. 对称密钥是加密和解密都使用的一个密钥.
- The nonsecret half of a cryptographic key pair that is used with a public key algorithm. 与公钥算法一起使用的加密密钥对的非保密部分。
- An unsupported or unknown key algorithm was encountered; the current operation cannot be completed. 遇到了不支持的或未知的密钥算法;当前操作无法完成。
- Furthermore, paper modifies some key algorithm according the digital TV program personalization service character. 本文重点结合传统个性化信息服务系统的关键技术,将这些技术运用到数字电视节目个性化信息服务系统中,并且对一些关键技术结合数字电视节目个性化服务的特点,进行修正。
- In CDMA networks, CAVE algorithm is the key algorithm of authentication, but CAVE is not clear to us because of the protection by ITAR. 摘要由于我国并未掌握蜂窝鉴权与话音加密算法(CAVE)的实现,使得CDMA网络并未实现真正的安全。
- In CDMA networks,CAVE algorithm is the key algorithm of authentication,but CAVE is not clear to us because of the protection by ITAR. 由于我国并未掌握蜂窝鉴权与话音加密算法(CAVE)的实现,使得CDMA网络并未实现真正的安全。
- Though the public key algorithm has great advance, its running speed can not compare with the private key system for it is based on a complicated trapped function. 公钥算法虽然具有很多优点,但由于其是建立在某个复杂的单向函数的基础上,这就必然导致其加、解密速度远不能与私钥算法相提并论。
- The security of public key algorithm is based on mathematic problems, anal the security of symmetric cryptographic algorithm is based on the key length. 公钥密码算法的安全性基于数学上的难题,而设计良好的分组密码算法的安全性依赖于密钥长度。
- In addition, the key algorithm of the classic periodogram spectrum estimation has been improved with split-radix algorithm that can shorten the time of program executing. 另外,采用分裂基算法对经典的周期图谱估计的关键算法进行了改进,可缩短程序运行时间。
- RSA public key algorithm with Java and network transmission of encipherad data are implemented,and on basis of this,an improved solution for electronic wallet in electronic business is also obtained. 用 Java实现了 RSA公开密钥算法及加密数据在网上的传输 ,在此基础上提出了在电子商务中用 Ja-va实现电子钱包的改进方案
- RSA is a symmetric cipher system and a public key encryption algorithm system. Both RSA and DSA use public key algorithms for data encryption. 问题是藏十先东暖命席业,义尔此寇RSA使用的难道不是非对称算法吗?为什么说RSA是对称加密系统?是我理解错了还是书印错了?
- Consequently, symmetric key algorithms are normally used for securing data at rest. 因此,一般采用对称密钥算法来保证静态数据的安全。
- The main performance bottleneck, as expected, is the slow public key algorithms. 正如预料的那样,主要的性能瓶颈是公钥算法的速度很慢。
- The key management schemes for public key algorithms and symmetric algorithms are introduced respectively. 本文分别介绍了用户公开密钥算法与对称密钥算法的密钥管理方案,针对密钥监管的需要,本文介绍了密钥托管技术。
- Three key algorithmic components are presented in more detail: curvature calculation, feature extraction, and mesh skeletonizing. 关于程序中所用的演算法包括三个部分:曲率计算、特徵萃取以及网格细线化。
- The paper analyses difficulties of developing MIB browser,and gives the key algorithms of realizing MIB browser based on SNMP++. 分析了开发MIB浏览器的难点,给出了实现一个基于SNMP++的MIB浏览器的关键算法。
- This paper focuses on three key algorithms: skin color correction, contrast enhancement and chrominance transient improvement. 本文详细讨论了肤色矫正、对比度扩展和色度瞬态特性改善三种关键的视频画质改善方法。
- The paper analyses difficulties of developing MIB browser,and gives the key algorithms of realizing MIB browser based on SNMP++. 分析了开发MIB浏览器的难点,给出了实现一个基于SNMP++的MIB浏览器的关键算法。
- You may leave your key at the reception desk. 你可以把钥匙留在服务台。