文件加密器 的英文怎麼說

中文拼音 [wénjiànjiā]
文件加密器 英文
abellock
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  1. The paper discussed the following four points : the security of java, the implemention of mvc pattern and the principle and implemention of the send and incept of e - mail based on java ; the principles and implemention of smtp, pop3 and imap, and the characteristic of the e - mail server sendmail, qmail and postfix ; the principles and implemention of symmetrical encryption and unsymmetrical encryption technology, and the advantages and disadvantages of them ; the characteristic of rubbish e - mail, and the principles and implemention of anti - rubbish e - mail technology

    研究的主要內容包括: java技術安全性, java對mvc模式的實現,以及java技術解決電子郵發送和接收問題的原理和實現方法;電子郵相關協議smtp , pop3和imap的原理和實現方法,以及電子郵服務sendmail 、 qmail和postfix的特點;對稱與非對稱技術的原理和實現方法,以及兩者的優點和缺點;典型垃圾郵的特徵,以及反垃圾郵技術的原理和實現方法。
  2. At this time, the approximate mechanical model of devices has been put forward, which frequency is 70 mhz, then we analyzed the euler ? bernoulli equation, find that the frequency is determined by the resonator ’ s density thickness and length ; the free - free - beam 、 coupled beam 、 support beam 、 transducer have been designed ; the model was simulated and modal analyzed on the coventorware and were consistent with the designed parameter. the silicon surface microfabrication process was developed and emphatically introduced several key surface microfabrication technologies, and was simulated by coventorware

    通過分析歐拉-貝努立方程,得出濾波的共振頻率主要由諧振梁的度、厚度和長度決定,考慮切變形和轉動慣量的情況下,完成微機械諧振梁、支撐梁、驅動電容的設計;在coventorware軟體上進行模擬,分析結果與理論設計比較好地吻合;對微機械濾波工工藝進行設計,給出的完整的工藝流程,重點介紹微機械表面工工藝,並在coventorware上進行模擬。
  3. Sql server mobile also provides multiple - connection access to a database, multiple - column indexes and matching index limits, transaction support, referential integrity, 128 - bit file - level encryption and password protection, and a query optimizer

    Sql server mobile還提供對數據庫的多連接訪問、多列索引和匹配的索引限制、事務支持、引用完整性、 128位以及碼保護和查詢優化
  4. In this paper, difficulties such as the design of hts microwave passive component, the lithography technology, encapsulation and testing at low temperature etc. are solved. a hts delayline with center frequency at 4ghz, bandwidth of 4ghz is manufactured and tested. it ’ s group delay is larger than 10 ns

    在解決高溫超導微波無源的設計、光刻工藝、封封裝和低溫測量等難點的同時,對一個f _ 0 (中心頻率)為4ghz ,帶寬4ghz的高溫超導延遲線進行工、封裝、測量,群時延大於10ns 。
  5. A pki and smart cards - based security scheme is presental for documents transmission, in this scheme, the client - and server do the authentication each other firstly, encrypte data transmission channel and then transfer secure documents, which significantly improved the ftp security

    該方案在傳輸時先進行客戶端和服務雙向身份認證,然後建立數據傳輸通道,在通道上安全地傳輸,這樣很大程度上提高了ftp的安全性。
  6. The bidders doubly encrypt the bidding files with the project certificate and the server certificate so that both tenderee and server ca n ' t open the bidding files before the unsealing moment. this step assures the bidding files safe so as to enable the tendering work to go on wheels. liu weiwei ( computer science and application ) directed by prof. cheng jingyun

    投標人利用項目證書和站點服務證書對投標進行雙重,以避免招標人和站點服務任何一方在開標之前打開投標,從而確保了投標的安全,防止有人從中牟利,泄漏信息,破壞招投標工作的順利展開。
  7. In this paper, a creative precise and carry - home stiffness testing system is designed for measuring stiffness of large sheet metal. this system overcomes difficulties such as instability, being hard to test displacement. except for the mechanism, this system uses a torsion sensor with high accuracy, a suit of step motor s and a pc with the given software to get an ideal effect in practical test

    針對大型薄板類零部剛度測量中的難點,比如力的載不穩定、變形量測量困難等,設計出了一套精的便攜式剛度測量系統,系統在機械裝置基礎上利用了高精度傳感、步進電機和計算機,並結合自主開發的測控軟體,在實際測試中,達到了較高的測量精度。
  8. Under finite precision, ways we always seek is easy to implement. and we encrypt the fh system with chaotic stream cipher. simulation results show that the security properties of fh sequence have been improved and the security of information is guaranteed even the fh patterns are broken

    大量的對比分析試驗表明,該鑰生成生成的混沌序列碼的碼學特性良好。同時,本還努力的尋求一種在有限精度條下混沌的可實現方案,並利用混沌序列碼對跳頻系統進行
  9. Hong - jie tools to encrypt a folder permanent free, very good, professional documents and folders encryption device

    宏傑工具之一款永久免費、非常優秀的、專業的
  10. You can export an rsa key container to an xml file as a backup copy of the key values or copy the key container to additional web servers that will host a copy of the application that includes the encrypted web. config file

    可以將rsa鑰容導出到一個xml作為鑰值的備份副本,或者將鑰容復制到其他web服務,這些服務將承載包括已的web . config的應用程序的副本。
  11. Spark pc lock is special designed to protect your individual information security of your pc. it offers encrypted disk protection, log on function and files folders encryption etc. it is cost - low and very ease of use for everybody

    Spark pc lock是一種基於硬體身份認證方式的桌面數據安全保護系統,它提供鎖機,保險箱,網路屏蔽,網站過濾,等功能。
  12. One possible solution would be to employ a file trigger to encrypt data imposing encryption automatically, regardless of how the data were written to disk and using a user exit to decrypt data

    一個可行的辦法是使用一個觸發數據(不管數據如何被寫到磁盤,都自動施) ,並使用一個用戶出口來解數據。
  13. Before you delete an rsa key container, ensure that you have either exported the key to an xml file so that it can be imported later, or that there is no information encrypted with the rsa key container that will ever need to be decrypted

    在刪除rsa鑰容之前,請確保已經將鑰導出到xml中以便能夠在以後導入,或者確保不需要解任何用rsa鑰容的信息。
  14. Now, open the ssh server host s ssh known hosts file, and add the client machine s hostname all applicable versions - unqualified, fully qualified, and ip address, all separated by commas, followed by the contents of the ssh client host s public host key

    現在,打開ssh服務主機的ssh _ known _ hosts,添客戶機的主機名(所有適用的版本- -未限定主機名、全限定主機名或者ip地址,全部以逗號隔開) ,後面跟上ssh客戶機主機的公共主機鑰的內容。
分享友人