重復密碼 的英文怎麼說
中文拼音 [zhòngfùmìmǎ]
重復密碼
英文
confirm password- 重 : 重Ⅰ名詞(重量; 分量) weight Ⅱ動詞(重視) lay [place put] stress on; place value upon; attach im...
- 復 : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 重復 : 1 repeat; duplicate; reduplicate; iterate 2 repetition; reiteration; gemination; rerun; duplicati...
-
Comparison and analysis of synonymous codon repeat sequences in different genomes
不同基因組中同義密碼子重復序列的分析與比較Two spider silk protein genes ( avfl and avf2 ) screened from the library are characterized in a lot of repetitive motifs, a high guanosines or cytidines content, a strong preference for adenosine or thymidine in the third position of a codon and rich residues of glycines or alanines in the proteins translated
試驗結果,該文庫容量為4 . 9 10 ~ 6 。從文庫中篩選到avf1和avf2蛛絲蛋白新基因,具有典型重復序列多, g c含量高,密碼子第三個堿基偏愛使用a t及編碼蛋白中含有大量gly和ala殘基等特點。The principles of erasure codes used under binary erasure channels are summarized and erasure codes which belong to standard classes of rs codes are introduced with emphasis on cascaded low - density erasure codes with linear time encoding and erasure recover algorithms. thresholds of regular degree distributions are analyzed. it is shown that low - density erasure codes based on ( d, 2d ) - regular sequences of degree distribution are not close to optimal ( d 3 ). two pares of irregular degree distribution sequences are introduced and a pare of improved right regular sequences of low - density erasure codes are presented, it is testified that the new sequences are asymptotically quasi - optimal. in the meantime, simulations of cascaded low - density erasure codes based on a few types of special sequences of degree distribution available are given, together with performance analyses on these codes
闡述了應用於刪除通道下的糾刪碼基本原理,介紹了兩類標準的rs碼類糾刪碼,重點分析了具有線性時間編碼和恢復演算法的漸近好碼?級聯型低密度糾刪碼,分析了正則度分佈的閾值,對正則低密度校驗碼在刪除通道下的糾錯性能進行了模擬,從理論上證明了基於( d , 2d ) -正則度序列的低密度糾刪碼都不是漸近最優碼( d 3 ) ,同時還分析了非正則低密度校驗碼的度序列設計,基於右邊正則序列提出了一種改進型右邊正則序列,證明了此序列為漸近擬最優的,對基於幾類現有典型度分佈序列的級聯型低密度糾刪碼進行了模擬模擬及性能分析; 3The first key technique : using plain - text cipher and md5 message - digest algorithm to ensure stb and dhcp server ' s certificate and secure the stb and server ' s communications - the second key technique : using hmac algorithm to realize the safe functions - the third key technique : using ipsec to realize safe functions o those three methods " complexity increases in turn and the degree of the security increases as well which depend on the frame of the methods and the complexity of the algorithm. all theose three methods use the unique serial - number or a special slip - window to defend replay attack
主要採用三種安全方案實現:第一種:利用約定的明文密碼驗證機頂盒與dhcp服務器的合法身份, md5驗證信息合法性:第二種:利用hmac演算法驗證機頂盒與服務器身份,信息合法性;第三種:利用ipsec驗證機頂盒與dhcp服務器身份與信息合法性。每一種方案中皆採用包序號唯一法或者滑動窗口法保證重放攻擊。此三種方案復雜度依次增加,安全度依次升高,主要取決于演算法的復雜度與架構的搭建。Gets or sets the message that is displayed when the new password and the duplicate password entered by the user are not identical
獲取或設置當用戶輸入的新密碼和重復輸入密碼不一致時顯示的消息。The design process emphases on the managing of the scrambled signal, which involves the channel processing, the demux, and the descramble of the signal
設計過程主要以對加密的碼流信號的處理作為重點。包括傳輸信號的通道處理、碼流的解多工復用、以及加密信號的解密等。Levels of different password protection systems ; the first level is company identification code. in order to keep the uniqueness for protection locks purchased by each company, mcamos technology provides each customer with an exclusive id, which is a unique and unrepeatable number
層不同的密碼保護機制第一層為公司辨認碼,為使每個公司所購買的保護鎖具有唯一性,先趨科技提供每一家客戶一個專屬的辨識碼,該辨識碼為唯一且不重復號碼。If the plain text to be encrypted contains substantial repetition, it is feasible for the cipher text to be broken one block at a time
如果要加密的純文本包含大量重復的塊,則逐塊破解密碼文本是可行的。Research on the elliptic curve over finite field f2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. indicate that making operation on the elliptic curve is very complicated
對適于建立密碼體制的有限域f2m上的一類橢圓曲線進行了研究,分析了橢圓曲線密碼體制的安全性和常見的攻擊方法,因為橢圓曲線密碼體制的安全性只與橢圓曲線本身有關,所以選擇合適的橢圓曲線非常重要,指出橢圓曲線的計算是復雜的,分析研究了利用有限域f2m上的橢圓曲線建立密碼體制的相關問題,利用經過仿射代換后的橢圓曲線可以建立公鑰密碼體制,將其上的運算進行映射變換后易於設計演算法和便於實現。This dissertation mainly investigate important measure indexes ? inear complexity, k - error linear complexity and period, on the security of stream ciphers, design several fast algorithms for determining the linear complexity and k - error linear complexity of periodic sequences
本文主要研究流密碼安全性重要的度量指標- -線性復雜度、 k -錯線性復雜度和周期等,設計出若干計算周期序列的線性復雜度和k -錯線性復雜度的快速演算法,得到如下主要結果: 1When the run - time scenario is more complex, such as when the sql mobile database file resides in a device location other than the executing directory, or the connection string is varied in some other way, such as a password, then the overloaded constructor can be used
當運行時方案更加復雜時,如當sql mobile數據庫文件駐留在一個不是執行目錄的設備位置時,或連接字元串以其他某種方式變化(如密碼)時,則可以使用重載構造函數。Professor yao was awarded the turing award in 2000, " in recognition of his fundamental contributions to the theory of computation, including the complexity - based theory of pseudorandom number generation, cryptography, and communication complexity ". his research activities are in the design of efficient computer algorithms, and complexity theories in emerging new areas of theoretical computer science, such as quantum communication and computing
姚教授於2000年獲頒杜林獎,這是美國計算機學會自1966年設立杜林獎以來,首次頒予華人科學家,美國計算機學會並贊揚姚教授對計算理論作出了根本性而意義重大的貢獻,其中包括基於復雜性的?亂數生成理論、密碼學和通信復雜性。Provides user interface elements that enable a user to recover or reset a lost password and receive it in e - mail
提供使用戶在忘記密碼時恢復或重新設置並在電子郵件中接收它的用戶界面( ui )元素。Password must contain unique combination of the above characters
密碼包含的英文字母數字及標點符號不應重復This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public - key encryption, digital signatures, pseudo - random number generation, and basic protocols and their computational complexity requirements
本課程精確地介紹近代密碼學,並重點介紹原始公鑰加密的密碼基礎原理、數字簽名、虛擬隨機數的產生、基本協議及相關的計算復雜度要求。To prevent e - cash from double - spending and unlimited increase in the records of databases, an improved offline e - cash system based on elliptic curve cryptography was proposed
摘要為防止電子現金重復花費和數據庫記錄無限制的膨脹問題,改進了現有的利用橢圓曲線密碼系統構造的離線電子現金系統。To assure you have entered a right password, please re - type the same password
為了確保您輸入的密碼正確無誤,請重復輸入相同的密碼,以最終確認。After the ppp link establishment phase is complete, a username / password pair is repeatedly sent by the remote node across the link until authentication is acknowledged or the connection is terminated
點對點協定連結建立階段完成後,遠端節點透過連結重復地發送使用者帳號?密碼組合,直到驗證被確認或連接被終止為止。The efficient encoding problem of ldpc codes is discussed in detail, and the reasons that tornado codes and repeat accumulate codes are linear encode - able and the relationships between them and efficient encode - able ldpc codes are presented. two constructions of linear encode - able ldpc codes are brought up and their performances under awgn channels are simulated
對低密度校驗碼的快速編碼問題進行了深入研究,指出了旋風碼和重復累積碼能夠達到線性編碼的原因及其與可快速編碼的低密度校驗碼之間的關系,提出了兩種可線性編碼的低密度校驗碼的構造方法並對其在高斯通道下的糾錯性能進行了模擬。Gets the duplicate password entered by the user
獲取用戶輸入的重復密碼。分享友人