重復密碼 的英文怎麼說

中文拼音 [zhòng]
重復密碼 英文
confirm password
  • : 重Ⅰ名詞(重量; 分量) weight Ⅱ動詞(重視) lay [place put] stress on; place value upon; attach im...
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 重復 : 1 repeat; duplicate; reduplicate; iterate 2 repetition; reiteration; gemination; rerun; duplicati...
  1. Comparison and analysis of synonymous codon repeat sequences in different genomes

    不同基因組中同義序列的分析與比較
  2. Two spider silk protein genes ( avfl and avf2 ) screened from the library are characterized in a lot of repetitive motifs, a high guanosines or cytidines content, a strong preference for adenosine or thymidine in the third position of a codon and rich residues of glycines or alanines in the proteins translated

    試驗結果,該文庫容量為4 . 9 10 ~ 6 。從文庫中篩選到avf1和avf2蛛絲蛋白新基因,具有典型序列多, g c含量高,子第三個堿基偏愛使用a t及編蛋白中含有大量gly和ala殘基等特點。
  3. The principles of erasure codes used under binary erasure channels are summarized and erasure codes which belong to standard classes of rs codes are introduced with emphasis on cascaded low - density erasure codes with linear time encoding and erasure recover algorithms. thresholds of regular degree distributions are analyzed. it is shown that low - density erasure codes based on ( d, 2d ) - regular sequences of degree distribution are not close to optimal ( d 3 ). two pares of irregular degree distribution sequences are introduced and a pare of improved right regular sequences of low - density erasure codes are presented, it is testified that the new sequences are asymptotically quasi - optimal. in the meantime, simulations of cascaded low - density erasure codes based on a few types of special sequences of degree distribution available are given, together with performance analyses on these codes

    闡述了應用於刪除通道下的糾刪基本原理,介紹了兩類標準的rs類糾刪點分析了具有線性時間編和恢演算法的漸近好?級聯型低度糾刪,分析了正則度分佈的閾值,對正則低度校驗在刪除通道下的糾錯性能進行了模擬,從理論上證明了基於( d , 2d ) -正則度序列的低度糾刪都不是漸近最優( d 3 ) ,同時還分析了非正則低度校驗的度序列設計,基於右邊正則序列提出了一種改進型右邊正則序列,證明了此序列為漸近擬最優的,對基於幾類現有典型度分佈序列的級聯型低度糾刪進行了模擬模擬及性能分析; 3
  4. The first key technique : using plain - text cipher and md5 message - digest algorithm to ensure stb and dhcp server ' s certificate and secure the stb and server ' s communications - the second key technique : using hmac algorithm to realize the safe functions - the third key technique : using ipsec to realize safe functions o those three methods " complexity increases in turn and the degree of the security increases as well which depend on the frame of the methods and the complexity of the algorithm. all theose three methods use the unique serial - number or a special slip - window to defend replay attack

    主要採用三種安全方案實現:第一種:利用約定的明文驗證機頂盒與dhcp服務器的合法身份, md5驗證信息合法性:第二種:利用hmac演算法驗證機頂盒與服務器身份,信息合法性;第三種:利用ipsec驗證機頂盒與dhcp服務器身份與信息合法性。每一種方案中皆採用包序號唯一法或者滑動窗口法保證放攻擊。此三種方案雜度依次增加,安全度依次升高,主要取決于演算法的雜度與架構的搭建。
  5. Gets or sets the message that is displayed when the new password and the duplicate password entered by the user are not identical

    獲取或設置當用戶輸入的新輸入不一致時顯示的消息。
  6. The design process emphases on the managing of the scrambled signal, which involves the channel processing, the demux, and the descramble of the signal

    設計過程主要以對加流信號的處理作為點。包括傳輸信號的通道處理、流的解多工用、以及加信號的解等。
  7. Levels of different password protection systems ; the first level is company identification code. in order to keep the uniqueness for protection locks purchased by each company, mcamos technology provides each customer with an exclusive id, which is a unique and unrepeatable number

    層不同的保護機制第一層為公司辨認,為使每個公司所購買的保護鎖具有唯一性,先趨科技提供每一家客戶一個專屬的辨識,該辨識為唯一且不
  8. If the plain text to be encrypted contains substantial repetition, it is feasible for the cipher text to be broken one block at a time

    如果要加的純文本包含大量的塊,則逐塊破解文本是可行的。
  9. Research on the elliptic curve over finite field f2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. indicate that making operation on the elliptic curve is very complicated

    對適于建立體制的有限域f2m上的一類橢圓曲線進行了研究,分析了橢圓曲線體制的安全性和常見的攻擊方法,因為橢圓曲線體制的安全性只與橢圓曲線本身有關,所以選擇合適的橢圓曲線非常要,指出橢圓曲線的計算是雜的,分析研究了利用有限域f2m上的橢圓曲線建立體制的相關問題,利用經過仿射代換后的橢圓曲線可以建立公鑰體制,將其上的運算進行映射變換后易於設計演算法和便於實現。
  10. This dissertation mainly investigate important measure indexes ? inear complexity, k - error linear complexity and period, on the security of stream ciphers, design several fast algorithms for determining the linear complexity and k - error linear complexity of periodic sequences

    本文主要研究流安全性要的度量指標- -線性雜度、 k -錯線性雜度和周期等,設計出若干計算周期序列的線性雜度和k -錯線性雜度的快速演算法,得到如下主要結果: 1
  11. When the run - time scenario is more complex, such as when the sql mobile database file resides in a device location other than the executing directory, or the connection string is varied in some other way, such as a password, then the overloaded constructor can be used

    當運行時方案更加雜時,如當sql mobile數據庫文件駐留在一個不是執行目錄的設備位置時,或連接字元串以其他某種方式變化(如)時,則可以使用載構造函數。
  12. Professor yao was awarded the turing award in 2000, " in recognition of his fundamental contributions to the theory of computation, including the complexity - based theory of pseudorandom number generation, cryptography, and communication complexity ". his research activities are in the design of efficient computer algorithms, and complexity theories in emerging new areas of theoretical computer science, such as quantum communication and computing

    姚教授於2000年獲頒杜林獎,這是美國計算機學會自1966年設立杜林獎以來,首次頒予華人科學家,美國計算機學會並贊揚姚教授對計算理論作出了根本性而意義大的貢獻,其中包括基於雜性的?亂數生成理論、學和通信雜性。
  13. Provides user interface elements that enable a user to recover or reset a lost password and receive it in e - mail

    提供使用戶在忘記時恢新設置並在電子郵件中接收它的用戶界面( ui )元素。
  14. Password must contain unique combination of the above characters

    包含的英文字母數字及標點符號不應
  15. This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public - key encryption, digital signatures, pseudo - random number generation, and basic protocols and their computational complexity requirements

    本課程精確地介紹近代學,並點介紹原始公鑰加基礎原理、數字簽名、虛擬隨機數的產生、基本協議及相關的計算雜度要求。
  16. To prevent e - cash from double - spending and unlimited increase in the records of databases, an improved offline e - cash system based on elliptic curve cryptography was proposed

    摘要為防止電子現金花費和數據庫記錄無限制的膨脹問題,改進了現有的利用橢圓曲線系統構造的離線電子現金系統。
  17. To assure you have entered a right password, please re - type the same password

    為了確保您輸入的正確無誤,請輸入相同的,以最終確認。
  18. After the ppp link establishment phase is complete, a username / password pair is repeatedly sent by the remote node across the link until authentication is acknowledged or the connection is terminated

    點對點協定連結建立階段完成後,遠端節點透過連結地發送使用者帳號?組合,直到驗證被確認或連接被終止為止。
  19. The efficient encoding problem of ldpc codes is discussed in detail, and the reasons that tornado codes and repeat accumulate codes are linear encode - able and the relationships between them and efficient encode - able ldpc codes are presented. two constructions of linear encode - able ldpc codes are brought up and their performances under awgn channels are simulated

    對低度校驗的快速編問題進行了深入研究,指出了旋風累積能夠達到線性編的原因及其與可快速編的低度校驗之間的關系,提出了兩種可線性編的低度校驗的構造方法並對其在高斯通道下的糾錯性能進行了模擬。
  20. Gets the duplicate password entered by the user

    獲取用戶輸入的重復密碼
分享友人