高加密包 的英文怎麼說

中文拼音 [gāojiābāo]
高加密包 英文
high encryption pack
  • : Ⅰ形容詞1 (從下向上距離大; 離地面遠) tall; high 2 (在一般標準或平均程度之上; 等級在上的) above...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  1. The main contents include : water environment, marine sediment and the trend monitoring of marine life quality ; at the same time, to consolidate the monitoring of the functional zones, such as seashore bathing places, oceanic reserves, marine aquafarms ; to set up the seashell monitoring and controlling zones in the sea areas of both pingtan and yunxiao at the first time ; to carry out the statistical monitoring of polder, exploiting sea sand, spartin aallerni flora, terrestrial sewages, etc., to carry out monitoring of the total quantity of pollutants into the offshore marine areas in the min river, the jiulong river as well as the municipal sewages of xinlin industry in xiamen and jiaocheng in ningde ; to carry out the red tide monitoring in the offshore marine areas of fujian province ; to implement time - lapse, pointing and continuous red tide monitoring of high frequency and high intensity in the sandu gulf, the min river estuary and offshore marine areas of xiamen

    主要內容括水環境、海洋沉積物和海洋生物質量的全海域環境趨勢性監測,同時強了海水浴場、海洋保護區、海水增養殖區等功能區監測;首次在平潭和雲霄海域設置了貝類監控區;開展了圍填海、海砂開采、互花米草、陸源排污口統計監測;並在閩江、九龍江、廈門杏林工業排污口、寧德蕉城市政排污口鄰近海域開展污染物入海總量監測;在全省近岸海域開展赤潮監視監測,對三都灣、閩江口、廈門近岸海域赤潮監控區實施頻率、度的定時定點連續監測。
  2. These appliances, available from companies such as decru, neoscale, and vormetric, implement very fast encryption - they typically claim to operate at or close to " wire speed. " they also usually include sophisticated key management facilities for controlling the creation and distribution of cipher keys, cycling of keys, and disposition of keys, besides handling general data encryption

    Decru 、 neoscale和vormetric等公司都能提供這些器件,它們實現了非常快的通常被聲稱速度達到或接近「線速」 。它們還常常級的鑰管理設施,除了用於處理一般的數據外,還可用於控制鑰的創建和分發、鑰的循環和鑰的銷毀。
  3. High performance and high precision copper and copper alloy strips, electrolytic copper foil, lead frame, copper clad and printed - circuit board, special enameled copper wire, fashioned copper bar, track contact wire, medium and high elastic copper strips for interconnecting devices, precision alloy copper pipes for ac and cooling appliance, over - long and corrosion - resistant copper alloy condenser pipe, seamless cooper water pipe in housing construction and other copper fine and deep processing products will be highly developed in jiangxi province

    江西將重點發展性能精度銅及銅合金板帶、電解銅箔、引線框架、覆銅板及印刷電路板、特種漆線、異型銅排、軌道接觸線、接插元件用中彈性銅帶材、空調與製冷精合金銅管、超長耐腐蝕銅合金冷凝管、建築用無縫銅水管等10項銅精深工產品。
  4. Second, the paper in - depth discuss the reinforce foundation operation mechanism of technique of composite grouting, including spray incise action of high pressure spray flow to soil, mill metathesis concretion action, and penetrate, split, crush action of serum to soil, etc. third, the paper in - depth study design calculate of composite grouting, design of composite grouting technic parameter

    其次,本文對復合注漿法固地基的作用機理進行了深入的探討,壓噴射流對土體的噴射切割作用、漿液與土的攪拌置換固結作用以及漿液對土體的滲透、劈裂、擠作用等問題。第三,本文對復合注漿的設計計算、注漿技術參數的設計進行了深入的研究。
  5. Terminal services advanced client 5. 01 pack : rdp clients with high encryption 128 - bit

    終端服務級客戶端5 . 01軟體:使用( 128位)的rdp客戶端
  6. Singapore ' s infrastructure consists of a comprehensive bus network and an efficient mrt subway system

    坡的基礎設施括有周的公共汽車網路及效率的大眾快速運輸地鐵系統。
  7. Many others expressed how they missed master ching hai s elegant demeanor and compassionate heart and also extended their best wishes to her, including peter nygard, model and actress anna nicole smith, and actors david carradine, kevin mccarthy, henry silva and vincent schiavelli. other well - wishers included buzz aldrin, first astronaut on the moon, and his wife lois, and ken huthmaker of entertainment sports today. many of these superstars admire and hope to once again meet with supreme master ching hai

    許多人想念清海無上師優雅的風范以及慈悲的愛心,致上他們最的祝福,括彼得尼知名模特兒兼演員安娜妮可史斯演員大衛卡拉定功夫,長騎者凱文麥卡西推銷員之死驚異大奇航亨利西瓦狄克崔西,熱血手和文森西維里第六感生死戀蝙蝠俠大顯神威等等。
  8. Meanwhile, a method for rapid thermal fixing is presented, which has some advantages over conventional technique in stability and repeatability, while shortened the fixing time. secondly, we have designed and made a compact practical holographic system that consists of angular - fractal multiplexing system and thermal fixing equipment, including a crystal repositioner with precision less than 0. 001

    另一方面,圍繞度全息存儲設計復用存儲技術,製作了有較大存儲能力的小型實用熱固定全息系統,括角度一維度復用系統、離線熱的晶體夾持器和復位裝置、適合離線與在線熱的溫控熱裝置。
  9. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線碼體制的優點及研究現狀;其次研究了橢圓曲線碼體制的基本理論;第三,分析了橢圓曲線碼的安全性並介紹了鑰共享,,數字簽名等橢圓曲線碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線碼體制,括ecdh , eces , ecdsa 。
  10. There are many methods of foundation consolidation for civil engineering, such as soil exchange method, prepress method, dynamic consolidation method, vibrancy rushing method, soil and podsol dense pile method, sand pile, cement - coal - powder and gravel pile method, deep mixing method, high - pressure eject masonry, etc. the dynamic consolidation and deep mixing method ( dmm ) are very common in project construction

    目前國內外地基處理的方法很多,主要的地基處理方法括:換填法、預壓法、強夯法、振沖法、土和灰土擠樁法、砂樁法、水泥粉煤灰碎石樁法、深層攪拌法以及壓噴射注漿法等。其中強夯法和深層攪拌法是工程建設中較常用的固方法。
  11. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    本文對美國標準rijndael演算法進行了比較深入的研究,內容括:從布爾函數、 walsh譜和代數結構的角度對其s盒碼性質進行的研究,簡化演算法的攻擊方法以及演算法的優化實現問題,主要成果有: 1 、提出求解布爾函數表達式的兩種新方法,具有簡潔、易於編程實現、準確而快速的特點,應用於des演算法獲得與公開文獻相符的結果,應用於rijndael演算法首次求出其s盒布爾函數表達式。
  12. Because expansion valves are high precision processing components, factory in its internal adjustment of the body parts are processed in a state of complete thermostatic, the temperature of the gas filling kits are demanding more consistent not detect leaks, in the completion of the expansion valve assembly also undergo strict testing and fatigue resistance aging sampling, the construction expansion valves : 1 : indeed temperature temperature kits ; 2 : temperature gas or liquid filled with the expansion corrugated ; 3 : spherical valve seat ; 4 spherical valves ; 5 : spring ; 6 : overheating degrees adjustment screw spacer and screw ; 7 : internal and external ( h - type ) sealed pieces ; 8 : thrust poles and corrugated of spacer ; 9 : fati ; 10 : capillary, and so on

    因為膨脹閥是屬于超工的零件,在工廠對其內部調整機構零件的工都在恆溫狀態下完成,其中的感溫的氣體充填更是要求嚴格一致不允許一絲泄漏,在完成裝配的膨脹閥還要經過嚴格的測試和耐疲勞老化抽檢,膨脹閥的構造: 1 :感知溫度的感溫; 2 :感溫氣體或者液體充填膨脹波紋腔; 3 :球型閥座; 4球型閥; 5 :彈簧; 6 :過熱度調整螺絲墊片和螺絲; 7 :內部和外部( h型)封件; 8 :推力桿和波紋腔墊片; 9 :閥體; 10 :毛細管等等。
  13. Note the windows 2000 high encryption pack is eligible for export from the u. s. to all customers worldwide, except to us embargoed destinations

    注意: windows 2000軟體有資格從美國出口至全球范圍的所有客戶,美國禁運的目的地除外。
  14. Note the windows 2000 high encryption pack is eligible for export from the u. s. to all customers worldwide, except to us embargoed destinations. please see

    注意: windows 2000軟體有資格從美國出口至全球范圍的所有客戶,美國禁運的目的地除外。
  15. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種技術的基本理論,括對稱體制如des和blowfish 、非對稱體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的標準( advancedencryptionstandard , aes )等。
  16. In the function of the system realizes, the high - efficient quality and security that explain the remote data base access ( rda ) emphatically, and explain web safe practice of using procedure making and rda technology in detail. including, user authorize https, data base encrypt and batch treatment

    在系統的功能實現上,著重闡述遠程數據庫訪問的效性和安全性,並詳細講解所採用的web應用程序開發的安全技術和遠程數據庫訪問技術,括用戶身份驗證( https ) 、數據庫及批處理等效安全的網路開發技術。
  17. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據等技術手段提系統的網路安全性能。
  18. The windows 2000 high encryption pack allows you to enhance your system with the highest available encryption level 128 - bit

    Windows 2000軟體使您可以通過最可用級別128位來增強系統。
  19. The system adopts different transmission method to improve the transmission efficiency with a view to different transmission characteristic of file data and picture data. it adopts the method of capturing data packets for file data, and storing, sending for picture data

    針對文件數據和圖像數據不同的特點,採用不同的傳輸方式,對于文件數據採用數據捕獲的方式,對于圖像數據採用存儲轉發的傳輸方式,有效地提了網路傳輸效率。
  20. The paper emphasizes on the discussion of the problems in implementation of network speech communication system of pc to pc in lan and the schema of secure network speech communication. the aes algorithm, the chaotic sequence and the method of chaos modulation was adopted to encrypt the voice signal and the srp protocol was used for identity authentication, so as to strengthen security. and some pivotal problems is discussed and settled, such as the compressing, restraining of reverberation and the obliteration of voice signal dither

    著重考慮了局域網環境下的pc到pc的網路語音通信系統的實現的相關問題;探討並設計了網路語音傳輸中的保解決方案,採用aes演算法、混沌序列方法和混沌調制方法對語音武漢理工大學碩士學位論文信號進行處理,選用srp協議用於身份認證,以提網路語音通信的保性能;並針對網路語音傳輸中的幾個關鍵問題,括語音信號的壓縮、網路語音信號的靜音抑止和網路語音的去抖動處理等問題進行了分析。
分享友人