hashed 中文意思是什麼

hashed 解釋
散列的
  1. By day the monotonous hours wore on in the same heavy, hashed manner as on that first dreary afternoon.

    在白天,那沉悶的時刻,就和第一個凄涼的下午一樣,憂郁寂寞地度過。
  2. Assuming the operating system can be trusted which is a laughably big assumption, we can assume our database of crypto hashed passphrases is correct

    假設作業系統是可信的(這是個可笑的大前提) ,我們可以假設我們的加密雜湊密碼的資料庫是正確的。
  3. Hashed passwords stored in a text file cannot be used to regenerate the original password, but they are potentially vulnerable to a dictionary attack

    存儲在文本文件中的哈希密碼不能用於重新生成原始密碼,但它們可能容易受到字典式攻擊。
  4. That foreign news agency report hashed up the account of the accident

    那家外國通訊社對此事件的報導簡直是亂說一通,牛頭不對馬嘴。
  5. All these old problems should be hashed over

    所有這些老問題都應該重新提出討論。
  6. When the user tries to log in, and types in a passphrase, the login program hashes it, and compares the newly hashed passphrase to the stored hash

    當使用者試圖登入,並輸入密碼時,登入程式雜湊它,並將新雜湊的密碼與儲存的雜湊比較。
  7. Oh, and the next two hours tripped by on rosy wings. forget the hashed metaphor. she was ransacking the stores for jim ' s present

    啊!隨后的兩個鐘頭彷彿長了玫瑰色的翅膀似的飛掠過去了。請不要理會折中雜湊的比喻吧!總之,德拉為了給傑姆買禮物,搜索了所有的鋪子。
  8. A hash - based message authentication code hmac uses a hash function where data is hashed by iterating a basic compression function on blocks of data

    基於哈希的消息驗證代碼( hmac )使用一個哈希函數,通過在數據塊上迭代基本壓縮函數來計算數據的哈希值。
  9. In this new protocol, the key confirmation is incorporated into the authenticated key agreement, and its key confirmation is a hashed value of concatenation of the scalar multiplication of the long - term private key and ephemeral public key, and the scalar multiplication of the private key and long - term public key, which ensure that the protocol achieves forward secrecy, and resists key - compromise impersonation

    在新協議中,加入了密鑰確認,其確認密鑰由長期私鑰與臨時公鑰的積和臨時私鑰與長期公鑰的積串起來的哈希值,這確保它具有前向保密性和密鑰泄漏的安全性。
  10. In this new protocol, the authentication code of the its initiator depend on the shared long term key, but the authentication code of the its responder relies on session key, and the session key is a hashed value of concatenation of the long - term shared key, the scalar multiplication of the long - term private key and ephemeral public key, and the scalar multiplication of the private key and long - term public key, which ensure that the protocol resists key - compromise impersonation

    在新協議中,協議起始方的認證碼依賴于長期共享密鑰,但協議的應答方的認證碼依賴于會話密鑰,且會話密鑰是由長期共享密鑰、長期私鑰與臨時公鑰的積和臨時私鑰與長期公鑰的積三部分串起來的哈希值,這就保證它具有密鑰泄漏的安全性。
  11. They hashed out the problem of drilling in great depth

    他們經過長時間的討論解決了深層鉆井問題。
  12. If jethro s signature is valid, then the message is re - hashed and compared to verify that it s valid

    如果簽名有效,則重新散列該消息並通過比較檢查其有效性。
  13. Follow along with john zukowski as he demonstrates how to iterate through the elements of a hashed collection in insertion order and how to maintain elements in access order with the new collections framework implementations in j2se, version 1. 4

    讓我們跟隨john zukowski的演示,學習如何按插入順序迭代散列集合中的各個元素,以及如何使用j2se ,版本1 . 4中的新collections framework按存取順序維護元素。
  14. In a pointer to the address of the memory block to be hashed

    [ in ]指向要進行哈希處理的內存塊地址的指針。
  15. If you store hashed passwords in any way, you should require your users to choose passwords that are not common words and that contain some numbers and non - alphanumeric characters to help prevent dictionary attacks

    如果通過任何方式存儲哈希密碼,則您應該要求用戶在選擇密碼時不使用常用的單詞,並且密碼應包含一些數字和非字母數字字元以防止字典攻擊。
  16. This value may be already hashed. you should use a strong password

    此值提供時可能已經過哈希運算。
  17. This paper tries to make use of the cellular automata ’ s sensitivity to the initial state called avalanche effect, by swiftly diffusing and confusing the plaintext to be hashed, a cellular automata based one - way hash function is proposed

    本文試圖利用細胞自動機某些演化規則對于初態的雪崩效應,通過對散列明文信息實現快速擴散與混淆來構造單向hash函數。
  18. When a password is validated, it is combined with a salt value and then hashed

    驗證密碼時,先將其與salt值合併,然後再進行哈希計算。
  19. Although view state stores data in a hashed format, it can still be tampered with

    雖然視圖狀態以哈希格式存儲數據,但它可以被篡改。
  20. The values of the hash are unique for the hashed message, and the hash values will not expose the message since the hash is one way only

    哈希值對于經過哈希處理的消息來說是唯一的,而且由於哈希是單向的,因此哈希值不會暴露消息內容。
分享友人