密鑰定位 的英文怎麼說

中文拼音 [yàodìngwèi]
密鑰定位 英文
key location
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ形容詞1 (平靜; 穩定) calm; stable 2 (已經確定的; 不改變的) fixed; settled; established Ⅱ動詞...
  • : Ⅰ名詞1 (所在或所佔的地方) place; location 2 (職位; 地位) position; post; status 3 (特指皇帝...
  1. Later, you will use this key name to locate your key

    以後您將使用這個名來
  2. Please specify a private key container

    請指私人所在置。
  3. As a result, most networks use a single key for 802. 11, even though an optional key identifier field specifying the index in the array of the key is present in a message

    所以,即使在數組中指索引的可選標識欄出現在消息中,大多數網路還是將單個用於802 . 11 。
  4. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機數的生成、採用整除小素數和勒曼測試法判素數,可以生成三種不同長度的對( 256、 512、 1024)來滿足不同的加安全等級的需求;加模塊中,選用了二進制序列的乘法方法,實現了大數模冪乘運算;解模塊中,引用了擴展的歐幾里德法求逆元,並採用中國剩餘理實現解過程,大大提高了解速度。
  5. My study involves two areas in quantum key distribution protocol. first, in the field of the b92 protocol, it is first calculated and analyzed for the holevo upper bound of b92 protocol to noise and eavesdropping, the fidelity, a lower bound on the guaranteed privacy and the capacity for classical information over phase flip channels. it is computed and validated for that projective measurements increase quantum entropy

    本文主要涉及兩個方面:一、 b92量子分配協議方面,計算分析了b92協議對噪聲和竊聽的holevo上界,以及通過相翻轉通道的通道保真度,通道可靠的保性量子熵下界和對經典信息的容量,計算驗證了理投影測量增加量子熵,分析了測量前後量子狀態的變化,並用計算機模擬繪制了圖形,能夠清楚直觀地分析比較。
  6. Adds the specified subject key identifier byte array to the

    將指的主題標識符( ski )元組數組添加到
  7. Field to specify a key type

    結合使用,可以指類型。
  8. Field specifies an exchange key

    交換
  9. A measure of the number of bits in a given key ; note that although increasing the key length gives added security, it s not appropriate to compare the lengths used with one cipher with those in another and, in general, that key lengths in symmetric ciphers do not equate directly with key lengths in asymmetric ciphers

    數的度量;注:雖然長度越長,安全性越強,但將一個碼使用的長度與另一個的長度進行比較是不合適的,通常,對稱碼中的長度與非對稱碼中的長度不是直接相等的。
  10. Users can assign functional and hardware names by interacting with a device ? for instance, by pressing programming buttons on a light and switch that cause them to broadcast their addresses in succession and hence establish a control relation or by carrying the network address along with a cryptographic key between the devices to make the connection secure

    使用者可與器物互動,指功能名稱與硬體名稱,比如按壓燈具與開關上的程式鍵,讓器物依續播送址,藉此建立控制關系;或是讓器物攜帶彼此的網路址與碼金,以確保通訊安全。
分享友人