指數密碼 的英文怎麼說
中文拼音 [zhǐshǔmìmǎ]
指數密碼
英文
exponential cipher-
Another way favoured by manufacturers is to take a piece of data from the image and assign it a secret code
另一種為製造商們所喜愛的方法是從圖片中提取出一片數據,並為其指派一個密碼。How to apply modern cryptography to the copyright protection of digital contents is the focus of this dissertation, in which the traitor tracing problem of digital fingerprinting technology is researched in order that the issue of digital contents is run by natural commercial format
本文中重點研究如何將現代密碼學技術應用到數字產品的版權保護中,即數字指紋技術中的叛逆者追蹤問題,以保證數字產品的出版發行能夠按正常商業形式運作。A file dialog box will be displayed for you to specify the path of your digital certificate. then a password dialog box will be followed for entering the password of the digital certificate
屏幕會顯示一個檔案對話框,要求你指定數碼證書的位置,然後會顯示一個密碼對話框,要求輸入該數碼證書的密碼。Alternatively, if you have applied for a back up copy of your ecert in floppy diskette, you may specify your ecert file location directly to the drive when ecert file stored and input your 16 - digit pin
另外,如果您選擇以磁碟硬碟儲存電子證書,您可於儲存電子證書時指定電子證書的檔案位置,並輸入1 6位數字密碼。Digital certificate stored on a floppy disk or hard disk, whereby user will be required to enter a password and specify where the certificate is stored ; or
儲存於軟磁碟或硬磁碟機的數碼證書(使用者須輸入密碼及指明存放數碼證書的位置) ;或In the design and analysis of sequence cipher, we obtain the following results. first, we give the trace representation of primitive sequences and their corresponding highest lever sequences on galois ring by using the trace function theory and the characteristic of lever factorization, and determine the correlation function linear complexity and element distribution of the highest lever sequences of primitive sequences on galois ring gr ( 4, m )
在序列密碼的設計和分析方面:首先,利用galois環上跡函數理論和本原序列的權位分解特徵,給出了本原序列及其最高權位序列的跡表達式,然後利用galois域上二次型理論與指數和理論決定了特徵為4的galois環上本原序列的最高權位的相關函數、線性復雜度和元素分佈。Returns the password for the specified user name from the sql server membership database
從sql server成員資格數據庫返回指定用戶名的密碼。Verifies that the specified user name and password exist in the sql server membership database
驗證sql server成員資格數據庫中是否存在指定的用戶名和密碼。Good passwords are commonly defined as a random mix of letters upper and lower case, numbers, and symbols at least eight characters in length - longer is better, meaning in this case harder to guess or crack
健壯的密碼的定義通常指至少八個字元長度越長越好,在這里意味著更難猜或破解的字母(大寫和小寫) 、數字和符號的隨機組合。A subliminal channel is a covert communication channel to send a message to an authorized receiver. this channel is constructed in the output crypto - data of an applied public - key cryptosystem such as digital signature, authentication, and so on. the message can not be discovered by any unauthorized receivers
閾下通道是指在基於公鑰密碼技術的數字簽名、認證等應用密碼體制的輸出密碼數據中建立起來的一種隱蔽通道,除指定的接收者外,任何其他人均不知道密碼數據中是否有閾下消息存在。Specifies the number of allowed password or password answer attempts that are not valid
指定允許的無效密碼或無效密碼提示問題答案嘗試的次數。If the number of invalid passwords or password questions supplied for a membership user exceeds the
指定的分鐘數內,如果為某一成員資格用戶所輸入的無效密碼或密碼提示問題答案的次數超過The general requirement of communication system and the application potential in secure communication are expatiated. the chaotic secure communication methods home and abroad are also summarized, including chaos spread spectrum communication, chaos key - shifting, chaos parameter modulation, chaos masking, chaos cdma. the exiting problems and development direction are also pointed out respectively
介紹了混沌學的發展過程和意義,闡述了通信系統的一般要求和混沌在保密通信中的應用潛力,綜述了國內外現有的混沌保密通信方法,其中包括:混沌擴頻通信,混沌鍵控,混沌參數調制,混沌掩蓋,混沌數字碼分多址等五大類,指出了各自存在的問題和發展方向。The odbc _ connect ( ) function is used to connect to an odbc data source. the function takes four parameters : the data source name, username, password, and an optional cursor type
函數是用來與odbc數據源建立連接的。這個函數包含四個參數:數據源名稱、用戶名、密碼、一個「選擇指針」的類型。Create guidelines for password creation and circulate it, force users to change their passwords every few months, and limit the number of login attempts allowed in a given time period
應該為創建和傳播密碼制定指導方針,強制用戶每幾個月更換一次密碼並限制一定時間段里所允許的登錄嘗試次數。Password protected remote maintenance of your index including
密碼保護遠程維護你的指數,其中包括:5 zheng y, matsumoto t, imai h. on the construction of block ciphers provably secure and not relying on any unproved hypotheses. in advances in cryptology - crypto 89, lncs 435, springer - verlag, new york, usa, aug. 1989, pp. 461 - 480. 6 pieprzyk j. how to construct pseudorandom permutations from single pseudorandom functions
可證明安全理論使得分組密碼設計中的某些取捨有一定的理論根據,也可以將設計安全分組密碼這樣一個大問題歸結為某些小規模的問題,比如輪函數s -盒的設計因此,國際上已將可證明安全作為評價一個密碼方案的重要指標。Dna is the main genetic materials in most organism. the amino acids are arranged by the genetic triplet code to synthes proteins which are very important in organism
Dna分子是絕大多數生物的遺傳信息的載體,它的三聯密碼子指導氨基酸按照一定的序列組裝成生命活動極為重要的蛋白質分子。Asymmetric - key cryptography, which we will discuss in chapter 10, is based on some topics in number theory, including theories related to primes, factorization of composites into primes, modular exponentiation and logarithm, quadratic residues, and the chinese remainder theorem
我們將在第十章中討論非對稱密鑰密碼學,非對稱密鑰密碼學基於一些數論的論題,這些論題與素數、把復合數分解為素數的因數分解、模指數與模對數、二次剩餘和中國剩餘定理有關。In the end of the chapter, the security of several kinds of important cryptographic functions is deeply analyzed
本章末,利用這些安全性指標分析了幾類重要的密碼函數的安全性。分享友人