指數密碼 的英文怎麼說

中文拼音 [zhǐshǔ]
指數密碼 英文
exponential cipher
  • : 指構詞成分。
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 指數 : 1. [經] (比數) index number; index 2. [數學] exponent
  1. Another way favoured by manufacturers is to take a piece of data from the image and assign it a secret code

    另一種為製造商們所喜愛的方法是從圖片中提取出一片據,並為其派一個
  2. How to apply modern cryptography to the copyright protection of digital contents is the focus of this dissertation, in which the traitor tracing problem of digital fingerprinting technology is researched in order that the issue of digital contents is run by natural commercial format

    本文中重點研究如何將現代學技術應用到字產品的版權保護中,即紋技術中的叛逆者追蹤問題,以保證字產品的出版發行能夠按正常商業形式運作。
  3. A file dialog box will be displayed for you to specify the path of your digital certificate. then a password dialog box will be followed for entering the password of the digital certificate

    屏幕會顯示一個檔案對話框,要求你證書的位置,然後會顯示一個對話框,要求輸入該證書的
  4. Alternatively, if you have applied for a back up copy of your ecert in floppy diskette, you may specify your ecert file location directly to the drive when ecert file stored and input your 16 - digit pin

    另外,如果您選擇以磁碟硬碟儲存電子證書,您可於儲存電子證書時定電子證書的檔案位置,並輸入1 6位
  5. Digital certificate stored on a floppy disk or hard disk, whereby user will be required to enter a password and specify where the certificate is stored ; or

    儲存於軟磁碟或硬磁碟機的證書(使用者須輸入明存放證書的位置) ;或
  6. In the design and analysis of sequence cipher, we obtain the following results. first, we give the trace representation of primitive sequences and their corresponding highest lever sequences on galois ring by using the trace function theory and the characteristic of lever factorization, and determine the correlation function linear complexity and element distribution of the highest lever sequences of primitive sequences on galois ring gr ( 4, m )

    在序列的設計和分析方面:首先,利用galois環上跡函理論和本原序列的權位分解特徵,給出了本原序列及其最高權位序列的跡表達式,然後利用galois域上二次型理論與和理論決定了特徵為4的galois環上本原序列的最高權位的相關函、線性復雜度和元素分佈。
  7. Returns the password for the specified user name from the sql server membership database

    從sql server成員資格據庫返回定用戶名的
  8. Verifies that the specified user name and password exist in the sql server membership database

    驗證sql server成員資格據庫中是否存在定的用戶名和
  9. Good passwords are commonly defined as a random mix of letters upper and lower case, numbers, and symbols at least eight characters in length - longer is better, meaning in this case harder to guess or crack

    健壯的的定義通常至少八個字元長度越長越好,在這里意味著更難猜或破解的字母(大寫和小寫) 、字和符號的隨機組合。
  10. A subliminal channel is a covert communication channel to send a message to an authorized receiver. this channel is constructed in the output crypto - data of an applied public - key cryptosystem such as digital signature, authentication, and so on. the message can not be discovered by any unauthorized receivers

    閾下通道是在基於公鑰技術的字簽名、認證等應用體制的輸出據中建立起來的一種隱蔽通道,除定的接收者外,任何其他人均不知道據中是否有閾下消息存在。
  11. Specifies the number of allowed password or password answer attempts that are not valid

    定允許的無效或無效提示問題答案嘗試的次
  12. If the number of invalid passwords or password questions supplied for a membership user exceeds the

    定的分鐘內,如果為某一成員資格用戶所輸入的無效提示問題答案的次超過
  13. The general requirement of communication system and the application potential in secure communication are expatiated. the chaotic secure communication methods home and abroad are also summarized, including chaos spread spectrum communication, chaos key - shifting, chaos parameter modulation, chaos masking, chaos cdma. the exiting problems and development direction are also pointed out respectively

    介紹了混沌學的發展過程和意義,闡述了通信系統的一般要求和混沌在保通信中的應用潛力,綜述了國內外現有的混沌保通信方法,其中包括:混沌擴頻通信,混沌鍵控,混沌參調制,混沌掩蓋,混沌分多址等五大類,出了各自存在的問題和發展方向。
  14. The odbc _ connect ( ) function is used to connect to an odbc data source. the function takes four parameters : the data source name, username, password, and an optional cursor type

    是用來與odbc據源建立連接的。這個函包含四個參據源名稱、用戶名、、一個「選擇針」的類型。
  15. Create guidelines for password creation and circulate it, force users to change their passwords every few months, and limit the number of login attempts allowed in a given time period

    應該為創建和傳播制定導方針,強制用戶每幾個月更換一次並限制一定時間段里所允許的登錄嘗試次
  16. Password protected remote maintenance of your index including

    保護遠程維護你的,其中包括:
  17. 5 zheng y, matsumoto t, imai h. on the construction of block ciphers provably secure and not relying on any unproved hypotheses. in advances in cryptology - crypto 89, lncs 435, springer - verlag, new york, usa, aug. 1989, pp. 461 - 480. 6 pieprzyk j. how to construct pseudorandom permutations from single pseudorandom functions

    可證明安全理論使得分組設計中的某些取捨有一定的理論根據,也可以將設計安全分組這樣一個大問題歸結為某些小規模的問題,比如輪函s -盒的設計因此,國際上已將可證明安全作為評價一個方案的重要標。
  18. Dna is the main genetic materials in most organism. the amino acids are arranged by the genetic triplet code to synthes proteins which are very important in organism

    Dna分子是絕大多生物的遺傳信息的載體,它的三聯導氨基酸按照一定的序列組裝成生命活動極為重要的蛋白質分子。
  19. Asymmetric - key cryptography, which we will discuss in chapter 10, is based on some topics in number theory, including theories related to primes, factorization of composites into primes, modular exponentiation and logarithm, quadratic residues, and the chinese remainder theorem

    我們將在第十章中討論非對稱學,非對稱學基於一些論的論題,這些論題與素、把復合分解為素的因分解、模與模對、二次剩餘和中國剩餘定理有關。
  20. In the end of the chapter, the security of several kinds of important cryptographic functions is deeply analyzed

    本章末,利用這些安全性標分析了幾類重要的的安全性。
分享友人