散列法 的英文怎麼說
中文拼音 [sǎnlièfǎ]
散列法
英文
hash method-
Chapter nine, ten and eleven develop the discrete methods to price exotic options, in which chapter nine prices exotic options using the shooting target gird method, chapter ten prices the options using improved shooting target gird method when the underlying asset obeys cev process, and chapter eleven prices the double lookback options using five - bifurcation tree method. in the last chapter, application of option pricing theory is studied in executive stock option plan
第九、十、十一章研究的是用離散方法對變異期權進行定價,其中,第九章是用打靶格法對一列變異期權進行定價;第十章,用改進的打靶格法對標的資產的價格服從cev過程的變異期權進行定價;第十一章用五叉樹模型對雙回望期權進行定價。This method eliminates the clustering problem in linear rehashing by picking the integer pii in a pseudorandom fashion.
這種方法是按偽隨機方式去挑選整數pii,它能消除線性再散列中所產生的堆聚問題。The general purpose hash function algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithms in the c + + programming language
通用哈希函數運演算法則庫包括一系列通常使用的附加的或者循環的字元竄散列法運演算法則,在c + +程序語言中。Hashing algorithms produce unique binary message digests based on the code they sign
根據要簽名的代碼,散列演算法產生唯一的二進制消息摘要。The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways
本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地解決了密鑰分配和加密解密同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加密解密的一次一密會話密鑰。Md5 message - digest algorithm 5 ; rfc 1321 is a widely used cryptographic hash function with a 128 - bit hash value
Md5 (消息摘要演算法5 ; rfc 1321 )是一種廣泛應用的加密散列函數,使用了128位的散列值。Select a hashing algorithm from the following list
請從下表中選擇散列演算法。First, considering the characteristics of mining association rules, an effective hash function is constructed and its constructional principles, realizable methods and efficiencies are analysed, studied, discussed and proved in detail and at the same time several new concepts such as radix - scale degree, combination - existence degree, combination - denseness degree and so on are defined too
散列技術部分針對關聯規則數據挖掘的特點構造了一個有效的散列函數,在對它的構造原理、實現方法和效率等進行詳細地分析、研究和論證的同時,還提出了「基規模度」 、 「組合存在度」 、 「組合稠密度」等幾個新的概念。Cryptography is one of the key technologys to protect confidential information as it is transmitted from one location to another. there are two primary encryption methods in use today : symmetric - key cryptography and public - key cryptography
加密是確保安全的關鍵技術之一,本文討論了幾種典型的加密演算法,包括分組加密、公鑰加密、散列函數。Round robin would distribute connection attempts evenly among the channels, while hashing would use the client s ip address to determine the destination channel
輪流調度方式會將連接嘗試均勻地分佈到各個通道上,而散列方法則使用客戶機的ip地址來確定目標通道。In this paper, we provide a summary of all the possible topologies of data grid replica location mechanisms based on the research status of related activities, and design a new kind named distributed replica information index location mechanism ( dilm ), which is based on the topology of improved ring and integrates four techniques : overlay network, bloom filter, soft - state protocol and md5
本文介紹了數據格網復制定位研究的現狀,總結了數據格網復制定位可能的拓撲結構種類,提出了一種新的數據格網復制定位機制? ?分散式復制索引定位機制dilm 。 dilm基於改進環型拓撲結構,包含以下4種技術:重疊網路技術、 bloomfilter壓縮技術、軟狀態協議和md5散列演算法。This method eliminates the clustering problem in linear rehashing by picking the integer pii in a pseudorandom fashion
這種方法是按偽隨機方式去挑選整數pii ,它能消除線性再散列中所產生的堆聚問題。Considering the defects of typical algorithm for mining frequent itemsets, this dissertation puts forward hy algorithm which is designed to mine association rules and based on the hash technique and the optimized transaction reduction technique
針對經典頻繁項集挖掘演算法的不足,提出了進行關聯規則數據挖掘的基於散列技術和優化的事務壓縮技術的hy演算法。The paper propose a new means to mine multidimensional association rules based on multidimensional frequent items set by two steps. firstly we obtain inter - dimension association rules by combining data cube technique with apriori method efficiently
本文中對基於多維的頻繁項集的演算法進行了探索和演算法優化,尤其是通過採用了維搜索和散列的技術方法而使得系統的挖掘性能大大提高。The algorithm works by performing a series of transformations on the password and
這個演算法使用兩個md5散列值對密碼和The situation where two different texts return the same hash value from the same algorithm
兩個不同文本從同一演算法中返回相同散列值的情況。This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform
該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data
在此基礎上,本文設計了網路通信數據加密系統,該系統將對稱加密演算法3des與非對稱加密演算法rsa相結合對數據加密,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加密、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別性、完整性及不可否認性。The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time
保密散列數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排列碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。Namespace provides cryptographic services, including secure encoding and decoding of data, as well as many other operations, such as hashing, random number generation, and message authentication
System . security . cryptography命名空間system . security . cryptography命名空間提供加密服務,包括安全的數據編碼和解碼,以及許多其他操作,例如散列法、隨機數字生成和消息身份驗證。分享友人