解密機 的英文怎麼說

中文拼音 [jiě]
解密機 英文
decoder
  • : 解動詞(解送) send under guard
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : machineengine
  • 解密 : deciphering
  1. Members of the us congress are also refusing to comment on the contents of the classified document

    美國國會的成員也同樣拒絕文件的內容。
  2. " the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond

    Raymond說: 「公開您的方法將導致更好的安全性這個明顯矛盾的觀點並非計算軟體所獨有,軍事和外交上的者知道這個觀點已有一百年了:依賴編碼方法的保性而不依賴鑰的保性是非常愚蠢的。 」
  3. Based on the fact project that the development of the self - help bank " s fontal - machine system of beijing lianyintong company, this paper introduces the centralization and the network of the fontal machine ; designs the software systematical framework of fontal - machine system and functional model ; analysizes the fontal machine system " s safe strategy, the framework of encryption / decryption and its net framework

    本論文結合實際課題? ?北京聯銀通自助銀行前置系統開發,介紹了大集中數據中心建設,前置系統拓撲:設計了前置系統的軟體體系結構,功能模塊:分析了前置系統的安全策略,加體系結構及其網路架構。
  4. In chapter five, the research work focus on color gamut transform correction in panel display. a method of color gamut transform correction which introduces the concept of virtual gamut space is presented to solve the problem of luminance and chromic disuniformity which arises from the differentia of chromic and drive characteristics of each module or pix on the same display panel. and the high quality of image displayed on the panel is ensured

    提出了克服同一種平板顯示屏由於各個顯示模塊(顯示象素)的色度空間特性和中國科學院長春光學精械與物理研究所博十學位論文基十擬合逼近理論的平板圖像顯示技術研究基色驅動顯示特性的差異而造成的平板顯示屏色度和亮度分佈不均的有效方法,決了平板顯示屏的全屏幕亮度、色度一致化的問題,保證了高質量視頻圖像的顯示。
  5. At first, double random phase encoding techniques are looked back and its improved methods are introduced in detail. in connection with characteristics of spherical wave gene and function of phase mask, one random phase encoding techniques are proposed with spherical wave based on 4f system

    本文首先對雙隨相位加技術進行了回顧,並對它的一些改進方案的特點作了詳細介紹,並在此基礎上,根據球面波相位因子的特點和相位掩模在加中作用,提出了一種利用球面波照射4f系統的單隨相位編碼加的新方法。
  6. And the appellate body itself is also a characteristic. the report of the applellate body is final and authoritive, the working procedures for applellate review requires that the working process be timely and secretely

    在分析了wto爭端制的特點后,筆者認為上訴程序也有自己獨特的特點,即終局性、權威性、時限性和保性。
  7. Pcb copies board pcb to design pcb layout chip is deciphered the bom detailed manufacture schematic diagram instead to push the prototypical debugging processing end product quantity to producecircuit - tech electronic

    Pcb抄板pcb設計pcb layout晶元bom清單製作原理圖反推樣調試加工成品量產深科特電子
  8. Shenzhen circuit - tech electronic co., ltdpcb copies board pcb to design pcb layout chip is deciphered the bom detailed manufacture schematic diagram instead to push the prototypical debugging processing end product quantity to produce

    深圳市深科特電子技術有限公司pcb抄板pcb設計pcb layout晶元bom清單製作原理圖反推樣調試加工成品量產
  9. The settlement of the dispute mechanism relates to the existence or death of wto system, therefore it plays very and important position in wto. on the research of the trend of dsm, judicialization, from power - oriented diplomatic to rule - oriented legal methods, the process of appeal examination and the promissory time table ensure the function of the mechanism. the legal basis of dsm is related to a series of rules based on gatt and wto, but the most important connection is art. 23 of gatt

    Wto爭端決的運行基礎是產生於gatt以及wto下一系列的規則和條款,而其中與爭端切相關的就是gatt的第22 、 23條,基於第23條(利益的喪失和損害) ,根據對提起申訴的案件類型,本文將其劃分為三大類: 「違反之訴」 、 「非違反之訴」 、 「情勢之訴」 。
  10. Conditional access technology ( pay - tv ) has been considered the motivity and trend of the development of digital television ( dtv ) in the globe. but in the common pay - tv system, the key which is used for decoding is stored in the set - top - box ( stb )

    在全球范圍內,有條件接收(付費電視)業務已被確認是數字電視發展的動力和趨勢,但是,在通常的付費電視系統中,用戶的模塊均被置於頂盒中,系統安全性較低。
  11. According to russian files whose codes had been undone, and starting with analyzing the thought of wutinkang and baoluotin, we can draw the conclusion : " shanghai negotiation " wasn ' t the error of opportunism

    依據俄方檔案,從分析吳廷康、鮑羅廷的思想入手,可以得出結論: 「上海談判」並不是會主義的錯誤。
  12. Dsm roots itself in deep juristic soil whose key document is the understanding on rules and procedures governing the settlement of dispute of the uruguay round ( dsu )

    爭端制與嚴謹的法律基礎切相關,而爭端制的核心文件和主要依據就是烏拉圭回合《關于爭端決程序與規則的諒》 。
  13. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加制的研究,首先介紹了數字集群通信系統的安全保制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其鑰的選用和管理,特別介紹了端到端加;然後介紹了幾種常用的加演算法,通過分析其優劣,提出了端到端加決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加方案的設計,其具體過程為將經過數字信號送入加器里,和以idea加演算法為基礎設計的碼流發生器( ksg )產生的碼序列進行加運算,並且研究了此加過程的碼同步問題。
  14. However, any such agreement the immediate public disclosure of which would, in the opinion of the president, be prejudicial to the national security of the united states shall not be so transmitted to the congress but shall be transmitted to the committee on foreign relations of the senate and the committee on foreign affairs of the house of representatives under an appropriate injunction of secrecy to be removed only upon due notice from the president

    國務卿應將該協會為其中一造的任何協定內容全文送交國會。但是,如果總統認為立即公開透露協定內容會危及美國的國家安全,則此種協定不應送交國會,而應在適當的保命令下,送交參院及眾院的外交委員會,僅于總統發出適當通知時才得
  15. It is responsible for deciphering class files and uploading into java virtual machine ; class verifier is used to the correct internal structure ; security manager is used to customize the access strategy and permission ; and ssl guarantees the data security during transmission. though modeling and testing a prototype system, experiment proved the correctness and efficiency of above design

    類裝載器是java安全體系的第一道防線,它負責將類后裝入java虛擬; class文件檢驗器保證裝載的class文件有正確的內部結構;安全管理器主要用於定製用戶對系統的訪問策略和訪問權限;安全套接字用來保證web傳輸安全。
  16. It discusses about the safe serial communication about long nc programs between the embedded terminal and the cnc machine tool, which is realized by adopting the way of dnc communication. after analyzing characteristics about some kinds of data encryption algorithm, the rijndael encryption is selected to realize cooperative product data ’ s storage in the server and transmission in internet on encryption manner

    在分析各種數據加演算法的特點后,選用了rijndael加演算法,實現了外協產品數據在服務器上加存儲、在網路上加傳輸和在終端上被,並在終端與數控床之間以dnc通訊方式實現長nc程序安全傳輸。
  17. Attackers know that the simplest way to break into a computer system is not to " crack " passwords or access codes

    攻擊者知道,侵入計算系統的最簡單的方式不是「破碼或訪問碼。
  18. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨數的生成、採用整除小素數和勒曼測試法判定素數,可以生成三種不同長度的鑰對( 256位、 512位、 1024位)來滿足不同的加安全等級的需求;加模塊中,選用了二進制序列的乘法方法,實現了大數模冪乘運算;模塊中,引用了擴展的歐幾里德法求逆元,並採用中國剩餘定理實現過程,大大提高了速度。
  19. Sets the private key to use for decrypting the secret information

    Rsaoaepkeyexchangedeformatter . setkey方法設置用於解密機信息的私鑰。
  20. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作制; 3研究了當前常用的各種數據加解密機制以及碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌碼的文獻資料,了目前混沌碼的研究動態和成果,研究混沌碼體制的工作理,然後利用vc + + 6 . 0作為開發平臺對一類混沌碼體制進行了實現,並為它編寫測試代碼評估其性能。
分享友人