查电话号码 繁體版 English Francais日本語ไทย
登录 注册

cryptography algorithm造句

"cryptography algorithm"是什么意思  
造句与例句手机版
  • Mapping object identifiers to cryptography algorithms
    >将对象标识符映射到加密算法
  • Ibm s report of their new cryptography algorithm
    ibm关于其新密码术算法的报告
  • This is the primary differentiating factor amongst the cryptography algorithms
    这是区分加密算法的根本。
  • Describes how to map an object identifier to a cryptography algorithm
    描述如何将对象标识符映射到加密算法。
  • Research on cryptography algorithms
    密码算法研究
  • Create an object that implements a particular cryptography algorithm by calling the
    方法,创建实现特定加密算法的对象。
  • Operator . create an object that implements a particular cryptography algorithm by calling the
    方法,创建实现特定加密算法的对象。
  • Defines whether the cryptography algorithm is symmetric, asymmetric, or a message digest
    定义加加密算法是对称的、非对称的还是消息摘要。
  • We recommend using your favorite public key cryptography algorithm for digital signatures
    我们推荐您将自己喜欢的公钥密码学演算法用于数位签章。
  • Describes elements that map friendly algorithm names to classes that implement cryptography algorithms
    描述将友好算法名映射到实现密码算法的类的元素。
  • It's difficult to see cryptography algorithm in a sentence. 用cryptography algorithm造句挺难的
  • Describes how to map an algorithm name to a cryptography class and an object identifier to a cryptography algorithm
    描述如何将算法名称映射到加密类,以及如何将对象标识符映射到加密算法。
  • In encryption and digital signatures, everything ultimately boils down to the cryptography algorithms used to generate keys
    在加密和数字签名中,所有的事情都最终归结为生成密钥的加密算法。
  • The cryptography settings schema contains elements that specify how to map friendly algorithm names to classes that implement cryptography algorithms
    密码设置架构中包含的元素指定如何将友好算法名称映射到实现加密算法的类。
  • Based on user management, kinds of cryptography algorithms and protocols, an integrated and applied realization of security service is proposed . the principal parts of the scheme include
    这一系统的主要任务是理解图纸中的字符、导线、元器件符号和它们的相互关系,最终实现元器件汇总和图纸清书。
  • The platform ofsecure application based on b / s structure emerges as the times require . it has three main part : security agent client ( sac ), security proxy server ( sps ) and certificate authority server ( cas ) . security socket layer ( ssl ) protocol is extended between tcp / ip and http to form a security channel to make those three parts be a full and rigorous security system . in addition, many cryptography algorithms are applied in the system to protect web application
    基于bs架构的应用安全平台应运而生,它包括安全代理客户端(sac,securityagentclient)、安全代理服务器(sps,securityproxyserver)、ca服务器(cas,certificateauthorityserver)三个组成部分,在传统的tcpip协议和http协议之间通过扩展ssl(securitysocketlayer)协议形成了一条安全通道,组成了一个完整的、严密的安全体系,并采用密码学中的多种方法,保护web应用安全。
  • The paper first introduces related knowledge about the platform ofsecure application based on b / s structure which includes protocols and cryptography algorithms; secondly, introduces the function of components of the platform and how to implement them, particularly of the section that author developed ( htttp interface module, digitalsign module, sac main module and log module ) . in that section, the author describes how to use cryptography algorithms and application protocols to make the message carried by application protocols are absolutely security; and how to use ssl protocol to build a security channel between sac and sps
    其次介绍了平台组成部分的功能及具体实现,着重介绍了作者所开发的模块(包括http接口模块、数字签名模块、安全代理客户端主模块和日志模块),其中详细描述了如何将密码学算法与应用协议相结合,使得在应用协议中所传输的信息是绝对安全的;如何利用ssl协议在安全代理客户端和安全代理服务器间建立安全通道。
  • The paper first introduces related knowledge about the platform ofsecure application based on b / s structure which includes protocols and cryptography algorithms; secondly, introduces the function of components of the platform and how to implement them, particularly of the section that author developed ( htttp interface module, digitalsign module, sac main module and log module ) . in that section, the author describes how to use cryptography algorithms and application protocols to make the message carried by application protocols are absolutely security; and how to use ssl protocol to build a security channel between sac and sps
    其次介绍了平台组成部分的功能及具体实现,着重介绍了作者所开发的模块(包括http接口模块、数字签名模块、安全代理客户端主模块和日志模块),其中详细描述了如何将密码学算法与应用协议相结合,使得在应用协议中所传输的信息是绝对安全的;如何利用ssl协议在安全代理客户端和安全代理服务器间建立安全通道。
  • Many develops have released secure products based on ssl, but most of them adopt weak cryptography algorithms and ca n't satisfy the indeeds of information security in our country . to satisfy the demands of the e-governmental affair, e-commerce and the army " s information construction, we developed a ssl security proxy based on high-strength ssl
    针对电子政务、电子商务和军队信息化建设的安全需要,本文作者在研究ssl协议的基础上,并参考当前较为成功的ssl实现的技术方案,开发了能够充分保证web通信安全的高强度ssl安全代理(以下称ssl安全代理)。
如何用cryptography algorithm造句,用cryptography algorithm造句cryptography algorithm in a sentence, 用cryptography algorithm造句和cryptography algorithm的例句由查查汉语词典提供,版权所有违者必究。