您要查找的是不是:
- computationally secure cipher 计算可靠密码
- Analyses show that this scheme is a computationally secure and efficient scheme. 分析发现,该方案具有良好的安全性和执行效率。
- Analyses show the proposed scheme can be implemented easily, and is a computationally secure and perfect one. 分析表明,该方案实现简单,在计算上是安全的,并且是一个完善的方案。
- In computer security,unintelligible text or signals produced through the use of cipher systems. 计算机安全学中,通过密码系统产生的不可理解的文字或信号。参阅plaintext。
- In computer security, unintelligible text or signals produced through the use of cipher systems. 计算机安全学中,通过密码系统产生的不可理解的文字或信号。参阅plaintext。
- In computer security, an attempt to gain access to a system by posing as an authorized user. 在计算机安全学中,试图以装成一个合法用户来获取对某系统的访问权。
- In computer security, pertaining to an alarm-reporting system connected to a police station. 计算机安全学中,用于修饰或说明与警察局连接的报警系统。
- The cipher took me three weeks before I hit it. 我费了3个多星期才把这密码解释出来。
- To help keep your computer secure, you may want to create a special account for Windows users in Accounts preferences. 为了保证电脑的安全,您可能需要在“帐户”预置中为Windows用户创建一个特殊的帐户。
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- I couldn't cipher out why she was there. 我搞不清她为什么会在那儿。
- Tighter computer security control has also been implemented. 此外,本署亦已实施更严密的电脑保安。
- The most powerful tool in providing computer security is coding. 保证计算机安全最有效的工具是编码。
- In computer security, any weakness or flaw existing in a system, the susceptibility of a system to a specific threat attack or harmful event, or the opportunity available to a threat agent to mount that attack. 在计算机安全学中,存在于一个系统内的弱点或缺陷,系统对一个特定的威胁攻击或危险事件的敏感性,或进行攻击的威胁作用的可能性。
- At last they managed to puzzle out the meaning of the cipher. 最后他们终于弄清楚这符号是什么意思。
- Simply put, software is at the root of all common computer security problems. 简单地说,软体是所有常见电脑安全性问题的根源。
- We'll need to secure a bank loan. 我们需获银行贷款。
- In computer security, a computer program with an apparently or actually useful function that contains additional(hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. 在计算机安全学中,一种计算机程序,表面上或实际上有某种有用的功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。
- A climber needs secure footholds. 攀登的人脚踩的地方要很牢固。
- In computer security, a successful unauthorized access to an ADP system. 在计算机安全学中,成功地非法进入自动数据处理系统。
- 今日热词
-
- 深远海浮式风电平台 - deep-sea floating wind power platform
-
- 京雄高速公路 - Beijing-Xiongan expressway
-
- 农业及相关产业增加值 - the added value of agriculture and related industries