您要查找的是不是:
- isometric cryptogram 同构密报
- A government uses a cryptogram or secret code. 政府使用密码或暗号。
- A line connecting isometric points. 等距线连结等距各点的线
- Isometric weight bearing exercises. 等积负重练习。
- Battle is conducted in real-time from an isometric viewpoint. 实时战斗进行从等距的观点。
- Isometric exercises also strengthen muscles supporting the foot. 等量的练习还能加强腿部肌肉。
- The computer generates isometric drawings and prints out bill of materials. 计算机绘出管道空视图,并打印出材料明细表。
- The weld nugget had a dynamic recrystallized,fine isometric crystal structure. 其中,焊核为明显的再结晶等轴晶粒,晶粒明显细化;
- Beamforming in strong jamming based on isometric line array is proposed. 提出强干扰条件下等距线阵的波束形成方法。
- And the corresponding isometric extension theorem is an immediate consequence. 作为简单推论证明了相关的等距延拓定理。
- Strand space model is a new formal analysis tool to the analysis of cryptogram protocol. 串空间模型是一种新兴的密码协议形式化分析工具。
- Communication manager, which is established in the connection of TCP by cryptogram, can transmit. 此系统可以分布在网络中任意数目的主机上。
- In this thesis, the basic concepts of cryptogram including number theory and modular arithmetic are introduced. 本文介绍了密码学的基本概念,包括数论的基础知识和模运算的概念。
- Cipher Card is a hardware module based on bus interface of computer and offering cryptogram service function. 加密卡是基于计算机总线接口的、提供密码服务功能的硬件模块。
- Lastly, the mixed cryptogram arithmetic was implemented and applied into the application of email encryption. 最后,实现了混合加密算法,并将其应用于加密发送电子邮件中。
- Below an isometric view of the scheme showing the timber cladding to the risers and the upgraded glazing complete with atrium entrance space. 下图方案的一个轴侧图展示了木材敷设到热烟囱上;以及加强玻璃整合了中庭和入口.
- This paper has expounded on several typical cryptogram algorithms, and analyzed and summed up the implementation procedure of the cryptogram algorithms based on C-Language. 摘要阐述了几种典型的密码算法及其应用,分析总结了密码算法的C语言实现过程。
- RSA algorithm is an influential public-key encrypt algorithm at present,which can resist almost all cryptogram attack as yet. RSA算法是目前较有影响的公钥加密算法,它能够抵抗目前已知的大部分密码攻击。
- The phonetic signal encryption is implemented through the computer simulation, and two kinds of keys are used for decryption of the cryptogram. 通过计算机仿真,实现了语音信号的加密工作,对密文用两种解密钥进行解密。
- The Work Flow shapes have a new isometric 3-D style to make your diagrams look better than ever. 工作流形状具有全新的等角三维样式,使图表外观更佳。