Logon Password for Windows XP
Windows XP的登录 密码
The LCD Module OCMJ4×16A and its Application in the Intelligent Instrument of Detecting Password
Dynamic password attestation project based on Contivity VPN
基于Contivity VPN动态 密码认证方案
On the basis, embedded in the operation system μC/OSⅡ,by writing the password to the E 2PROM,the application and developing technology of I 2C Bus in 32 b embedded system are analyzed.
The Root's Password and Security in Redhat Linux9
Redhat Linux9超级用户 密码与安全
The Design of an Advanced Secret Code Lock Based on PIC16C57
The designe of the electronic code lock with AT89C51 and EEROM
Code Design of Visual Foxpro6.0 Programming
Visual Foxpro6.0 密码设计方法
The results of analysis on 16 samples of rice showed the presence of positive correlation between the needed amino-acid content and the number of genetic code in the protein(r=0.9858,t=10.0458>t_(0.01)=5.841).
16个水稻材料的分析结果表明,蛋白质中必需氨基酸的含量和遗传 密码数目呈正相关关系(r=0.9858,t=10.0458>t_(0.01)=5.841)。 色氨酸,蛋氨酸+胱氨酸和赖氨酸在水稻蛋白质中是限制性氨基酸。
DEVELOPING ON THE ELECTRONIC CODE LOCK WITH PIC16C57 MICROPROCESSOR
Implementation of NTRU Cryptography Algorithm Based on J2ME
The Contrast Analysis of Two Kinds of Cryptography Middleware Module PKCS#11 and CSP
Signal Processing System for Quantum Cryptography
DNA Computation and DNA Cryptography
Bi symmetrical cryptography BSC(2 m,2 n)
双对称 密码 BSC(2~m,2~n)算法设计与实现
The Design of Electronic Cipher Lock with AT89C2051
Design of the Network Cipher Machine Based on SafeXcel-1141
On Principle of PIC16C54 Chip and Its Programming Technique in Design of Electron Cipher Lock
The size of the AES/DES cipher module based on RC-S is 81%and113% of the AES and DES cipher chip respectively,and the performance is 79%and94% of the AES/DES cipher chip respectively.
Cipher card based on multi-thread 3DES algorithm is designed. The kernel of hardware is EP1S20F672C7.PLX9054 is used as the bridge chip of data exchange between cipher card and host PC.
以EP1S20F672C7为核心,利用PLX9054作为 密码卡与主机交换数据的接口芯片,采用多个硬件线程并行处理实现3DES算法,设计了3DES 密码卡。
我想查看译文中含有： 查询“密码”译词为用户自定义的双语例句 的双语例句
After giving a password, an experiment may be controlled via the Internet.
The subject line of the electronic letter can be used as a password.
A new strong- password authentication scheme using one-way hash functions
showed that the protocol is insecure and proposed an optimal strong- password authentication protocol called the OSPA protocol.
In this paper, we propose a new strong- password authentication protocol that not only can withstand many possible attacks including a stolen-verifier attack, but that is also more efficient than the modified OSPA protocol.
We introduce and prove for the first time characterization theorems of the segment code order of digital lines and curves.
In a special case, a perfect authentication code with arbitration is obtained.
In a special case a perfect authentication code with arbitration is obtained.
The trace representation of the dual of quaternary Goethals code G(m) is given.
It is proved that the shortened code of G(m) is cyclic and its generators are shown.
The rapid development of quantum cryptography may put an end to the history of eavesdropping.
In this paper, we report on our research works on single-photon control for quantum cryptography, ranging from single-photon generation to single-photon detection and their applications.
Advances in cryptography and information security-introduction of 2002-2006 progress of SKLOIS
The notion of distance on strings is important in the problem of inductive learning related to artificial intelligence, in cryptography, and in some other fields of mathematics.
Key Secrecy in a Quantum Cryptography System Based on Error-Correcting Codes
Application of this structure to block cipher designs brings out the provable security against linear attack with the upper bounds of probabilities.
Structure of frequency hopping sequences family based on block cipher
A novel family of frequency-hopping (FH) sequences based on iterated block cipher is proposed for frequencyhopping multiple-access (FHMA) communications.
In this paper, we analyze the security of a new stream cipher-COSvd(2, 128).
Besides, there are also many security flaws in other parts of the cipher.