词语站>英语词典>cryptogram翻译和用法

cryptogram

n.  密码(电)文;暗号

复数:cryptograms 

COCA.38785

英英释义

noun

双语例句

  • This text has discussed that the digital watermark anti-counterfeit of the products is designed, the means studied with the cryptogram, analyses and proved each link that is designed, and put forward author's unique opinion.
    文章讨论了产品的数字水印防伪设计,运用密码学的手段,对设计的各个环节进行了分析和论证,提出了作者独特的见解。
  • The design of the system also uses the technology of information network security and the theory of the cryptogram.
    同时,系统在设计上充分利用了信息网络安全技术以及密码理论。
  • Why wouldn't Saknussemm have hidden an incredible invention behind this confusing cryptogram?
    为什么萨克努姗不能把不可思议的发现隐藏在打乱的密码里呢?
  • The phonetic signal encryption is implemented through the computer simulation, and two kinds of keys are used for decryption of the cryptogram.
    通过计算机仿真,实现了语音信号的加密工作,对密文用两种解密钥进行解密。
  • In the scroll stochastic synchronous jump code way to recognize cryptogram and possess the characteristic, cryptogram cannot be decoded and a key used for multi-lock.
    采用滚动式随机同步跳码方式进行密码识别,具有密码不可破解和一钥多锁等特点,彻底杜绝了丢油事件的发生。
  • This paper summarizes the development and applications of information security technologies, especially the cryptogram technology.
    文章综述信息安全技术,特别是密码技术的发展与应用。
  • High performance cryptogram server provides a safe, highly effective platform of cryptogram programming of information.
    高性能密码服务器提供了一个安全、高效的信息密码化平台。
  • The model of USB Security Key was developed, and each part of the model was studied and analyzed. A conclusion was drawn that the most important thing in designing USB Security Key was the establishment of cryptogram protocol and the selection of cryptogram method.
    在此基础上,构建了USB安全钥的系统模型,并对此模型的各部分进行了分析和研究,建立了USB安全钥中最重要的密码协议,选择了适用的密码方法。
  • According to its feature, we can design some cryptogram algorithms which are adapted to many kinds of network.
    根据其性质可以设计出适用于各种网络的密码算法。
  • Software and data's safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique.
    软件及数据的保护措施应加强密码校验、权限控制、图形码技术和数据加密技术。