as.asymmetric造句
例句与造句
- Gsi has been traditionally based upon public key encryption also known as asymmetric key encryption for all its functionalities
- Public key cryptography is also known as asymmetric cryptography , which is different from symmetric cryptography described in last month s column
- Provides an introduction to key concepts in cryptography , such as asymmetric cryptography , symmetric cryptography , digital signatures , and cryptographic hashes
- Public - key cryptographic algorithms are also known as asymmetric algorithms because one key is required to encrypt data while another is required to decrypt data
- Great deal of substandard behavior still exists in the individual housing credit market , hence the behavior standarding amongst banks and individuals , the bounded rationality players , can be seen as asymmetric evolution game
- It's difficult to find as.asymmetric in a sentence. 用as.asymmetric造句挺难的
- Under a unified model of carrier transport over trap state established potential barrier at drain side , device degradation behavior such as asymmetric on - current recovery and threshold voltage degradation can be understood
- In public key cryptography , also known as asymmetric key cryptography , the process of encryption and decryption involves two keys : a " public " key used to encrypt data and a " private " key used to decrypt data
- Broadband access technologies such as asymmetric digital subscriber line adsl , fibre to the building fttb , local multipoint distribution service lmds , asynchronous transfer mode and cable modem are becoming more popular in hong kong
- Broadband access technologies such as asymmetric digital subscriber line ( adsl ) , fibre to the building ( fttb ) , local multipoint distribution service ( lmds ) , asynchronous transfer mode ( atm ) and cable modem are becoming more popular in hong kong