hashing的例句

1. The House and Senate are to begin soon hashing out an agreement for sanctions legislation.
参众两院很快将通过充分讨论就制裁立法达成一项协议。

《柯林斯英汉双解大词典》

2. No defined hashing operations.
无定义的散列操作。

youdao

3. Integrity is provided by hashing the messages.
通过将消息进行哈希处理提供完整性。

youdao

4. This mode adds “distribution” based on consistent hashing.
该模式增加了“分布式”特性,这是一种基于哈希一致性的技术。

youdao

5. The MD5 algorithm is the DE facto hashing standard for digests.
MD 5算法是事实上的标准摘要哈希算法。

youdao

6. Shiro addresses these issues in a clean and intuitive hashing API.
Shiro用一种干净而直观的哈希API解决了上述问题。

youdao

7. Instead, use a one-way hashing algorithm to prevent password extraction.
取而代之的是,使用一种单向散列算法来避免密码被提取。

youdao

8. Signature: The policy signed with a hashing algorithm and base 64 encoded.
signature:采用哈希算法签名并采用base 64编码的策略。

youdao

9. Hashing allows client connect attempts to always be routed to the same server.
散列方式允许客户机连接尝试永远被路由到相同的服务器。

youdao

10. PHP's built-in crypt function implements one-way encryption or one-way hashing.
PHP的内置crypt功能可实现单向加密或单向散列。

youdao

11. The underlying provider will take care of all necessary password hashing or decryption.
底层的提供者会处理好必要的密码散列或解密。

youdao

12. A number of software vendors and committees have been hashing them out for several years.
一些软件供应商和委员会已经对此讨论多年。

youdao

13. You can see how much Shiro simplifies hashing and encoding, saving you a bit of sanity in the process.
你可以看到Shiro对哈希和编码简化了不少,挽救了你处理在这类问题上所消耗的脑细胞。

youdao

14. If, after hashing the password, the server can log the user in, a successful bind is reported back to PAM.
在对密码进行散列操作之后,如果服务器可以让用户登录,就会向PAM报告说已经成功进行了绑定。

youdao

15. Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
选择在IPSec隧道中加密数据所用的加密算法和散列算法。

youdao

16. Perfecting hashing is difficult and to deal with that hashtable implementations support collision resolution.
要写出一个完美的哈希函数是很困难的,特别是要处理哈希表中的冲突。

youdao

17. Since MD5 hashing has been broken, the client wisely stipulated that all keys must be signed using SHA-1 instead.
由于MD5 散列法已经被破坏,客户明智地规定,所有密匙必须使用 SHA-1 签名。

youdao

18. So, all this language is produced because you can't ever get to that last thing; you have to keep hashing it over.
所以,这一切语言就产生了,因为你永远没法知道最后那点,你必须一直详细讨论它。

youdao

19. In addition to the standard hashing relationship, there is now a linked list that traverses through the collection.
除标准的散列关系之外,现在还有一个可遍历整个集合的链表。

youdao

20. For example, let's consider the relatively common case of MD5-hashing a file and determining the hex value of that hash.
打个比方,考虑比较常见的情况,使用MD 5哈希一个文件,并确定该哈希的十六进制值。

youdao

21. What Lewin and Leighton invented was a mathematical scheme called "consistent hashing" that radically sped up the process.
列文和莱顿发明的是一种被称作“一致性哈希”的数学规划,这可以从根本上提高进程的速度。

youdao

22. At all points in between, the message is protected, either for integrity (using hashing) or for privacy (using encryption).
在消息生成和消息使用之间的所有时点上,消息都受到保护,不管是为了完整性(使用散列表)还是为了私密性(使用加密)。

youdao

23. The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095.
散列算法应用于分区键的值,产生 0 到 4095之间的一个分区号。

youdao

24. The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).
类型属性指出了hash算法,例如消息摘要算法5 (MD5)或安全哈希算法(SHA - 1)。

youdao

25. With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.
通过组合使用不同的密钥长度和散列算法,IBMNAS提供表1所示的加密类型。

youdao

26. ASP.NET 2.0 includes a number of features which should simplify the hashing of passwords and the encryption of connection strings.
NET 2.0包括应该简化密码哈希和连接字符串加密的许多功能。

youdao

27. Windows-based computers utilize two methods for the hashing of user passwords, both having drastically different security implications.
运行Windows的计算机使用两种方法对用户密码创建哈希,这两种方法在本质上有着不同的安全意义。

youdao

28. Windows-based computers utilize two methods for the hashing of user passwords, both having drastically different security implications.
运行Windows的计算机使用两种方法对用户密码创建哈希,这两种方法在本质上有着不同的安全意义。

youdao