hashing的例句
- 1. The House and Senate are to begin soon hashing out an agreement for sanctions legislation.
- 参众两院很快将通过充分讨论就制裁立法达成一项协议。
《柯林斯英汉双解大词典》
- 2. No defined hashing operations.
- 无定义的散列操作。
youdao
- 3. Integrity is provided by hashing the messages.
- 通过将消息进行哈希处理提供完整性。
youdao
- 4. This mode adds “distribution” based on consistent hashing.
- 该模式增加了“分布式”特性,这是一种基于哈希一致性的技术。
youdao
- 5. The MD5 algorithm is the DE facto hashing standard for digests.
- MD 5算法是事实上的标准摘要哈希算法。
youdao
- 6. Shiro addresses these issues in a clean and intuitive hashing API.
- Shiro用一种干净而直观的哈希API解决了上述问题。
youdao
- 7. Instead, use a one-way hashing algorithm to prevent password extraction.
- 取而代之的是,使用一种单向散列算法来避免密码被提取。
youdao
- 8. Signature: The policy signed with a hashing algorithm and base 64 encoded.
- signature:采用哈希算法签名并采用base 64编码的策略。
youdao
- 9. Hashing allows client connect attempts to always be routed to the same server.
- 散列方式允许客户机连接尝试永远被路由到相同的服务器。
youdao
- 10. PHP's built-in crypt function implements one-way encryption or one-way hashing.
- PHP的内置crypt功能可实现单向加密或单向散列。
youdao
- 11. The underlying provider will take care of all necessary password hashing or decryption.
- 底层的提供者会处理好必要的密码散列或解密。
youdao
- 12. A number of software vendors and committees have been hashing them out for several years.
- 一些软件供应商和委员会已经对此讨论多年。
youdao
- 13. You can see how much Shiro simplifies hashing and encoding, saving you a bit of sanity in the process.
- 你可以看到Shiro对哈希和编码简化了不少,挽救了你处理在这类问题上所消耗的脑细胞。
youdao
- 14. If, after hashing the password, the server can log the user in, a successful bind is reported back to PAM.
- 在对密码进行散列操作之后,如果服务器可以让用户登录,就会向PAM报告说已经成功进行了绑定。
youdao
- 15. Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
- 选择在IPSec隧道中加密数据所用的加密算法和散列算法。
youdao
- 16. Perfecting hashing is difficult and to deal with that hashtable implementations support collision resolution.
- 要写出一个完美的哈希函数是很困难的,特别是要处理哈希表中的冲突。
youdao
- 17. Since MD5 hashing has been broken, the client wisely stipulated that all keys must be signed using SHA-1 instead.
- 由于MD5 散列法已经被破坏,客户明智地规定,所有密匙必须使用 SHA-1 签名。
youdao
- 18. So, all this language is produced because you can't ever get to that last thing; you have to keep hashing it over.
- 所以,这一切语言就产生了,因为你永远没法知道最后那点,你必须一直详细讨论它。
youdao
- 19. In addition to the standard hashing relationship, there is now a linked list that traverses through the collection.
- 除标准的散列关系之外,现在还有一个可遍历整个集合的链表。
youdao
- 20. For example, let's consider the relatively common case of MD5-hashing a file and determining the hex value of that hash.
- 打个比方,考虑比较常见的情况,使用MD 5哈希一个文件,并确定该哈希的十六进制值。
youdao
- 21. What Lewin and Leighton invented was a mathematical scheme called "consistent hashing" that radically sped up the process.
- 列文和莱顿发明的是一种被称作“一致性哈希”的数学规划,这可以从根本上提高进程的速度。
youdao
- 22. At all points in between, the message is protected, either for integrity (using hashing) or for privacy (using encryption).
- 在消息生成和消息使用之间的所有时点上,消息都受到保护,不管是为了完整性(使用散列表)还是为了私密性(使用加密)。
youdao
- 23. The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095.
- 散列算法应用于分区键的值,产生 0 到 4095之间的一个分区号。
youdao
- 24. The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).
- 类型属性指出了hash算法,例如消息摘要算法5 (MD5)或安全哈希算法(SHA - 1)。
youdao
- 25. With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.
- 通过组合使用不同的密钥长度和散列算法,IBMNAS提供表1所示的加密类型。
youdao
- 26. ASP.NET 2.0 includes a number of features which should simplify the hashing of passwords and the encryption of connection strings.
- NET 2.0包括应该简化密码哈希和连接字符串加密的许多功能。
youdao
- 27. Windows-based computers utilize two methods for the hashing of user passwords, both having drastically different security implications.
- 运行Windows的计算机使用两种方法对用户密码创建哈希,这两种方法在本质上有着不同的安全意义。
youdao
- 28. Windows-based computers utilize two methods for the hashing of user passwords, both having drastically different security implications.
- 运行Windows的计算机使用两种方法对用户密码创建哈希,这两种方法在本质上有着不同的安全意义。
youdao