hash hash
-
Hash A hash code for the downloaded binary to verify its integrity .
hash用于校验下载的二进制文件完整性的hash码。
-
Multicast source authentication scheme based on hash chain and hash tree
基于树链结合的自适应组播源认证方案
-
Some ideas come from Hash table and Hash tree , the method for the query data is improved ;
借鉴Hash表和Hask树的一些基本思想,对数据查询的方法进行了改进;
-
Unlike hash keys , hash values are not guaranteed to be unique .
与哈希表中的键不通,哈希表中的值没有唯一性。
-
For example , work files could be used to store temporary results for hash joins and hash aggregates .
例如,工作文件可用于存储哈希联接和哈希聚合的临时结果。
-
You can solve this problem by using String . intern () or maintaining a user hash set or hash map .
您可以通过使用String.intern()或维护一个用户散列集合或散列映射来解决这个问题。
-
Recently , with the breakthrough of the analysis of hash function , hash function design and analysis of the filed of information security has become a hot issue .
近年来随着对杂凑函数破解的突破性进展,杂凑函数的设计与安全性分析成为密码学领域研究的热点。
-
First decompiling protection software , secondly to statistical software instructions , characteristics of statistical results and the watermarking value hash transform , hash value as the characteristic of the software to distinguish with other software .
反编译要保护的软件,并对软件中指令进行统计,将统计结果与水印特征值进行散列变换,使得到的散列值作为该软件区分与其他软件的特征。
-
Additionally , a more reliable scheme on hash value called multi-ply hash value is proposed and applied into the solution above .
另外,文中还提出了一种更安全的散列值计算方式&多重散列值,并将它应用于上述方案之中。
-
After feature extracted , use image hash or image perceptual hash to generate image hash , and use Hamming distance to measure image similarity .
提取特征后,可以结合图像哈希以及图像感知哈希技术生成图像哈希,使用汉明距离进行图像的相似性度量。
-
During binary loading , the TE sub system is called by the system loader , which calculates the hash using the SHA-256 hash algorithm .
在二进制加载期间,系统加载程序调用TE子系统,并使用SHA-256散列算法来计算散列值。
-
And put forward video copy detection algorithm based on visual attention . They study the application of visual attention model and its analysis in video hash formation and video hash weighted .
引入人类视觉关注模型,提出了基于视觉关注的视频拷贝检测算法,分别研究了视觉关注模型的应用以及其在视频哈希形成以及视频哈希加权上的分析。
-
That 's why you should never rely on hashes alone & always add some salt to your hash so the resulting hash values are unique .
这就是为什么你无论何时都不该仅仅依赖hash&永远给hash加些salt以获得独一无二的hash结果值。
-
A star join plan utilizing push-down hash join technology makes hash joins more effective primarily due to reduction of fact table ( probe table ) rows early on .
利用下推连接技术的星型连接计划使得散列连接更加有效的主要原因是,在初期减少了事实表(探测表)的行数。
-
In order to improve the performance of Hash function , a new Hash function based on AES is constructed . The length of the Hash result of the Hash function is 256 bits , it can resist thoroughly attack .
为了提高Hash函数性能,文章构造了一种新的基于AES的哈希函数,该哈希函数散列结果的长度为256比特,可以很好的防御穷举攻击。
-
In accordance with the way to construct a compression function , hash function is divided into two categories ; they are special design hash function and block-cipher-based hash function .
根据构造压缩函数方法的不同,哈希函数可以分为直接构造的哈希函数和基于分组密码的哈希函数。