プロの翻訳者、企業、ウェブページから自由に利用できる翻訳レポジトリまで。
not all algorithms supported in mhash can be used in hmac mode.
mhash() applies a hash function specified by hash to the data and returns the resulting hash (also called digest). if the key is specified it will return the resulting hmac. hmac is keyed hashing for message authentication, or simply a message digest that depends on the specified key. not all algorithms supported in mhash can be used in hmac mode. in case of an error returns false.
最終更新: 2011-10-24
使用頻度: 1
品質:
there are several authentication algorithms used for 802.1x. some examples are;
무선 lan에 대한 802.1x 인증은 다음 세 가지 요소로 구성됩니다.
最終更新: 2007-01-16
使用頻度: 1
品質:
802.11a and 802.11b operate in different radio frequencies and use different transmission algorithms.
802.11a와 802.11b는 다른 라디오 주파수에서 작동하며 다른 전송 알고리즘을 사용합니다.
最終更新: 1970-01-01
使用頻度: 1
品質:
see natsort() for an example of the difference between this algorithm and the regular computer string sorting algorithms.
natcasesort() is a case insensitive version of natsort(). see natsort() for an example of the difference between this algorithm and the regular computer string sorting algorithms.
最終更新: 2011-10-24
使用頻度: 1
品質:
<PROTECTED> and <PROTECTED> algorithms include enhancements to the <PROTECTED> protocol that mitigate existing network attacks and address its shortcomings
<PROTECTED> 및 <PROTECTED> 알고리즘에는 기존의 네트워크 공격을 완화하고 취약점을 알려주도록 개선된 <PROTECTED> 프로토콜이 포함됩니다.
最終更新: 2007-01-16
使用頻度: 1
品質:
警告:見えない HTML フォーマットが含まれています
it is described in ["practical algorithms for programmers", binstock rex, addison wesley, 1995].
메타폰은 lawrence philips lphilips@verity.com 에 의해 개발되었다. 이는 ["practical algorithms for programmers", binstock rex, addison wesley, 1995]에 서술되어 있다.
最終更新: 2011-10-24
使用頻度: 1
品質:
警告:見えない HTML フォーマットが含まれています
mcrypt_list_algorithms() is used to get an array of all supported algorithms in the lib_dir parameter.
mcrypt_list_algorithms() is used to get an array of all supported algorithms in the
最終更新: 2011-10-24
使用頻度: 1
品質: