网站首页  词典首页

请输入您要查询的英文单词:

 

单词 rsa
释义

RSA

美 [?ɑ:r es 'e?]
英 [?ɑ:r es 'e?]
  • abbr.(英国)皇家艺术学会
  • n.兔血清白蛋白
  • 网络习惯性流产(Recurrent spontaneous abortion);反复自然流产;基础包(Rational Software Architect)
rsa
abbr.
1.
(英国)皇家艺术学会(in the UK)Royal Society of Arts

例句

释义:
1.
RSA cryptosystem, a public-key cryptosystem being used widely today, seems to have difficulty in meeting the user'need of higher security.
现在广泛使用的RSA公钥密码系统已很难满足未来人们对信息高安全性的需求。
www.fabiao.net
2.
The wireless figures reflect the huge number of new businesses in London, said Tim Pickard, vice-president of marketing at RSA.
RSA营销副总裁蒂姆?皮卡德(TimPickard)表示,无线数字反映了伦敦新企业数目之众。
www.ftchinese.com
3.
This procedure is only one of a series of steps that you must perform when deploying RSA SecurID two-factor authentication.
此过程只是在部署RSASecurID双要素身份验证时必须执行的一系列步骤之一。
technet.microsoft.com
4.
You can use the XML file as backup for the RSA key container or to import the RSA key container on a different server.
XML文件可以用作RSA密钥容器的备份,也可用于在其他服务器上导入RSA密钥容器。
msdn2.microsoft.com
5.
Response surface analysis (RSA) methodology was used for optimizing homogenate extraction processing of arctiin from Arctium lappa L.
采用响应面分析法优化牛蒡苷闪式提取的工艺条件。
124.205.222.100
6.
Russia has already concluded numerous contracts with Chile, Brazil, RSA and other countries who are ready to purchase the missiles.
俄罗斯已经与智利、巴西、南非共和国以及其他有购买意向的国家签订了一系列的订购合同。
www.bing.com
7.
These allow a LDM expressed in RDA to be transformed into a UML model within RSA for use during service analysis.
这使得RDA中表达的LDM可以转换为RSA中的UML模型,以便在服务分析期间使用。
www.ibm.com
8.
Response Surface Analysis (RSA) was applied to optimize the extraction of the total flavonoids of Semen Litchi.
利用响应面分析法优化荔枝核总黄酮提取工艺。
terms.shengwuquan.com
9.
The name of the RSA key container used to encrypt or decrypt the contents of the Web. Config file.
用于加密或解密Web.config文件内容的RSA密钥容器的名称。
msdn2.microsoft.com
10.
We named our model ni_classdiagram (The ni stands for net_import, the name of our project in RSA), as shown in Figure 5 below.
我们给我们的模型命名为ni_classdiagram(ni代表net_import,我们在RSA中项目的名字),入下面的图5所示。
www.ibm.com
1.
As one of its main appeals , RSA and DSA authentication promise the capability of establishing connections to remote systems .
就能够同远程系统建立连接,这是它的主要魅力之一。
www.bing.com
2.
One of the ways that MDD (and through that, RSA) can assist you is by helping you understand how you want your system to behave.
其中一个解决方法是让你理解你想要你的系统如何运行,此方法由MDD(并且通过RSA)帮助实现。
www.ibm.com
3.
Actually, . RSA and . PGP are other options for the extension name of a signature binary file, depending on different algorithms to be used.
实际上,还可以选择.RSA和.PGP作为二进制签名文件的扩展名,这取决于所使用的算法。
www.ibm.com
4.
The -pa option, followed by the name of the RSA key container for the default RsaProtectedConfigurationProvider.
pa选项,后面跟默认RsaProtectedConfigurationProvider的RSA密钥容器的名称。
msdn2.microsoft.com
5.
Tip: You can also use RSA to automatically look at any problems your application may have as you are coding, to help you maintain quality.
提示:当编写代码的时候,为保证质量你可以使用RSA自动检查你应用程序中的错误。
www.ibm.com
6.
To begin with, RSA's help files can assist you with the concept of reusing artifacts you may be working on.
首先,RSA的帮助文件可以帮助你了解重用你可能正在工作的工件的概念。
www.ibm.com
7.
This RSA patterns engine implementation assumes a UML model representation of the service or interface that needs to be accelerated.
此RSA模式引擎实现将使用需要进行加速的服务或接口的UML模型表示形式。
www.ibm.com
8.
The result of experiment demonstrates that SDD has better time performance and consumes less energy when using XTR than using RSA.
结果表明:使用XTR实现数字签名时的延迟小于使用RSA的延迟,消耗的能量也小于后者。
www.fabiao.net
9.
with supercomputers . By breaking the RSA public-key code, you could use the compromised key to spend money more than once.
破解了RSA的公钥密码,你就可以用密钥消费不止一次,直到银行收到数据,把你抓住。
dictsearch.appspot.com
10.
RSA_TLS encryption protects the confidentiality and integrity of network packets as they pass between the client and the server.
当网络数据包在客户端和服务器之间进行传输时,使用RSA_TLS加密可保护它们的保密性和完整性。
www.ianywhere.com
1.
The theme this year was speeding, as the RSA works towards the rollout of a safety camera network later this year.
本年会议的主题是超速驾驶,RSA今年晚些时候将会推出安全摄像系统。
www.bing.com
2.
This paper has following contributions: 1. Key generation is one of the difficult problems in RSA cryptosystem.
本文在研究过程中,有以下几点贡献:1.密钥对的生成是RSA系统设计的难点之一。
www.fabiao.net
3.
This paper highlights the discussions of the RSA algorithm and conducts detailed analysis into the coding process of such algorithm.
本论文重点讨论RSA算法的原理,对算法的加密解密过程进行了深入分析。
zhidao.baidu.com
4.
Option followed by the name of the RSA key container, to create the RSA key pair.
选项后跟RSA密钥容器的名称,用于创建RSA密钥对。
msdn2.microsoft.com
5.
It prompts you for certificate identification and file information and uses RSA or elliptic - curve encryption technology .
它向您提示证书标识和文件信息,并使用RSA或椭圆曲线加密技术。
www.bing.com
6.
Use this parameter to specify the size (in bits) of the RSA public key associated with the certificate that you are creating.
使用此参数可以指定与要创建的证书关联的RSA公钥的大小(位)。
technet.microsoft.com
7.
First countermeasures for the exponentiation computation of RSA cryptographic algorithm were summarized.
综述了rsa密码算法中模幂运算的主要攻击方法及其防御措施。
www.ceps.com.tw
8.
The locations were chosen by a positioning algorithm in RSA that tries to keep elements arranged in a visually appealing way.
位置是由试图用看上去吸引人的方式安排元素的RSA中的位置算法所选择的。
www.ibm.com
9.
The performance of RSA algorithm implementation has direct relation with the efficiency of modular multiplication implementation.
RSA算法的执行效率与模幂运算的实现效率有着直接的关系。
www.dictall.com
10.
Cracking RSA means confronting what mathematicians believe to be the hard problem of factoring large numbers.
破译rsa意味着数学家所认为的面临分解大量数字因子的难题。
www.hotdic.com
1.
Of all the algorithms Bouncy Castle offers, only the RSA algorithm offers marginally acceptable performance on wireless devices.
在BouncyCastle提供的所有算法中,只有RSA算法提供了无线设备上可勉强接受的性能。
www-128.ibm.com
2.
In addition, RSA contains support for UML 2 and transformations (some specific for J2EE) that do not exist in any of its predecessors.
此外,RSA包含对UML2和转换(其中一些特定于J2EE)的支持,而其前身并不提供这些支持。
www.ibm.com
3.
Given the combination of RSA modeling and EMF, you can quickly and easily create a data model and an editor for it.
因为由于RSA模型和EMF的结合,您能够方便快捷的创建一个数据模型并对其加以编辑。
www.ibm.com
4.
When this option is selected , the database server accepts communication packets encrypted using FIPS- approved RSA encryption technology .
选中此选项时,数据库服务器接受使用FIPS认可的RSA加密技术加密的通信数据包。
www.bing.com
5.
The example creates an RSA signing key , adds the key to a secure key container , and then uses the key to digitally sign an XML document .
该示例创建一个RSA签名密钥,将该密钥添加到安全密钥容器中,然后使用该密钥对XML文档进行数字签名。
www.bing.com
6.
The call was made at a San Francisco conference organised by security firm RSA - the largest event of its kind.
这此类事件中最大的呼吁是在安全公司RSA组织的旧金山会议上作出的。
dictsearch.appspot.com
7.
Both RSA and EMF have specific purposes in the application development lifecycle, purposes that you can easily use across each tool.
RSA和EMF在应用程序开发周期中都有着特定的用途,目的就是使您能够容易的跨工具使用。
www.ibm.com
8.
The performance of RSA decryption has direct relationship with the efficiency of modular exponentiation implementation.
RSA算法的解密性能与大数模幂运算的实现效率有着直接的关系。
kns50.chkd.cnki.net
9.
Figure 3 demonstrates the dependencies on RSA plug-ins, via the extension points used by the plug-in you're about to review in detail.
图3描述了RSA插件,通过插件的扩展点您可以了解到详细的信息。
www.ibm.com
10.
You can use Basic authentication, Integrated Windows authentication, certificate-based authentication, or RSA SecurID.
可以使用基本身份验证、集成的Windows身份验证、基于证书的身份验证或RSASecurID。
technet.microsoft.com
1.
Speak of add secret technology, have to carry company of RSA information security.
谈到加密技术,就不能不提RSA信息安全公司。
www.nwpu.net
2.
It is possible to write RSA transformations to provide custom transformations from UML2 .
从UML2中编写RSA转换来提供自定义的转换是可能的。
www.ibm.com
3.
We attach on the public key cryptosystem and use RSA cryptosystem to deliver the meeting's key.
分析了公开密钥加密方法,并采用RSA算法传递会议密钥。
www.fabiao.net
4.
The first thing that you need to do before you can realize the benefits of using your new paradigm is to import this code into RSA.
在你体会到使用新方法所带来的好处之前,你首先需要做的是把这些代码输入到RSA。
www.ibm.com
5.
Fully 67% told one poll that they were in favour of requiring RSA beneficiaries to work.
在一次民意调查中,高达67%的民众表示支持政府规定RSA受惠人必须劳动。
www.ecocn.org
6.
Purification and composition analysis of a polysaccharide RSA from Rhodiola sachalinensis A. Bor.
高山红景天多糖RSA的分离纯化和组成分析。
www.ilib.cn
7.
Nowadays, the RSA based cryptographic system is widely used in bank, e-business, e-government, etc.
当今,RSA算法加密系统广泛应用于银行、电子商务、电子政务等领域。
www.xuehi.com
8.
It is consumed by the exemplar authoring tools in RSA, and is used to quickly extract the input model schema and model-to-text templates.
它由RSA中的范例创作工具使用,并用于快速提取输入模型模式和模型到文本模板。
www.ibm.com
9.
This interchange of content is supported through the UML-LDM and LDM-UML transforms that are available with RDA and RSA.
这种内容的互换是在RDA和RSA提供的UML-LDM和LDM-UML转换的支持下进行的。
www.ibm.com
10.
For the curious, a 1024 bit RSA key pair is used for signing and a 128 bit secret key (AES) is used for encryption.
出于好奇,我们使用1024位RSA密钥对来进行签名,使用128位机密密钥(AES)来进行加密。
www.ibm.com
1.
Running ssh-keygen -t rsa -b 2048 from a command line allows you to generate a keypair, which gets put in your . ssh directory.
在命令行中运行ssh-keygen-trsa-b2048可以生成密钥对,将其放到你的.ssh目录中。
www.infoq.com
2.
Banking. Key management by means of asymmetric algorithms. Part 2 : approved algorithms using the RSA cryptosystem.
银行业务.用不对称算法进行键控管理.第2部分:使用RSA密码系统的经认可的算法
www.mapeng.net
3.
or ssh-rsa for RSA encryption, where will be the host's public key and is typically a very long string.
对于RSA加密,文件的内容类似于ssh-rsa,其中将会是主机的公钥,它通常是一个很长的字符串。
www.ibm.com
4.
As shown in Figure 5, select the Load from an EMF core model, since you created this from RSA before. Click Next.
就像图5所示的那样,选择loadfromanEMFcoremodel,因为您已经在先前的RSA中创建了这些,点击Next。
www.ibm.com
5.
For the purposes of this section, we will examine an implementation of the requester-side caching pattern using the RSA patterns engine.
对于本部分,我们将分析使用RSA模式引擎的请求端缓存模式实现。
www.ibm.com
6.
Gave three properties of decryption key in RSA system: infinite property, constructive property, same odd type property.
给出了RSA系统中脱密密钥的三个性质:无穷性,构造性,同奇。
www.dictall.com
7.
The examples shown in this article were developed using RSA--see Resources, [6].
本文中使用的例子是用RSA开发的——见参考资源,[6]。
www.ibm.com
8.
HTTPS or HTTPS_FIPS options The https communication stream uses RSA digital certificates for transport-layer security.
HTTPS或HTTPS_FIPS选项https通信流为传输层安全性使用RSA数字证书。
www.ianywhere.com
9.
Similarly, changes to this UML model, perhaps based on business use cases in RSA, can be imported as updates to the LDM in RDA.
类似地,对这个UML模型的更改(也许是基于RSA中的业务用例)可以被导入,作为对RDA中LDM的更新。
www.ibm.com
10.
We have taken quite the tour of RSA to work on our application, and introduce the model-driven development paradigm.
我们已经介绍了很多有关如何将RSA应用到应用程序上的内容,并且引入了模型驱动开发的范例。
www.ibm.com
1.
For more information, see Importing and Exporting Protected Configuration RSA Key Containers.
有关更多信息,请参见导入和导出受保护的配置RSA密钥容器。
msdn2.microsoft.com
2.
Finally, the design of RSA encrypt scheme and its provable security were discussed.
最后,提出了可证明安全的抵御SPA攻击的RSA加密方案的设计方法。
kns50.chkd.cnki.net
3.
NTRU speed of encryption and decryption was faster than RSA. It was fit for wireless sensor networks.
与RSA公钥算法相比,NTRU加解密速度更快,适合于无线传感器网络。
www.ceps.com.tw
4.
The popular RSA cipher algorithm, widely deployed in public-key cryptography, relies on factorization.
目前在公开金钥加密法中,最常用到的RSA密码演算法,就是应用因数分解的原理。
edba.ncl.edu.tw
5.
With the improvements of modular multiplication, it enhances the efficiency of RSA encryption.
通过对幂模运算的改进,简化,提高RSA加密效率。
blog.sina.com.cn
6.
However, in almost all of the schoolbook, the proof of RSA is achieved by the Euler theorem of the number theory.
几乎在所有的教科书中,RSA加解密的证明都是使用了数论中的欧拉定理。
kns50.chkd.cnki.net
7.
You can reach both of these extremely helpful tools from RSA's help menu.
你可以在RSA的帮助文件中获得这两个非常有用的工具。
www.ibm.com
8.
RSACryptoServiceProvider provides a managed implementation of RSA, an asymmetric (public key) algorithm.
RSACryptoServiceProvider提供RSA(即不对称(公钥)算法)的托管实现。
msdn2.microsoft.com
9.
RSA Security also provides support for legal peer-to-peer distribution and subscription service for all playback devices.
RSASecurity还支持针对所有回放设备的合法点对点发布和订阅服务。
www.ibm.com
10.
Copy content of the key file (excluding the header ssh-rsa and the endnote rsa-key-20091222) and paste it to the Key contents field.
复制这个密钥文件的内容(不包括头ssh-rsa和尾rsa-key-20091222)并将其粘贴到Keycontents字段。
www.ibm.com
1.
Which is the name of the exported key container, to import the RSA key container.
选项,后跟已导出的密钥容器的名称。
msdn2.microsoft.com
2.
To solve the shortcoming of symmetry encrypt and asymmetry encrypt, a new method that unite binary tree with RSA to encrypt data is given.
针对网络传输的特点,提出了一个将二叉树与RSA相结合的加密方法。
stae.com.cn
3.
An attack-resisted RSA coprocessor integrating multiplication and inverse is presented in this paper.
提出了一种集成模乘求逆双重运算的抗攻击RSA协处理器设计。
www.dictall.com
4.
The main aim of RSA is to ensure that all new highway schemes operate as safely as practicable.
道路安全审计的主要目的是尽可能确保所有新建公路项目的安全。
wenku.baidu.com
5.
With that accomplished, repeat the process for the RSA key.
完成之后,对RSA密钥重复此过程。
www.ibm.com
6.
It has the advantages of group-site communication high efficiency, high safety the same as RSA, etc.
本发明具有群点通信、高效、与RSA等同安全性、使用简便等优点。
www.bing.com
7.
The RSA research presented highlighted the significant role speed plays in deaths and serious injuries.
RAS的研究突出强调了超速在造成人员死亡和人员重伤方面所发挥的重要作用。
www.bing.com
8.
Basing on discussion on the security of RSA algorithm, this paper encrypts AK using RSA algorithm after encoding it.
在讨论RSA算法及其安全性基础上,使用RSA加密算法对授权密钥(AK)编码后数据加密。
www.fabiao.net
9.
Most public-key cryptosystems -- including RSA, the most-widely adopted -- stem from prime-number theory.
多数公开密钥加密系统(包括使用最广的RSA)都出自素数理论。
www.hotdic.com
10.
Use RSAPKCS1SignatureDeformatter to verify digital signatures with the RSA algorithm.
使用RSAPKCS1SignatureDeformatter验证采用RSA算法的数字签名。
msdn2.microsoft.com
1.
RSA can help you understand additional modeling concepts and help you with team development concepts.
RSA可以帮你理解附加的模型概念并且帮助你获得团队开发的概念。
www.ibm.com
2.
This method uses the RSA key to decrypt the session key and automatically uses the session key to decrypt the XML element.
此方法使用RSA密钥对会话密钥进行解密,然后自动使用该会话密钥对XML文档进行解密。
msdn2.microsoft.com
3.
Creates Optimal Asymmetric Encryption Padding (OAEP) key exchange data using RSA.
使用RSA创建最优不对称加密填充(OAEP)密钥交换数据。
msdn2.microsoft.com
4.
The task implement RSA public key encryption algorithm with Montgomery algorithm.
本课题将RSA公钥加密算法用蒙哥马利算法实现。
blog.sina.com.cn
5.
To improve the speed and security of RSA encryption, RSA algorithm implementation on FPGA is presented.
为解决提高RSA算法的加密速度保证加密的安全性,提出了在FPGA上实现RSA算法。
lib.cqvip.com
6.
The example uses the AES session key to encrypt the XML document and then uses the RSA public key to encrypt the AES session key.
示例使用AES会话密钥对XML文档进行加密,然后使用RSA公钥对AES会话密钥进行加密。
msdn2.microsoft.com
7.
Use RSAPKCS1SignatureFormatter to create digital signatures with the RSA algorithm.
使用RSAPKCS1SignatureFormatter创建采用RSA算法的数字签名。
msdn2.microsoft.com
8.
The site contains an overview, in English and Russian, of the major activities of RASA (or RSA, as it is called on the site).
该网站包含了俄国航空航天署主要活动的一个总览,有英文和俄文两个版本。
dictsearch.appspot.com
9.
RSA is the next generation of modeling tools.
RSA是下一代建模工具。
www-128.ibm.com
10.
See the Downloads for the final RSA project, packaged as a project interchange file.
请参见下载部分,其中提供了打包为项目交换文件的RSA项目。
www.ibm.com
1.
This article discusses the encryption algorithm of PC hard disk serial number with software according to the RSA encryption algorithm.
本文讨论通过RSA加密算法,对PC机硬盘序列号信息进行软加密,实现软件的试用。
www.dictall.com
2.
Protected configuration provides the capability to create, delete, export, and import RSA key containers when using the.
时创建、删除、导出和导入RSA密钥容器的能力。
msdn2.microsoft.com
3.
You can configure other authentication methods including RSA SecurID.
您可以配置其他身份验证方法,包括RSASecurID。
technet.microsoft.com
4.
RSA will automatically open this model for you.
RSA将会自动为您打开这个模型。
www.ibm.com
5.
RSA can be classified into early RSA and the late RSA based upon its occurring time.
它可以根据发生时间分为分为早起习惯性流产和晚期习惯性流产;
blog.sina.com.cn
6.
Large module multiplication is the kernel of large module power multiplication in RSA.
在RSA算法中,大数模幂运算的核心是大数模乘运算。
www.dictall.com
7.
See RSA Labs website for more technical information about RSA Factoring Challenge.
在RSA实验室的网站上能看到更多关于RSA因数分解挑战的技术信息。
www.equn.com
8.
A public key (id_rsa. pub) and the corresponding private key (id_rsa) have been created.
现在已创建了公钥(id_rsa.pub)和对应的私钥(id_rsa)。
www.ibm.com
9.
This will install the requester-side caching pattern implementation into RSA.
这会将请求端缓存模式实现安装到RSA中。
www.ibm.com
10.
First, get a KeyPairGenerator object that implements the RSA algorithm.
首先,取得一个实现了RSA算法的KeyPairGenerator对象。
www.ibm.com
1.
Create a new KeyInfo object to specify the name of the RSA key.
创建一个新的KeyInfo对象,以指定RSA密钥的名称。
msdn2.microsoft.com
2.
Represents the standard parameters for the RSA algorithm.
表示RSA算法的标准参数。
msdn2.microsoft.com
3.
In that case, the same RSA key container must also be deployed to those servers.
在这种情况下,还必须将相同的RSA密钥容器部署到这些服务器上。
msdn2.microsoft.com
4.
The example retrieves an RSA public key from a key container and then uses the key to verify the signature.
该示例从密钥容器中检索RSA公钥,然后用该密钥验证签名。
msdn2.microsoft.com
5.
Lockheed - Martin used "SecurID" token from the manufacture of EMC, RSA security.
洛克希德—马丁公司所使用“SecurID”令牌由EMC公司RSA安全部门制造。
www.englishtang.com
6.
The ASP. NET process must have read access to the specified RSA key container.
ASP.NET进程必须拥有对指定RSA密钥容器的读取访问权限。
msdn2.microsoft.com
7.
The palette is provided by RSA, and allows quick creation of nodes and edges on a diagram.
配置板由RSA提供,它支持图表节点与边缘的快速创建。
www.ibm.com
8.
The DES algorithm and RSA algorithm are used to encrypt in this program.
在聊天程序中加入了对称加密算法DES和非对称加密算法RSA。
wofabiao.com
9.
The JCE provider must support the RSA algorithm type for generating public and private keys.
JCE提供程序必须支持生成公钥和私钥的RSA算法。
www.ibm.com
10.
In PuTTYgen, under the conversion menu, choose import, select your OpenSSH key file (e. g. , id_rsa), and enter the passphrase.
在PuTTYgen中,从conversion菜单中选择import,选择自己的OpenSSH密钥文件(例如id_rsa)并输入密码。
www.ibm.com
1.
The name of the RSA provider.
RSA提供程序的名称。
msdn2.microsoft.com
2.
Within RSA is a good amount of information on developing application types such as portals, EJB applications, and portlets, to name a few.
在RSA中存在大量的有关开发应用程序类型的信息,比如portal,EJB应用软件,以及portlet等。
www.ibm.com
3.
Combining RSA and EMF gives both commercial and open source developers a powerful tool.
RSA和EMF的结合将给商业性的或者开放源代码的开发者提供一个强有力的工具。
www-128.ibm.com
4.
Endorsements key is a 2048 bits RSA public and private key to the chip factory, it randomly generated and cannot change.
签注密钥是一个2048位的RSA公共和私有密钥对,它在芯片出厂时随机生成并且不能改变。
www.bing.com
5.
Nowadays we combine the digital signature technology based on digital digest and RSA algorithm to ensure the integrity and non-repudiation.
现在,人们通常采用基于数字摘要、结合RSA算法所形成的数字签名技术来保证交易数据的完整性和不可抵赖性。
www.dictall.com
6.
The extension for the model templates is very simple: it just identifies a directory that RSA will scan for . ve files.
模型模版的扩展名很简单:它只能用于识别RSA扫描下的.ve文件目录。
www.ibm.com
7.
It should also be noted that RSA has a feature for creating models based on existing EMF core models.
同样需要注意到的是,RSA具有一项基于已经存在的EMFcore模型创建模型的特性。
www-128.ibm.com
8.
When updating Java in RSA, you will have to update your diagrams manually.
当更新在RSA中的Java时,你需要手工更新你的图表。
www.ibm.com
9.
The RSA public-key algorithm is used for all public-key operations.
RSA公钥算法用于所有公钥操作。
msdn2.microsoft.com
10.
Some systems will always require a password; other systems might prefer RSA over DSA.
有些系统始终需要使用密码,而其他的系统可能使用RSA而不是DSA。
www.ibm.com
1.
RSA can also be classified into primary RSA and secondary RSA based upon whether there is a normal pregnancy history before the abortion.
也可根据以前是否有过正常怀孕史分为原发习惯性流产和继发习惯性流产。
blog.sina.com.cn
2.
It can be transformed into redistribution protocol in proactive RSA conveniently thanks to additive sharing.
由于采用的是加法共享的方式,所以可以方便地转化为动态RSA再分发体制。
www.ceps.com.tw
3.
The HTTPS communication stream uses Certicom RSA security.
HTTPS通信流使用CerticomRSA安全机制。
www.ianywhere.com
4.
The first step in setting up RSA authentication begins with generating a public private key pair.
设置RSA认证的第一步从生成一对公用专用密钥对开始。
www-128.ibm.com
5.
PKCS is the Public Key Cryptography Standard - a series of standards created by RSA Labs.
PKCS是公钥加密标准-由RSA实验室创建的一系列标准。
blog.sina.com.cn
6.
RSA is widely used in public-key cryptosystem.
RSA密码算法是一种广泛应用的公开密钥密码算法。
kns50.chkd.cnki.net
7.
That uses RSA encryption to encrypt and decrypt configuration data.
提供使用RSA加密对配置数据进行加密和解密的。
msdn2.microsoft.com
8.
This occurs because the RSA top-level Model element and its containing Package both get converted to EMF packages.
这是因为RSA顶层模型元素及其所包含的包都被转换为了EMF包。
www.ibm.com
9.
Understanding Machine-Level and User-Level RSA Key Containers.
了解计算机级别和用户级别的RSA密钥容器。
msdn.microsoft.com
10.
The accompanying sample code uses an open source JCE provider, ISNetworks, which includes support for RSA.
附带的示例代码使用了开放源代码的JCE提供程序ISNetworks,它包括了对RSA的支持。
www.ibm.com
1.
You need to create three keys (one for each of the main encryption algorithms: rsa1, rsa, and dsa).
您需要创建三个密钥(每个密钥对应于一个主要加密算法:rsa1、rsa和dsa)。
www.ibm.com
2.
However, over time RSA is the strategic direction for design and modeling.
不过,RSA是以后设计和建模的策略方向。
www-128.ibm.com
3.
Simple encryption is not as strong as ECC_TLS or RSA_TLS encryption.
简单加密没有ECC_TLS或RSA_TLS加密安全性强。
www.ianywhere.com
4.
This is ideal for priming an RSA model when the EMF core model is the only model resource available.
在EMFcore模型是唯一可得到的模型来源时,RSA模型是最理想的方法。
www-128.ibm.com
5.
To get RSA or DSA authentication working, we perform a single one-time configuration step.
要应用RSA或者DSA认证,我们要执行一步一次性的配置步骤。
www-128.ibm.com
6.
The RSA study found, however, that 19 per cent of wireless networks had no security.
不过,RSA的研究发现,19%的无线网络没有安全保障。
www.ftchinese.com
7.
RSA is a wide used public-key cryptography algorithm.
RSA是一种被广为使用的公钥加密体制。
kns50.chkd.cnki.net
8.
A new scheme of identity authentication that has zero-knowledge characteristics is established based on RSA algorithm.
提出了一种基于RSA算法的新的具有零知识特性的身份认证方案。
www.ceps.com.tw
9.
To set up RSA authentication, we ll need to perform the one-time step of generating a public private key pair.
要设置RSA认证,我们需要执行生成公用专用密钥对的一次性步骤。
www-128.ibm.com
10.
Refer to the PKCS #11 specification available from the RSA Labs Web site (see Resources) for more options.
参阅RSALabs网站的PKCS#11规范(参阅参考资料)以获得更多选项。
www.ibm.com
1.
The application modeler accesses and imports the class model in RSA.
应用程序建模师在RSA中访问和导入类模型。
www.ibm.com
2.
Encoding of the encryption key via the RSA algorithm.
利用RSA算法对加密匙进行编译;
bbs.translators.com.cn
3.
In some cases, you might need to encrypt information using an algorithm other than those available with the RSA or DPAPI providers.
在某些情况下,您可能需要使用RSA或DPAPI提供程序可用的算法以外的算法来加密信息。
msdn2.microsoft.com
4.
On each machine, execute the following command to generate the RSA public and private keys.
在每台机器上执行以下命令,从而生成RSA公共和私有密钥。
www.ibm.com
5.
The topics discussed in this article are relevant to both IRAD and RSA, but we will refer only to IRAD for the sake of brevity.
本文所讨论的主题与IRAD和RSA均相关,但是为了简洁起见,我们只谈到IRAD。
www.ibm.com
6.
RSA public-key cryptography is based on this property of factorization.
RSA公钥密码系统就是基于这种因数分解特性的。
www.ibm.com
7.
Next, after a hashing function produces a message digest, the developer signs the digest with their private RSA key.
接下来,在散列函数产生了消息摘要之后,开发人员用他们的RSA私钥对该摘要进行签名。
www-128.ibm.com
8.
The messages are encrypted using a symmetric algorithm (RC2) and then the RC2 key is encrypted using an asymmetric algorithm (RSA).
邮件是使用对称算法(RC2)加密的,而RC2密钥又是使用不对称算法(RSA)加密的。
msdn2.microsoft.com
9.
This class is used to verify a digital signature made with the RSA algorithm.
此类用于验证采用RSA算法创建的数字签名。
msdn2.microsoft.com
10.
Class can use either machine-level or user-level RSA key containers.
类可以使用计算机级别或用户级别的RSA密钥容器。
msdn2.microsoft.com
1.
You can even transform from logical data model (RDA) to UML model (RSA).
甚至可以把逻辑数据模型(RDA)转换为UML模型(RSA)。
www.ibm.com
2.
In addition, RSA contains two other powerful tools that can help you understand the concepts we have been talking about.
顺便提及,RSA包含了另外两个强大的工具,它们可以帮助你理解本文所讲述的概念。
www.ibm.com
3.
We need an RSA Animate-like video, about five minutes in length or less.
我们需要一个RSA动画式的视频,长度约五分钟或更少。
www.bing.com
4.
You may have a requirement to encrypt sensitive information using an algorithm other than the RSA or DPAPI providers.
您可能想用RSA或DPAPI提供程序之外的某种算法来加密敏感信息。
msdn2.microsoft.com
5.
The file name of the SSH key should always end with id_rsa. ppk.
SSH密钥文件名应该都是以id_rsa.ppk结尾的。
www.ibm.com
6.
Both RSA and EMF provide a mechanism for representing a model.
RSA和EMF都提供一种表示模型的机制。
www-128.ibm.com
7.
This paper designs a RSA crypto-coprocessor based on the research of RSA cryptographic algorithm.
本文在对RSA密码算法研究的基础上,进行了RSA密码处理器的设计。
www.fabiao.net
8.
Option to grant access to the user-level RSA key container.
选项以授予对该用户级RSA密钥容器的访问权限。
msdn2.microsoft.com
9.
The cryptographic hash is calculated using the SHA-256 algorithm and the digital signature is generated using the RSA algorithm.
加密散列是使用SHA-256算法来计算的,数字签名是使用RSA算法来生成的。
www.ibm.com
10.
Public key encryption algorithm is the most widely used is RSA.
RSA算法的C 实现。公钥加密算法中使用最广的是RSA。
ftp.hackchina.com
1.
Instead, aSSL uses the RSA algorithm to enable the client to negotiate a random 128-bit key with one or more servers.
相反,aSSL使用RSA算法使客户机能够通过一个或多个服务器处理随机的128bit密匙。
www.ibm.com
2.
See the Resources section for product overviews and tutorials on RSA.
请您参阅资源部分来了解关于RSA的产品简介和指南。
www.ibm.com
3.
After the server receives the call, it returns its RSA modulus.
服务器接收到调用之后,它将它的RSA模数(modulus)返回。
www.ibm.com
4.
Locate the Ecore file that was exported from RSA before utilizing the appropriate Browse button.
在利用适当的Browse按钮之前,定位从RSA中导出的Ecore文件。
www.ibm.com
5.
You can grant access to an RSA key container with the.
工具授予访问RSA密钥容器的权限。
msdn2.microsoft.com
6.
If the name attribute is a short name, such as RSA, you can use that name when calling the CreateFromName method.
如果name属性是简称(如RSA),则可以在调用CreateFromName方法时使用该名称。
msdn2.microsoft.com
7.
The application modeler accesses and imports class model version 1 in RSA.
应用程序建模师在RSA中访问并导入类模型版本1 。
www.ibm.com
8.
The most talked about algorithm in asymmetric cyphers is RSA, which uses 2048-bit keys -- equivalent to 128-bit symmetric keys.
非对称密码中最常说的RSA使用2048位密钥,相当于128位的对称密钥。
www.ibm.com
9.
As described earlier, the public-private key pair is based on the RSA algorithm.
前面讲过,公-私密钥对是基于RSA算法的。
www.ibm.com
10.
The private key portion of the RSA key container is required in order to decrypt encrypted information.
若要对加密信息进行解密,RSA密钥容器的私钥部分是必需的。
msdn.microsoft.com
1.
Once you are finished configuring the dialog box, Figure 18 illustrates how it looks running in RSA.
一旦你完成了配置对话框,图18描述了在RSA它的运行。
www.ibm.com
2.
The rsa key type is used in the demonstration, but other key types are also valid.
在演示中使用了rsa密钥类型,但是其他密钥类型也有效。
www.ibm.com
3.
Right now, you should have RSA or DSA authentication working, but you still need to type in your passphrase for every new connection.
此刻,您应该已经可以使用RSA或者DSA认证了,但是在每一次新连接时,您仍需输入您的密码短语。
www-128.ibm.com
4.
Export a custom RSA key container to an XML file.
将自定义的RSA密钥容器导出到XML文件。
msdn2.microsoft.com
5.
In this series, you ll learn how RSA and DSA authentication work, and see how to set up passwordless authentication the right way.
在本系列文章中,您将学习RSA和DSA认证的工作原理,以及了解如何正确设置无密码认证。
www-128.ibm.com
6.
There are two important observations about the RSA and DSA authentication.
关于RSA和DSA认证有两项重要的注意事项。
www-128.ibm.com
7.
For more information on RSA and RSM, and their differences, see the Resources section.
如果您想获取RSA和RSM方面的更多信息,以及它们之间的不同之处,可以参阅资源部分。
www.ibm.com
8.
Also you should let us know the arithmetic used in fields, ECC and RSA and any improvement methods.
你也应该让我们知道所使用的算术领域,ECC和RSA和任何改进的方法。
www.bing.com
9.
Select Protocols for RSA, where RSA is the instance name (Figure 10).
选择ProtocolsforRSA,其中RSA就是实例的名字(图10)。
www.ibm.com
10.
Based on RSA public key encryption system, a new software key escrow system is proposed.
本文基于RSA公钥体制提出了一个不依赖物理设备的软件密钥托管加密方案。
www.dictall.com
1.
RSA has the capability to convert its models to EMF core models.
RSA具有将其模型转换到EMFcore模型的能力。
www-128.ibm.com
2.
The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。
www.wda.com.cn
3.
This specifies the use of the RSA Key Exchange and authentication algorithm, along with the RC4_SHA_US CipherSpec.
它规定了RSA密钥交换和认证算法的使用,还规定了RC4_SHA_US密码规范。
www.ibm.com
4.
The application modeler modifies class model version 1 in RSA, then transforms the updated class model (version 2) as LDM version 1 .
应用程序建模师在RSA中修改类模型版本1,然后将更新后的类模型(版本2)转换为LDM版本1 。
www.ibm.com
5.
The implementation of RSA cryptosystems is vulnerable to SCA attacks such as power analysis and time attack .
RSA密码算法的实现电路易受到诸如能量分析、时间分析等旁门攻击。
dictsearch.appspot.com
6.
As a result, only the RSA algorithm gives an acceptable performance, and it is barely acceptable.
结果,只有RSA算法提供了一个合理的性能,而且是勉强接受的。
www-128.ibm.com
7.
It is also possible that the RSA host key has just been changed.
也可能是RSA主机密钥刚被更改
zhidao.baidu.com
8.
Switch to import an RSA key container from an XML file.
开关,从XML文件导入RSA密钥容器。
msdn2.microsoft.com
9.
While RSA may look similar to other IDEs you have used, its advanced features set it apart from the pack.
尽管RSA也许和其它你以前用过的IDE很相似,但它的先进之处在于它与程序包的分离。
www.ibm.com
10.
If you are using HTTPS synchronization, you must implement both ECC and RSA security.
如果您正使用HTTPS同步,您必需执行ECC和RSA安全机制。
www.ianywhere.com
1.
You can delete all old content of the JSP which is generated by RSA.
您可以删除由RSA所生成的JSP的所有旧的内容。
www.ibm.com
2.
Import a custom RSA key container from an XML file.
从XML文件导入自定义的RSA密钥容器。
msdn2.microsoft.com
3.
Again, an area of confusion from RSA.
同样,这是RSA中的一个令人混淆的方面。
www.ibm.com
4.
The class models in RSA are updated to reflect the updated LDMs.
这种情况下应该更新RSA中的类模型,以反映更新后的LDM。
www.ibm.com
5.
The following steps show how to navigate the recipe and import the legacy catalog model into RSA.
以下步骤说明了如何导航菜谱并将遗留Catalog模型导入到RSA中。
www.ibm.com
6.
In SSL, DHE is used together with some method of authentication (most commonly RSA) in the handshake phase.
在SSL中,DHE与一些认证方式共同作用于网络握手过程中。
www.bing.com
7.
Some files are coded by RSA method.
部分档案已通过RSA方法编码。
searchsecurity.techtarget.com.cn
8.
Adds a key to the RSA key container.
将密钥添加到RSA密钥容器中。
msdn2.microsoft.com
9.
The application modeler compares and merges class model version 1 and version 1 into class model version 2 in RSA.
应用程序建模师进行比较,并在RSA中将类模型版本1 和版本1合并为类模型版本2。
www.ibm.com
10.
Add the signing RSA key to the SignedXml object.
将签名RSA密钥添加到SignedXml对象。
msdn2.microsoft.com
1.
Computes a public key token from an RSA key.
从RSA密钥计算公钥标记。
msdn2.microsoft.com
2.
Check the signature using the CheckSignature method and the RSA public key.
使用CheckSignature方法和RSA公钥检查签名。
msdn2.microsoft.com
3.
Now repeat the process to create the rsa and dsa keys (see Listing 4).
现在重复该过程,以创建rsa和dsa密钥(请参见清单4)。
www.ibm.com
4.
When working on complex models, it is typically ideal to work in RSA to develop the model.
当工作在复杂的模型中时,使用RSA来开发模型就变得非常理想。
www.ibm.com
5.
RSA allows you to export an RSA model in other model formats, such as Ecore or UML2 models.
RSA允许您导出一个其他模型格式的RSA模型,比如Ecore或者UML2模型。
www.ibm.com
6.
Figure 7 shows how you create a use case diagram in RSA.
图7显示了你如何在RSA中创建一个用例图。
www.ibm.com
7.
NSS Labs released the study this week in conjunction with the 2010 RSA security conference.
这周NSS实验室发布与2010RSA安全会议合作的研究。
www.bing.com
8.
The new signature algorithm is based on the Chinese Remainder Theorem which has a relative short private key.
该RSA签名算法基于中国剩余定理,采用较短的私人密钥。
kns50.chkd.cnki.net
9.
Meanwhile, in order to improve the computation speed of the server, the Chinese Remainder Theorem (CRT) is used in RSA decryption algorithm.
同时为进一步提高服务器的运算速度,在服务器端利用中国剩余定理(CRT)对RSA解密算法中的模指数进行降幂处理。
www.fabiao.net
10.
Will prompt us to enter the passphrase so that it can decrypt our private key and use it for RSA authentication.
都会提示我们输入该密码短语以便它能对我们的专用密钥进行解密,并使用我们的专用密钥进行RSA认证。
www-128.ibm.com
1.
RSA keys of 2048 bits are recommended.
基于RSA2048位加密算法的密匙是被推荐的。
www.phpfans.net
2.
The alliance will be officially launched during the RSA Conference 2009 in San Francisco, April 20-24, 2009.
该联盟将于2009年4月20日至4月24日在旧金山的RSA2009大会上正式启动。
www.infoq.com
3.
Answer: RSA V7 and RAD V7 both ship with a JET tag library called the DPTK compatibility layer.
答:RSAV7和RADV7都附带了一个JET标记库,称为DPTK兼容层。
www.ibm.com
4.
In this article, the UML models are manipulated by modeling tools such as RSM or RSA.
在本文中,UML模型是由例如RSM或RSA这样的建模工具操纵的。
www.ibm.com
5.
The RSA key container that is used by the default RsaProtectedConfigurationProvider provider is named "NetFrameworkConfigurationKey" .
默认RsaProtectedConfigurationProvider提供程序使用的RSA密钥容器名为“NetFrameworkConfigurationKey”。
msdn2.microsoft.com
6.
For HTTPS, you must use an RSA certificate.
对于HTTPS,必须使用RSA证书。
www.ianywhere.com
7.
The IBM Basic B2B Profile constrains that choice to the more widely implemented RSA 1. 5.
基本B2B概要对更广泛实现的RSA1.5的选择进行约束。
www.ibm.com
8.
Recently I came across an example in the RSA Journal and today I am going to quote it at length (in blog terms).
最近我在RSA(TheRoyalSocietyofArts,英国皇家艺术协会——译者注)的期刊中碰到了一个例子,今天我就将大篇幅地(对博客而言)引用。
www.bing.com
9.
You will be using RSA in order to import some previously developed code.
你使用RSA处理一下你以前开发的代码。
www.ibm.com
10.
They will typically employ cryptographic algorithms such as RSA, SHA-1, AES, and Triple-DES.
它们通常都会采用一些加密算法,例如RSA、SHA-1、AES和Triple-DES。
www.ibm.com
1.
The application modeler uses class model version 1 in RSA, which was previously transformed from LDM version 1 in IDA.
应用程序建模师在RSA中使用类模型版本1,它是之前从RDA中的LDM版本1转换而来的。
www.ibm.com
2.
The second floor of the RSA, for example, could comfortably house ten young families.
譬如说,RSA保险公司办公大厦的二层,可以充裕的安置下十个年轻人家庭;
www.bing.com
3.
He has a RSA certificate in EFL and a degree in English Literature.
还持有英语作为外语教学的RSA证书,以及英国文学的学位。
dictsearch.appspot.com
4.
RSA models are based on the UML2 standard, which models not only a system's static data model but also behavioral constructs.
RSA模型是基于UML2标准的,这种模型不仅可以建模一个系统的静态数据模型,而且还可以对行为进行建模。
www.ibm.com
5.
The data modeler uses LDM version 1 in IDA, which was previously transformed from class model version 1 in RSA.
数据建模师在RDA中使用LDM版本1,它是之前在RSA中从类模型版本1转换而来的。
www.ibm.com
6.
In Figure 1, the tree view, shows a SQL Server instance called "RSA" running on a physical server with the hostname of IBM-MAX0Q2AIFG2.
在图1中的树形视图,显示了一个叫做“RSA”的SQL服务器,它在一个物理服务器上运行并且主机名是IBM-MAX0Q2AIFG2。
www.ibm.com
7.
The private key in this example is my_rsa. ppk (Figure 1).
本例中的私钥为my_rsa.ppk(图1)。
www.ibm.com
8.
Structural Analysis (RSA only): contains a set of rules that helps you conduct an architectural review of your code
StructuralAnalysis(RSAonly)即结构化分析:包括帮助你构建代码体系结构审查的规则。
www.ibm.com
9.
The Glossary Explorer window, as shown in Figure 5, appears on your lower-right panel of RSA
GlossaryExplorer窗口(如图5所示)出现在RSA的右下方面板中。
www.ibm.com
10.
Courage is the ladder on which all the other virtues mount. (Clare Boothe Luce, RSA dramatist)
勇气是一架梯子,美德全靠它爬上去。(美国剧作家卢斯.C.B。)
www.csmayi.cn
1.
Internal Peculiarity and Cryptanalysis of the RSA Algorithm and Precautionary Measures
RSA算法的内在特性、破解与防范措施
www.ilib.cn
2.
A Novel Calculation Method for the Factorization of Large Integral Numbers and the Decoding of the RSA Cryptosystem
大整数因子分解新算法及对RSA密码制的解密
service.ilib.cn
3.
Twenty Years of Attacks on the RSA Cryptosystem
被攻击的二十年
www.newebug.com
4.
Digital signature; RSA arithmetic; PKI; Relay protection setting value management; Online bidding;
数字签名;RSA算法;PKI;继电保护定值管理;网上招投标;
www.zidir.com
5.
Open a new document in Notepad and paste the public key into it. The key should be on a single line and start with ssh-rsa
打开一个新Notepad文档,将公钥粘贴在其中。
www.ibm.com
6.
Safety of Encryption Techniques of RSA Public Key and its Application in Electronic Commerce
RSA公钥加密技术安全性分析与其在电子商务中的应用
www.ilib.cn
7.
Research and Contrast of Two Different Ways on Public Key RSA Cryptosystem Prime Production
RSA中素数生成的研究及两种实现方案的比较
ilib.cn
8.
The Calculation of RSA Cryptosystem and an Analysis of its Security
RSA密码系统的算法实现及安全性分析
www.ilib.cn
9.
Research and Optimization of Key Arithmetic of RSA and Its Hardware Implementation
RSA关键运算的分析优化与硬件实现研究
service.ilib.cn
10.
Expression of the Fas on the lymphocytes in the women with RSA and correlation between Fas expression and NK cytotoxicity
复发性自然流产患者外周血淋巴细胞Fas表达及其与NK细胞毒性的相关性研究
168.160.184.78
1.
RSA-based random encryption algorithm and analysis of its dependability
基于RSA的随机加密算法与安全可靠度分析
service.ilib.cn
2.
Elliptic curve cryptography (ECC) has more attractive attributes when compared to RSA: short key length for same security level;
相对于RSA算法,椭圆曲线密码算法具有更高的单比特密钥安全性;
www.fabiao.net
3.
Realization of Uniting Binary Tree with RSA to Encrypt Data and Its Application in Data Transport
二叉树与RSA相结合进行数据加密及其在数据传输中的应用
ilib.cn
4.
Application of RSA digital signature technology in circulation of electronic official documents
RSA数字签名技术在电子公文流转中的应用
www.ilib.cn
5.
Attack-resisted RSA Coprocessor Integrating Multiplication and Inverse
集成模乘求逆双重运算的抗击RSA协处理器
www.ilib.cn
6.
A Secure and Efficient Encryption Protocol of RSA with Small Public Key and its Applications
一种安全有效的小公钥RSA加密协议及其应用
www.ilib.cn
7.
The RSA Encryption Arithmetic And Implementation in Information Encryption System for Power Bidding
电网发电竞价信息加密系统的RSA加密算法与实现
www.ilib.cn
8.
Implementation of RSA Cryptosystem with Improved Systolic Array Architecture
使用改进的心动阵列结构实现RSA公共密钥算法
www.ilib.cn
9.
Article 4 describes the new service design tooling in RSA and how this can be used to build business-aligned service models; and
第4篇文章将介绍RSA中新的服务设计工具,以及这个工具可以如何用来创建与业务协调的服务模型;
www.ibm.com
10.
Scheme and Realization of RSA Digital Signature-Based Clearance System for Datacasting Information
基于RSA数字签名的数据广播信息审批系统的方案与实现
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/12/26 11:49:14