单词 | secret key |
释义 | 例句释义: 秘密关键码,密钥,秘密密钥,秘密金钥 1. The eighth step during our secret key generation process is to check whether the byte array after parity fixing turns out to be a weak key. 我们的密钥生成过程的第八步是要检查奇偶修正后的字节数组是否是一个弱的密钥。 www.ibm.com 2. This information is needed to acquire a TGT for a user principal or to create a secret key for a service principal. 在为用户主体获取TGT时或是为服务主体创建一个密钥时需要此信息。 www.ibm.com 3. This secret key will be serialized into a file and will be used for the subsequent launch of jce. test. SimpleTest. java. 这个秘钥将被序列化为一个文件,并被用于随后启动jce. www.ibm.com 4. The last step to take for your new cloud instance is to convert the OpenSSH secret key to a format that can be used by PuTTY. 对于新的云实例,要执行的最后一步是把OpenSSH秘密密钥转换为PuTTY可以使用的格式。 www.ibm.com 5. One of the most popular secret-key encryption schemes is IBM's Data Encryption System (DES), which became the U. ibm的数据加密系统(des)是最流行的秘钥加密方案之一。 www.1stenglish.com 6. Furthermore, a classical communication channel is always required for Alice and Bob to compare measurements and agree on the secret key. 此外,传统的通信频道总要求爱丽丝和鲍勃比较测量并在密码上取得一致。 zhidao.baidu.com 7. Typically, secret-key algorithms, called block ciphers, are used to encrypt one block of data at a time. 通常,私钥算法(称为块密码)用于一次加密一个数据块。 msdn2.microsoft.com 8. Similarly, if you are in a shell that keeps history, your secret key will end up in your history file. 类似地,如果位于一个保存历史的shell中,您的秘密密匙将出现在您的历史文件中。 www.ibm.com 9. A secure connection is now established, and communication for the rest of the session is encrypted using the secret key. 现在就建立了一个安全连接,会话其余部分的通信是用秘钥加密的。 www.ibm.com 10. When you attempt a swing using the Secret, key the downswing by pushing your right knee inward both to the left and toward the ball. 当你要尝试这个挥杆秘诀的时候,记住用右膝移向左侧及移向球位来规范你的下挥杆。 blog.sina.com.cn 1. The secret key in a Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones. 公共密钥密码系统中的保密的密钥,用于对到来的消息解密和对外出的消息签名。 kajaa.bbs.us 2. After you've set up your storage, you will receive an e-mail containing a link with which you can access your account ID and secret key. 设置完存储以后,您将会收到一封电子邮件,里面含有一个链接,通过该链接可以获得您的帐户ID和密钥。 www.ibm.com 3. Support default credentials; install the owner of the default TGT or secret key as the principal in the Subject. 支持缺省凭证;将缺省TGT或密钥的所有者作为主体安装在Subject里。 www.ibm.com 4. Now the privilege service copies this information into a TGT and encrypts it using the authentication service's secret key. 现在,特权服务将此信息复制到TGT中,并使用身份验证服务的秘密密钥加密它。 www.ibm.com 5. Public-key encryption The key distribution problem has always been the weak link in the secret-key systems. 公钥加密密钥的分布问题在秘钥系统中一直是一个薄弱环节。 net.sxtcm.com 6. Shared secret key infrastructures could also be used to provide PAC identifiers. 共享密钥基础设施也可以用来提供PAC标识符。 www.ibm.com 7. in the system, a decimal conversion program module processes the mapping file according to the way specified by a second secret key group. 系统中进制转换程序模块将映射文件按第二组密钥指定的方式进行处理。 ip.com 8. The SSL Client sends a message encrypted with the secret key, indicating that the Client part of the SSL handshake is complete. SSL客户机发送一条用秘钥加密的消息,表示SSL握手中的客户机部分完成。 www.ibm.com 9. Then each party combines its own private key with the other party's public key, to get a shared secret key. 然后A和B各自把自己的私钥和对方的公钥拼起来,就够成了一个共享的密钥。 www.bing.com 10. When Franny receives the message from Zooey, she can decrypt the message with her secret key. 当弗兰妮接收到佐伊的报文,她就能用其秘密钥匙对报文解密。 www.1stenglish.com 1. The result of Step 11 is a secret key that the Kerberos client can use to communicate with the Kerberos server. 第11步的结果是一个Kerveros客户机可以用来与Kerberos服务器进行通信的密钥。 www.ibm.com 2. With an access key and a secret key in hand, you can download JetS3t and use it with abandon to interact with S3 via its RESTful API via. 有了访问密钥和秘密密钥,您可以下载JetS3t并使用它通过RESTfulAPI与S3交互。 www.ibm.com 3. After the key and IV are transferred, then secret-key encryption is used for the remainder of the session. 传输密钥和IV后,会话的其余部分将使用私钥加密。 msdn2.microsoft.com 4. With SSL, the data going back and forth between client and server is encrypted using a symmetric key (secret key) algorithm. SSL将使用对称密钥(加密密钥)算法对在客户机与服务器之间传递的数据进行加密。 www.ibm.com 5. Kerberos authenticates the identity and encrypts their communications through secret-key cryptography. KERBEROS协议认证试图等录上网用户的身份,并通过使用密匙密码为用户间的通信加密。 www.24en.com 6. Some applications try to combine public- and secret-key cryptography to achieve security and performance. 有些应用试图把明钥和秘钥密码术结合起来,以获得安全性和高性能。 dict.veduchina.com 7. the sensitively to the secret key has strong anti-interference and has some potential application in preprocessing of digital watermark. 此算法对密钥敏感,具有很好的杭干扰能力,同时在数字水印的预处理中对水印的置乱有着一定的应用潜力。 www.ceps.com.tw 8. Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys. 很多基本上是秘钥系统的加密软件包采用明钥加密,来传送秘密的会话密钥。 www.hotdic.com 9. Secret key cryptography is one of the most important technologies in distributed systems security. 秘密密钥加密是分布式系统安全机制中一种最重要的技术。 www.ibm.com 10. The secret key can be any string of eight characters and is shown as 12345678 for demonstration purposes only. 秘密密匙可以是八个字符的任意字符串,并可显示为12345678(只用于演示目的)。 www.ibm.com 1. To accomplish this, the messages sent with Vanish are encrypted with a secret key, never revealed to the end user. 为了实现这点,通过Vaish发送的信息会用一个密匙加密,而且这个密匙绝不会透露给终端用户。 www.bing.com 2. Public-key cryptographic algorithms use a fixed buffer size whereas secret-key cryptographic algorithms use a variable-length buffer. 公钥加密算法使用固定的缓冲区大小,而私钥加密算法使用长度可变的缓冲区。 msdn2.microsoft.com 3. For the curious, a 1024 bit RSA key pair is used for signing and a 128 bit secret key (AES) is used for encryption. 出于好奇,我们使用1024位RSA密钥对来进行签名,使用128位机密密钥(AES)来进行加密。 www.ibm.com 4. The shared secret key itself is encrypted using the public key you created in the previous step, and is embedded in the XML content. 共享密钥本身使用上一步生成的公钥加密并嵌入XML内容中。 www-128.ibm.com 5. Bob's private knowledge is called his secret key (SK). 只有鲍伯知道的事就是「私密金钥」(密钥)。 edba.ncl.edu.tw 6. The single key makes all of the previously described attacks easier to perform, especially with multiple users all sharing the secret key. 单个密钥使所有先前描述的攻击都变得更容易执行,尤其是在多个用户都共享秘钥的情况下。 www-128.ibm.com 7. the data is thus duly segregated , and secured by a complex secret key system prohibiting unauthorised access. 卡内的资料都是分隔储存,并由一套先进的密匙系统保护,严防非法使用。 www.ichacha.net 8. The secret key is also input to the algorithm. The exact substitutions and transformations performed by the algorithm depend on the key. 密钥也被输入算法。由算法进行的准确的取代和变换取决于密钥。 zhidao.baidu.com 9. Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed. 一旦安全服务器通过秘密密钥确认了用户的身份,用户登录到DCE的过程就完成了。 www.ibm.com 10. A secret key algorithm that processes a stream of bits one bit at a time. 一次处理位流中一位的秘钥算法。 www-128.ibm.com 1. Key generated for use during a single session of encryption and subsequently discarded; this will typically be a secret key. 为在加密的单个会话期间使用而生成、随后被废弃的密钥;它通常是秘钥。 www-128.ibm.com 2. However, public-key algorithms are extremely slow (compared to secret-key algorithms) and are not designed to encrypt large amounts of data. 但是,公钥算法非常慢(与私钥算法相比),不适合用来加密大量数据。 msdn2.microsoft.com 3. This didn't match the policy in use, which required client and server entropy to be combined to generate the shared secret key. 这不符合所采用的策略,它需要客户端和服务器熵合起来生成共享密钥。 www.ibm.com 4. The first is to concatenate the secret key to the end of the data before computing a digest . 第一种方式是在计算摘要之前,将秘钥并置到资料末尾。 www.bing.com 5. The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy. 这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。 www.dictall.com 6. If it is a valid request from client, it extracts the session key from the STkt using server secret key. 如果它是来自客户端的有效请求,它使用服务器秘密密钥从STkt提取会话密钥。 www.ibm.com 7. Encryption is implemented using both public key (asymmetric) and secret key (symmetric) algorithms. 加密使用公钥(不对称)和密钥(对称)两者来实现。 msdn2.microsoft.com 8. This resultant file is then completely encrypted using the sales department's secret key, thus resulting in a super-encrypted XML file. 接着,通过使用销售部门的秘钥对这个结果文件完成加密,这就产生了超级加密的XML文件。 www.ibm.com 9. It is designed to provide strong authentication and encrypted communication for client-server applications by using secret-key cryptography. 它的设计目的是,通过使用密钥加密技术,为客户端-服务器应用程序提供强大的身份验证和加密通信。 www.ibm.com 10. In chapter 7, it produces researches of encryption algorithm, secret-key's produce, and its use, management security. 第七章对加密算法和密钥,以及在一卡通系统的产生、使用与管理提出了安全性的研究。 www.fabiao.net 1. This policy specifies encryption of message bodies sent in both directions, using a client-generated secret key. 这个策略使用客户端生成的保密密钥来规定发送到两个方向的消息体加密方式。 www.ibm.com 2. Gets or sets the size , in bits , of the secret key used by the symmetric algorithm . 表示对称算法使用的机密密钥的大小(以位为单位)。 www.bing.com 3. Receiving the reply from KDC, client then decrypts the message using its own secret key. 客户端接收KDC的回复,然后使用自己的秘密密钥解密消息。 www.ibm.com 4. Scrambled data is encoded using a secret key unique to that transmission. 保密数据利用对这次传输独有的秘密密钥进行编码。 www2.ccw.com.cn 5. Typically, public-key encryption is used to encrypt a key and IV to be used by a secret-key algorithm. 公钥加密通常用于加密一个私钥算法将要使用的密钥和IV。 msdn2.microsoft.com 6. Receiving the ticket from the client, server then decrypts it using its own secret key. 服务器从客户端接收票证,然后使用自己的秘密密钥进行解密。 www.ibm.com 7. The hidden fingerprint data are extracted accurately from the carrier image by a secret key. 通过密钥,隐藏的指纹数据可以从被传输的图像中精确提取出来。 www.ceps.com.tw 8. If satisfied, the SSL Client sends the secret key that will be used to encrypt further exchanges. 如果通过验证,SSL客户机就发送秘钥,该秘钥将被用于对进一步的交换加密。 www.ibm.com 9. KDC also has a database of secret keys; each entity (user, host, or an application server) shares a secret key with the KDC. KDC还拥有一个密匙数据库;每个实体(用户、主机或应用服务器)与KDC共享一个密匙。 www.ibm.com 10. As with any access information, it is imperative that you keep your secret key . . . secret. 和任何访问信息一样,都必须保管好您的秘密密钥。 www.ibm.com 1. Generate a shared secret key using the public key contained in the trusted party's certificate (asymmetric encryption). 使用受信方证书中包含的公钥生成共享密钥(非对称加密)。 www.ibm.com 2. Secret-key message authenticators are designed to provide exactly this type of security. 密钥信息认证的目的是提供准确这种类型的安全。 renheshi.com 3. Threshold scheme and forward-secure scheme are main technique, which can solve exposure of secret key. 门限体制和前向安全体制是解决公钥加密体制和数字签名体制中密钥泄露问题的主要方法。 www.dictall.com 4. Whenever you connect to a cloud instance, the ssvnc package requests the SSH secret key from Pageant. 当连接云实例时,ssvnc包向Pageant请求SSH秘密密钥。 www.ibm.com 5. Network part contains the information required to acquire tickets and other services (e. g. it includes the principals secret key). 网络部分包含获取票证和其他服务所需的信息(比如,它包含主体秘密密钥)。 www.ibm.com 6. The temporary secret key serves both as the value of the key and as the value of the initial vector for DES-CBC encryption. 这个临时密钥同时作为密钥的值和DES-CBC加密的初始矢量的值。 www.ibm.com 7. In our bank transfer example, assume we use a primitive MAC that hashes the request along with a secret key. 在银行划拨范例中,假设我们使用了一种随秘钥杂凑请求的原始MAC。 www-128.ibm.com 8. Thus the knowledge of this secret key provides identification of the entity. 这样,通过这个秘密密匙就可以对实体进行身份验证。 www.ibm.com 9. The accounts department will need to decrypt the payment information in the purchase order using a pre-exchanged secret key. 会计部门要使用一个预先交换的秘钥对采购订单中的支付信息解密。 www.ibm.com 10. The Client decrypts the message from the authentication service using client secret key. 客户端使用它的秘密密钥解密来自身份验证服务的消息。 www.ibm.com 1. Even if an attacker has the secret key, he cannot compute the former secret key from the secret key and then forge former signatures. 即使攻击者拥有此金钥亦无法推导出过去的金钥,而伪造过去的签章。 www.etop.org.tw 2. The disadvantage of secret-key encryption is that it presumes two parties have agreed on a key and IV and communicated their values. 私钥加密的缺点是它假定双方已就密钥和IV达成协议,并且互相传达了密钥和IV的值。 msdn2.microsoft.com 3. WEP uses a secret key shared between the communicators. WEP使用通信器之间共享的秘钥。 www-128.ibm.com 4. A service's secret key is typically kept in a key table file from where it is retrieved at run time. 一个服务密钥典型的被保存在一个密钥表文件中,该服务密钥在运行时就是从密钥表文件中检索的。 www.ibm.com 5. The hash value is mixed with the secret key again, and then hashed a second time. 哈希值与密钥再次混合,然后再进行第二次哈希运算。 msdn2.microsoft.com 6. AWS requires the use of an "access key ID" and an associated secret key. AWS需要使用“访问密匙ID”以及相关的密钥。 www.ibm.com 7. It includes two parts: prime number validation and secret key calculation. 它包括两部分:素数检测和私钥计算。 www.fabiao.net 8. The signature component of the message (see Listing 6) provides the proof of possession of the Secret Key ID. 消息的签名组件(见清单6)提供拥有SecretKeyID的证明。 www.ibm.com 9. Only the user who holds secret key can ever decrypt the original data, the query, or the query results. 只有手握密匙的用户能够看到原始数据,查询词或查询结果。 www.bing.com 10. How can you establish such a secret key? 您可以如何创建这样一个保密密钥呢? www.ibm.com 1. This will encrypt the string HelloWorld with the generated secret key. 这样将使用生成的秘钥加密字符串HelloWorld。 www.ibm.com 2. The entire TGT is encrypted with the secret key of authentication service. 整个TGT使用身份验证服务的秘密密钥加密。 www.ibm.com 3. Represents the secret key for the symmetric algorithm. 表示对称算法的机密密钥。 msdn2.microsoft.com 4. An important property "forward secure" is needed when changing the secret key. 更新金钥后必须有一重要特性,即为前向安全。 www.etop.org.tw 5. The sample code generates a new secret key and uses it to encrypt and decrypt data. 这个样本代码将生成一个新的秘钥,并使用它对数据进行加密和解密。 www.ibm.com 6. It involves usage of a secret key which is shared by the server and the client. 它涉及使用在服务器和客户端之间共享的秘密密钥。 www.ibm.com 7. SymmEncr: Require symmetric encryption using a client-generated secret key. SymmEncr:需要使用一个客户端生成您的密钥进行对称加密。 www.ibm.com 8. We sign the document on our side with the secret key, and Google signs it with the same key. 我们会在文件中写入这个密钥,而Google也会使用相同的密钥。 www.ibm.com 9. There's no need for the server to send the secret key back to the client, because the client already has it available. 服务器不需要将保密密钥发送回客户端,因为客户端已经拥有了这个保密密钥。 www.ibm.com 10. The target server receives the PSTkt and decrypts it using its own secret key. 目标服务器接收PSTkt并使用自己的秘密密钥解密。 www.ibm.com 1. The target server receives the PSTkt and decrypts it using its own secret key. 目标服务器接收PSTkt并使用自己的秘密密钥解密。 www.ibm.com 2. The secret key is itself encrypted using the SSL Server's public key obtained from the Server's digital certificate. 秘钥使用从服务器的数字证书处获取的SSL服务器的公钥对自己进行加密。 www.ibm.com 3. A new computationally secure threshold multi-secret key agreement scheme with authority based on the theory of linear codes was introduced. 基于线性码理论给出了一个计算安全的有门限可认证的多重秘密密钥协商方案。 www.ceps.com.tw 4. Kerberos defines an algorithm to generate a secret key from the user's password. Kerberos定义了一种利用用户的密码生成密钥的算法。 www.ibm.com 5. Kerberos was designed based on secret key cryptography and using trusted third party authentication. Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。 www.ibm.com 6. The byte array after this weak key processing is a temporary secret key. 经过这种弱密钥处理的字节数组是一个临时密钥。 www.ibm.com 7. Forward-Secure is an important way to protect the secret key of digital signatures. 前向安全思想是保护数字签名系统密钥安全的重要方法。 www.magsci.org 8. This section describes how to create and manage keys and how to encrypt and decrypt data using public-key and secret-key algorithms. 这部分描述如何创建和管理密钥以及如何使用公钥和私钥算法对数据进行加密和解密。 msdn2.microsoft.com 9. The login module can also use an existing TGT from a credentials cache or an existing secret key from a key table. 登录模块还可以使用一个来自凭证高速缓存的已存在的TGT或是来自密钥表的已存在的密钥。 www.ibm.com 10. The SSL Server decrypts and stores the secret key, using its private key. SSL服务器使用它的私钥对秘钥解密并存储它。 www.ibm.com 1. Same secret key is used to encrypt and decrypt the messages exchanged among them. 使用同一个秘密密钥加密和解密在它们之间交换的消息。 www.ibm.com 2. This type of encryption uses a single shared, secret key to encrypt and decrypt data. 此类型的加密使用单个共享的机密密钥来加密和解密数据。 msdn2.microsoft.com 3. To reach the intended client, this response message is encrypted using the client secret key. 为了传送到期望的客户端,此响应消息使用客户端秘密密钥进行加密。 www.ibm.com 4. Gets or sets the secret key for the TripleDES algorithm. 获取或设置TripleDES算法的机密密钥。 msdn2.microsoft.com 5. The sender must possess the other copy of the secret key. 发送方必须拥有秘钥的另一个副本。 www-128.ibm.com 6. The HMAC process mixes a secret key with the message data and hashes the result. HMAC进程将密钥与消息数据混合,并对结果进行哈希运算。 msdn2.microsoft.com 7. The authentication service gets the PSTkt request and decrypts it using its secret key. 身份验证服务获取PSTkt请求,使用其秘密密钥解密它。 www.ibm.com 8. Imran can encrypt the data he wants to send to Ali using this secret key and placing it inside the CipherValue element in Listing 8. Imran可以使用这个秘钥并将它放在清单8中的CipherValue元素中来加密他打算发送给Ali的数据。 www.ibm.com 9. I will need the secret key at several points while communicating with the Kerberos server. 在与Kerberos服务器进行通信时,会在几个地方需要这个密钥。 www.ibm.com 10. The CipherValue element in Listing 7 contains a newly generated secret key, which is encrypted with the public key of the first party. 清单7中的CipherValue元素包含一个新生成的秘钥,它是用第一方的公钥加密的。 www.ibm.com 1. The encryption algorithm is architecture and language-independent. However, both the sender and the receiver must know the secret key. 加密算法独立于架构和语言,不过,发送者和接收者均必须知道秘密密匙。 www.ibm.com 2. This paper mainly discusses that using the digit as secret key we have a good secret transmission with existing encrypt technology. 本文将着重讨论一下利用随机数作为密钥,采用现有的加密技术达到比较高的数据传输的保密性。 www.magsci.org 3. When that's done, edit Gaudreault's s3. class. php file to include your AWS key and your secret key. 完成该操作后,编辑Gaudreault的s3.class.php文件,将AWSkey和密钥包含进去。 www.ibm.com 4. Kerberos uses this concatenated string to generate the secret key instead of using the password alone. Kerberos利用这个串接的字符串而不仅仅是密码生成密钥。 www.ibm.com 5. The secret key is stored in encrypted form in the same database. 机密密钥采用加密的形式存储在同一个数据库中。 www.ibm.com 6. In general, we use the selected secret key to decrypt the ciphertext or sign the message for a long time while the secret has been selected. 一般而言,当我们选定好一私密金钥后,会有很长一段时间利用这个金钥处理加解密讯息或是产生数位签章。 www.etop.org.tw 7. You must have possession of the other blob (the secret key). 您必须拥有另一部分(秘密密钥)。 www.ibm.com 8. In the previous section, we exchanged a secret key. 在前一节中,我们交换了一个秘钥。 www.ibm.com 9. This element's content gives a secret key in encrypted form, using the server's public key to do the encryption. 这个元素的内容提供了一个加密了的秘密密匙,使用了服务器的公开密匙执行加密。 www.ibm.com 10. The secret-key system then encrypts the data. 然后秘钥系统对数据进行加密。 www.hotdic.com 1. Listing 2 demonstrates how a secret key is generated using Triple-DES. 清单2说明了如何使用Triple-DES生成共享密钥。 www.ibm.com 2. A secret key is generated at the first time you run jce. test. SimpleTest. java. 在您首次运行jce.test.SimpleTest.java时,生成了一个秘钥。 www.ibm.com 3. This secret key is known only to the user and the security server. 此秘密密钥只有该用户和安全服务器知道。 www.ibm.com 4. This is for us to read critically different historical era provided the text of the secret key. 这就为我们批判地解读不同历史时代的文本的秘密提供了一把钥匙。 www.okqikan.com 5. Create a public and secret key for userone and add it to the publickey database. 为userone创建公钥和机密密钥,并将它添加到publickey数据库中。 www.ibm.com 6. The second party uses this public key to encrypt its secret key. 另一方使用这个公钥加密其秘钥。 www.ibm.com 7. The output data may be different because of the secret key generated the first time you run this application. 由于您第一次运行这个应用程序时生成的秘钥的原因,输出的数据可能有所不同。 www.ibm.com 8. The study and application of Ciphers that use a single secret key for both encryption and decryption operations. 使用单个密钥执行加密和解密操作的密码算法研究和应用。 kajaa.bbs.us 9. The secret key is used both for encryption and for decryption. 机密密钥既用于加密,也用于解密。 msdn2.microsoft.com 10. The STkt is then encrypted using the target server secret key. So target server can decrypt the STkt request using its secret key. STkt然后使用目标服务器的秘密密钥加密,这样目标服务器就能够使用自己的秘密密钥解密STkt请求。 www.ibm.com 1. The secret key to test for weakness. 要进行漏洞测试的机密密钥。 msdn2.microsoft.com 2. The login module can also support default principals, that is, using default TGT or secret key when no principal name is specified. 登录模块还支持缺省主体,即,在没有指明主体名时使用缺省的TGT或密钥。 www.ibm.com 3. The secret key for the. 算法的机密密钥。 msdn2.microsoft.com 4. I will now use the temporary secret key to encrypt the original padded byte array from Step 3 using the DES-CBC algorithm. 现在我要使用这个临时密钥以DES-CBC算法加密第3步中得到的附加后的字节数组。 www.ibm.com 5. Telnet with Kerberos can use only Kerberos, which is based on secret-key technology. 用Kerberos的Telnet仅可以使用Kerberos,Kerberos是基于密钥技术的。 www.ibm.com 6. In public-key systems there's no need to find a safe channel for communicating a shared secret key. 在公开密钥系统中,无需找一条传送共享秘密密钥的安全通道。 www.1stenglish.com 7. Key The secret key for. 加密的机密密钥。 msdn2.microsoft.com 8. Because it's a pay service, you don't want to give anyone that secret key. 因为是付费服务,最好不要将密钥给任何人。 www.ibm.com 9. Lines 4 and 5 get the initial parameters such as API_KEY and SECRET_KEY from servlet configuration. 第4行和第5行代码从servlet配置中获得初始参数,比如API_KEY和SECRET_KEY。 www.ibm.com 10. A service principal, on the other hand, requires just its secret key to accept GSSAPI contexts. 另一方面,一个服务主体所要求的仅是接受GSSAPI上下文的密钥。 www.ibm.com 1. Security Analysis of a Multistage Chaotic Encryption System and its Secret Key Mapping Technique 一个多级混沌加密系统的安全性分析及其密钥映射技术 service.ilib.cn 2. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret key; 非对称加密,通常被称为“公钥”加密,举例说明:在没有共享密钥的情况下,允许爱丽丝向鲍勃发送一个加密信息; goabroad.zhishi.sohu.com 3. Study of Encryption Techniques Secret Key Image Based 基于密钥图像的加密技术 service.ilib.cn 4. Research on Dynamical Secret Key Building Algorithm in Database Encryption 数据库加密中动态密钥生成算法研究 www.ilib.cn 5. A Secret key's Generation Method Combining with identity information 一种结合身份信息的密钥产生算法 service.ilib.cn 6. feed the result through Rijndael with a secret key; 饲料的结果通过了Rijndael算法的密钥; renheshi.com 7. Distillation of Unconditionally-Secure Secret-Key Against Active Adversaries Based on Smooth Entropy 基于平滑熵的防主动攻击的无条件安全秘密钥的提取 www.ilib.cn 8. The secret-key rate of unconditionally-secure secret-key agreement based on smooth entropy 基于平滑熵的无条件安全秘密钥协商时的密钥速率 www.ilib.cn 9. An Efficient Secret Key Distribution Scheme Based on Interaction-Free Measurement 一种基于无相互作用测量的高效密钥分配方案 www.ilib.cn 10. New Design Algorithm of Secret Key Stream Generator 一种新的密钥流发生器设计算法 service.ilib.cn 1. Design and Realization of Once a Secret Key Encrypt System 一次一密加密系统设计与实现 www.ilib.cn 2. Distillation of Unconditionally-Secure Secret-Key Based on Smooth Entropy 基于平滑熵的无条件安全秘密钥的提取 www.ilib.cn 3. The Secret Key Management of Campus General Card 校园一卡通的密钥管理 service.ilib.cn 4. Privacy with Secret Key Encryption 使用密钥的保密 210.33.23.34 5. The design of the secret key management method based on level quality 具有等级性的密钥管理方法的设计 www.ilib.cn 6. Generating a secret key from the user's password 利用用户密码生成密钥 www.ibm.com 7. Convert SSH secret key to PuTTY format 把SSH秘密密钥转换为PuTTY格式 www.ibm.com |
随便看 |
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。