单词 | crypto- |
释义 |
例句释义: 秘密的,保密的,隐蔽的 1. There does not seem to be sufficient memory available to install additional crypto components. 看来没有足够的内存用于安装额外的密码处理组件。 translations.launchpad.net 2. That it used to be illegal under US law to export crypto to any country, which has been relaxed though, but does not include Cuba. 在以往,根据美国的法律,输出编码方式到其它国家是违法的。虽然这项禁令已放宽不少,但古巴并不在放宽对象之列。 debian.fr 3. Crypto lies at the center of this transition, and we're going to ask a lot of it over the next few years. 密码在这种转变中处于中心地位。在今后的几年中我们对它的需求量将为很大。 www.24en.com 4. For starters, every possible Cipher configuration is always represented by an instance of javax. crypto. Cipher. 对于初学者,每个可能的加密配置总是由一个javax.crypto.Cipher实例表示。 www.infoq.com 5. Before I could get far in my efforts, I needed to figure out what the line import Crypto in the twisted. conch package was trying to find. 在深入工作之前,我需要弄清楚twisted.conch包中的importCrypto那一行究竟有什么用处。 www.ibm.com 6. The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP). Windows密码API(cryptoAPI)密码服务提供程序(CSP)的名称。 msdn2.microsoft.com 7. These entities are usually stored in a file or disk or in a key container owned by a Crypto API Cryptographic Service Provider (CSP). 这些实体通常存储在文件或磁盘中,或者存储在加密API加密服务提供程序(CSP)所拥有的密钥容器中。 technet.microsoft.com 8. The other end of the security negotiation is requires strong crypto but it is not supported on the local machine. 安全协商的另一端要求较强的加密,但本地计算机不支持。 www.fan6.net 9. Each message is transported in its own crypto envelope, which includes both the payload and the identity of the sender. 每条消息都在自己的加密信封中传输,加密信封包含发送者的负载和身份。 www.ibm.com 10. The WebSphere DataPower SOA Appliance allows the crypto objects to be created individually and then selected in the configuration needed. WebSphereDataPowerSOAAppliance允许逐个创建crypto对象,然后在所需的配置中进行选择。 www.ibm.com 1. The receiver, known as Bob in crypto-speak, makes a similarly random decision about which mode to measure the incoming bits. 至于接收者则称为鲍伯,他也随机决定以两种模式之一来量测射入的位元。 edba.ncl.edu.tw 2. To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack. 为进一步提高密码芯片的安全性,密码芯片必须防止简单能量分析和差分能量分析的攻击。 www.dictall.com 3. Meanwhile, you can ask for a special order, like various materials and sizes, Additional "hidden" words on crypto tumblers , etc. 同时你还可以定做,比如各式材质和大小的藏密筒,或在藏密筒的内部加上隐藏的文字等。 dictsearch.appspot.com 4. Crypto causes a diarrheal illness and may rinse off the bodies of infected people or diapered children into the pool. 受感染者或使用尿布的儿童都能将隐孢子虫带到泳池内。 www.kekenet.com 5. DRBD uses the Linux crypto application programming interface and is therefore flexible on the integrity algorithm used. DRBD使用Linux加密应用程序编程接口,因此在完整性算法使用方面是比较灵活的。 www.ibm.com 6. If yes, you need file encryption tool to protect your contents, Touch Crypto is the smart encryption tool just for you. 如果是的话,你需要的文件加密工具来保护您的内容,触摸加密是智能加密工具,只为你。 www.opda.net.cn 7. Mad. Exe (the system attendant process) does not have access to (permission for) the Crypto container. Mad.exe(系统助理进程)不具有访问Crypto容器的权限。 www.microsoft.com 8. Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected. 验证选择了刚刚上载的公钥的配置加密认证的文件名称。 www.ibm.com 9. In this paper, through DBMS CRYPTO, the authors introduce a general database encryption package CIPHER, based on an application example. 基于具体应用实例,介绍了利用DBMS_CRYPTO设计的一个数据库加密程序包CIPHER。 dictsearch.appspot.com 10. When you do so using Office Access 2007 and a file that uses the new file format, Access uses the Windows Crypto API to encrypt the data. 当使用OfficeAccess2007和采用新型文件格式的文件进行此操作时,Access会使用WindowsCryptoAPI对数据进行加密。 office.microsoft.com 1. Giardia: Like crypto, giardia is a microscopic parasite passed through feces, which can cause diarrhea. 鞭毛虫:像是隐孢子虫一样,鞭毛虫是一种极小的寄生虫,它通过粪便传播,能导致腹泻。 featured.1sthotwomen.com 2. replacing all the closed code with open source one: libc_i18n, NFS lock manager, portions of crypto framework, many critical drivers. 使用开源代码替换所有非开源代码包括libc_i18n、NFS锁管理器、加密框架部分以及大量关键的驱动程序。 www.infoq.com 3. Both crypto and isosporiasis cause diarrhoea, nausea, vomiting and stomach cramps. 隐孢子虫病(crypto)和等孢球虫病都会引起腹泻,恶心,呕吐和胃痉挛。 www.bing.com 4. crypto: One who covertly suppORts a certain doctrine, group, OR party. 秘密成员:秘密地支持某一信条、团体或党派的人。 dict.ebigear.com 5. The crypto system or checksum function is invalid because a required function is unavailable . 由于要求的程序不可用,加密系统或校验和函数无效。 www.bing.com 6. The crypto checkpoint files for the resource identified by the GUID. GUID标识的资源的加密检查点文件。 technet.microsoft.com 7. Sectra's voice crypto for tactical radio protects radio communications between vehicles and troops in the field from eavesdropping. Sectra的战术无线电语音加密技术可以保护野外车辆和部队之间的无线电通讯不被窃听。 www.etiri.com.cn 8. Touch Crypto is a smart and handy encryption tools designed specially for touch screen mobile. 触摸加密是一个聪明和方便的加密移动工具专门设计的触摸屏。 www.opda.net.cn 9. The issues in the crypto-battle, the first great war of the digital age, were more straightforward. 数字时代的第一次大战——密码战——中的问题更为直接。 www.24en.com 10. Crypto objects are created and configured into the processing rules. 将创建Crypto对象并将其配置到处理规则中。 www.ibm.com 1. Our flagship product, Security Builder Crypto, initially released in 1997, was the first commercial product based on ECC. 我们的旗舰产品SecurityBuilderCrypto于1997年首次发布,是基于ECC的第一个商业产品。 www.certicom.com 2. In this example, the crypto objects are created as needed while configuring the web service proxy. 在此示例中,将根据需要创建crypto对象,并配置Web服务代理。 www.ibm.com 3. Crypto map cisco client configuration address respond ! 响应客户端地址请求! www.bing.com 4. The crypto solution will be used to protect calls from eavesdropping in Rakel, the Swedish Public Safety Network. 该加密解决方案将用于保护瑞典公共安全网络——Rakel网免遭窃听。 www.etiri.com.cn 5. Cryptosporidiosis (crypto) and isosporiasis are both caused by protozoan parasites. 隐孢子虫病(crypto)和等孢球虫病都是由原生动物寄生虫引起的。 www.bing.com 6. Specifies all elements that are in the crypto settings schema . 指定密码设置架构中的所有元素。 www.bing.com 7. Will feats of crypto really send "digital cash" to replace the paper money, and enable us to spend it in stores? 密码将真能发送“数字现金”代替纸币,使我们能在商店里使用它吗? www.24en.com 8. Native Windows applications often use the Crypto API interface. Windows本地应用程序在很多情况下使用Crypto应用程序接口。 blog.sina.com.cn 9. Using the best available crypto on the weakest platform on the planet won't buy you much security! 在世界上最脆弱的平台上使用最好的加密也不会给您带来多少安全性。 www.ibm.com 10. The Crypto container that contains the private key is corrupted. 包含私钥的Crypto容器已损坏。 www.microsoft.com 1. The MLS is a single Line Replaceable Unit (LRU) with embedded Link-11 Crypto, Data Terminal Set (DTS), and processor card. MLS是一个单链路可替代设备(LRU),内嵌11号链路加密、数据终端设备(DTS)以及处理器卡。 www.etiri.com.cn 2. If you must persist credentials within the client application, encrypt the credentials by using the crypto API functions. 如果必须使凭据在客户端应用程序中持久化,请使用加密API函数来加密凭据。 msdn2.microsoft.com 3. Levchin: Initially, I wanted to do crypto libraries, since I was a freshly mintedacademic. 开始由于我才从纯理论化的“造币厂”出来,所以我想做一个加密库程序。 dictsearch.appspot.com 4. This paper designs a RSA crypto-coprocessor based on the research of RSA cryptographic algorithm. 本文在对RSA密码算法研究的基础上,进行了RSA密码处理器的设计。 www.fabiao.net 5. The classical land of crypto-Judaism , ho were, is Spain. 然而,秘密犹太教存在的最典型的地方是西班牙。 www.fabiao.net 6. Tim calls this movement Crypto Anarchy. 蒂姆管这种运动叫作“密码的混乱状态”。 dictsearch.appspot.com 7. All elements in the crypto settings schema. 加密设置架构中的所有元素。 msdn2.microsoft.com 8. Start with two text boxes: one for unencoded text and one for the Crypto. 首先创建两个文本框:一个用于未编码的文本,另一个用于密码。 www.ibm.com 9. A number of fixes to crypto support. 了大量的修正,以加密的支持。 www.linux-ren.org 10. And we did, and it was very simple because we already had all the crypto stuff figured out. 接着我们就非常容易的做出来了,因为我们已经拥有加密算法。 dictsearch.appspot.com 1. The ordered crypto products will be delivered by summer 2010. 这份加密产品定单将在2010年夏天交付。 www.etiri.com.cn 2. In order to generate a signature, we use the javax. crypto and java. security packages we imported while stubbing out GSUtils. 为了生成一个签名,我们需要使用GSUtils类中导入的javax.crypto和java.security程序包。 www.ibm.com 3. nowadays , more and more ic cores based on all kinds of crypto algorithm appear. 目前,基于各种密码算法的集成电路芯片已经出现。 www.ichacha.net 4. Theory and method of general security is explored without knowledge about algorithm and its details implemented in crypto chip; 探索了一种在未知密码芯片所实现的算法及相关细节的前提下,测试其一般安全性能的理论和方法; www.pet2008.cn 5. Theory and methods of key test is proposed according to the algorithm implemented in and power leakage from crypto chip; 提出了根据密码芯片所实现的密码算法及其能耗泄露,进行密钥测试的理论和方法; www.pet2008.cn 6. The Application of Coding Sequence of Pseudo-prime in Public Key Crypto-systems of the Knapsack Vector 伪素数编码序列在背包向量公钥密码体制中的应用 www.ilib.cn 7. Secure scheme of completely-varied binary quantum crypto algorithm implemented on e-government 全变异二进制位量子加密算法对电子政务实施的安全方案 www.ilib.cn 8. The new building advancement of American army's crypto equipment 美军密码装备建设新进展 www.ilib.cn 9. Application of the Logic Crypto Memory in the Gas Machine of Intelligent Card 逻辑加密存储芯片在智能卡加油机中的应用 www.ilib.cn 10. Cores to implement crypto in hardware for performance and security benefits 用于在硬件中实施加密以获得性能和安全优势的核心 www.certicom.com 1. On Determining the Type of a Symmetric Key Crypto-algorithm and How to Evaluate Its Security 对称密钥密码算法的类型测定及其安全性评估 service.ilib.cn 2. Cascade characters and applications of Bent function in crypto system 密码体制中Bent函数的级联的性质与应用 www.ilib.cn 3. Research and design of the multiprocessor control technology for the crypto device based on FPGA 基于FPGA的密码设备多处理器协调控制技术研究与设计 www.ilib.cn 4. complements rather than replaces private key crypto 是对对称密钥加密的补充而不是取代 wenku.baidu.com 5. Research on formalized method of crypto protocol analysis 密码协议分析的形式化方法研究 www.ilib.cn 6. Private Crypto Platform for Public Computing 公共计算专用密码平台 www.ilib.cn 7. The research and application of secure-defending crypto PC 安全防护涉密PC的研制与应用 www.ilib.cn 8. Programmable processor architecture for crypto information based on EPIC 基于EPIC技术的密码处理器体系结构研究与设计 ilib.cn 9. World's three public appraisals on crypto algorithms 世界三次大规模密码算法评选活动介绍 www.ilib.cn 10. Show crypto engine connections active 显示当前连接情况 bbs.51cto.com 1. The Application of Number Theory in Public Key Crypto System 关于数论在公开密钥加密体制中的应用 ilib.cn 2. Study and design of generating meet-keybased on elliptic curve crypto-protocol 基于椭圆曲线密码协议产生会话密钥的研究与设计 www.ilib.cn 3. crypto key ? generate Generate new keys 生成新的密钥 wenku.baidu.com 4. Study on quantum crypto technology 量子密码技术探究 www.ilib.cn 5. Enter name for public crypto certificate, WS-dsig-receiver-public 输入公共加密证书的名称WS-dsig-receiver-public。 www.ibm.com 6. Applications of crypto technology in the field of tax-controlled anti-forgery 密码技术在税控防伪领域中的应用 www.ilib.cn 7. Crypto Bibliography and Web Sites 密码学参考书目与网站 www.philzimmermann.com 8. A Method to Encode Crypto-key with Row Function 用函数列作密钥的加密方法 service.ilib.cn 9. How to Speak Crypto A cipher or cryptosystem is used to encrypt the plaintext 一个密码或者密码系统被用来加密明文 wenku.baidu.com 10. crypto map mymap interface outside 将加密静态映射图应用于外网接口 blog.sina.com.cn 1. Crypto map shiju interface outside 在外网口应用加密图 bbs.stcore.com 2. Security Builder Crypto is highly flexible and can work in a wide range of applications and devices, such as SecurityBuilderCrypto灵活性很强,可用于多种应用程序和设备,如 www.certicom.com |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。