网站首页  词典首页

请输入您要查询的英文单词:

 

单词 cryptographic
释义

cryptographic

美 [?kr?pt?'græf?k]
英 ['kr?pt??'græf?k]
  • adj.关于暗号的
  • n.隐晶文象状
  • 网络密码;密码的;用密码写的
adj.
1.
关于暗号的
n.
1.
隐晶文象状

例句

释义:
1.
When in "record" mode, these dwell times are expanded into a string and used to generate a cryptographic hash of the signature.
当处于“record”模式时,这些停顿时间将被扩展为字符串并用于生成签名的密码散列。
www.ibm.com
2.
The developed signature will then be transformed into a cryptographic hash and stored on disk to be compared later during the monitor phase.
然后,开发的签名将被转换为密码散列并存储到磁盘中,以供稍后在监视阶段中进行比较。
www.ibm.com
3.
After setting up the cryptographic library, the next step is to exchange certificates between the systems.
设置CryptographicLibrary之后,下一步是在系统之间交换证书。
www.ibm.com
4.
An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site.
Java密码扩展系统的一个实现在Sun的网站中可以找到密码服务提供者的目录。
www-128.ibm.com
5.
They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one.
他们可以寻找密码算法中的缺陷,然后恶意修改它们,让强的加密算法变弱。
www.ibm.com
6.
Again , let us remind you that using proprietary cryptographic algorithms , including hash functions, is usually a bad idea .
再次提醒您,使用专用密码演算法,包括杂凑函数,通常是一个坏主意。
www.bing.com
7.
The specified cryptographic service provider cannot be used for the selected Certificate Template.
不能为所选的证书模板使用指定的加密服务提供程序。
www.fan6.net
8.
A popular idea is to have email servers provide cryptographic keys so that messages can be verified as they arrive in an inbox.
其中呼声很高的一个方案就是要求邮件服务器提供密匙,以便当邮件抵达时,判断其有效性。
dream4ever.org
9.
You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application.
可以使用此方法确定选定的加密算法和强度是否满足您的应用程序的要求。
msdn2.microsoft.com
10.
BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography.
BLS短签名是双线性密码学中应用最为广泛的密码元件之一。
dictsearch.appspot.com
1.
Unable to store the public cryptographic key of this computer. This computer cannot send or receive encrypted messages.
无法存储这台计算机的公用加密密钥。这台计算机无法发送或接收经过加密的消息。
www.dictall.com
2.
Gets or sets the name of the cryptographic provider used to generate the digital signature of the message.
获取或设置用于生成消息数字签名的加密提供程序的名称。
www.kuenglish.info
3.
The public cryptographic key of this computer cannot be stored. This computer cannot send or receive encrypted messages.
无法存储此计算机的公用密钥。此计算机无法发送或接收加密消息。
www.dictall.com
4.
When overridden in a derived class, creates an instance of the specified implementation of a cryptographic random number generator.
在派生类中重写时,创建加密随机数生成器的指定实现的实例。
technet.microsoft.com
5.
The root of trust within a cryptographic system starts with a key, which needs to be accessed and stored securely .
加密系统中的信任根从需要安全访问和存储的密钥开始。
www.bing.com
6.
Class defines the algorithm used for a cryptographic operation.
类定义用于加密操作的算法。
msdn2.microsoft.com
7.
A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.
身份验证服务器使用目标服务器的一个密码密钥将票据提供给客户端。
www.ibm.com
8.
On top of it are the middle layer of access, audit, and cryptographic controls and then the outermost layer of technologies.
其上部是包含访问、审核和加密控制的中间层,然后是技术所在的最外层。
www.ibm.com
9.
Specify the location of a key container from the system's cryptographic service provider (CSP) to use to name the assemblies.
指定用于命名组件的系统中,密码编译服务提供者(CSP)的金钥容器位置。
msdn.microsoft.com
10.
Principals share their cryptographic key with the authentication server of the realm to which they belong.
主体与它们所属领域的身份验证服务器共享密钥。
www.ibm.com
1.
Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash.
先尝试在普通使用场景下键入数千个单词,然后再输出密码散列。
www.ibm.com
2.
Specifies the name of the cryptographic provider on the system.
指定系统上的加密提供程序的名称。
msdn2.microsoft.com
3.
You do not have to generate a new cryptographic key pair for every assembly you want to give a strong name.
您不必为您希望赋予强名称的每个程序集生成新的加密密钥对。
www.kuenglish.info
4.
This firmware is available on a limited basis from IBM, and essentially turns the 4758 Coprocessor into a cryptographic processor.
这个固件在来自IBM的受限基础上可用,并在本质上将4758Coprocessor变成了密码处理器。
www.ibm.com
5.
The previous step generates cryptographic keys and a password used in LTPA token generation.
之前的步骤生成用于生成LTPA令牌的密钥和密码。
www.ibm.com
6.
It prevents saving configuration in IBM Cognos Configuration by guarding the establishing of cryptographic information with a password.
它用密码保护密码学信息的建立,从而阻止在IBMCognosConfiguration中保存配置。
www.ibm.com
7.
Provided the session key has not been compromised , the value of the cryptographic function will be the same at each of the correspondents .
该值与生成会话密钥所需的信息一起在对应方之间进行传输。
www.bing.com
8.
The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).
Windows密码API(cryptoAPI)密码服务提供程序(CSP)的名称。
msdn2.microsoft.com
9.
These entities are usually stored in a file or disk or in a key container owned by a Crypto API Cryptographic Service Provider (CSP).
这些实体通常存储在文件或磁盘中,或者存储在加密API加密服务提供程序(CSP)所拥有的密钥容器中。
technet.microsoft.com
10.
Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
黑客可以利用密码分析技术或恶意的实例资源破解密码算法。
www.ibm.com
1.
Outlook uses certificates in cryptographic e-mail messaging to help provide more secure communications.
Outlook在电子邮件加密中使用证书来帮助提供更加安全的通信。
office.microsoft.com
2.
Creates an instance of an implementation of a cryptographic random number generator.
建立密码编译乱数产生器之实作的执行个体。
technet.microsoft.com
3.
The value of the cryptographic function cannot be compromised or modified without access to the session key .
只要该会话密钥没有受到损害,对应双方的加密函数值就是相同的。
www.bing.com
4.
Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.
其他特性还包括加密散列函数,加密转换库和加密硬件支持。
www.ibm.com
5.
You must have at least one cryptographic service provider installed to perform this operation.
要执行这个操作,至少要安装一个加密服务提供程序。
www.fan6.net
6.
Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.
SecureSocketsLayer(SSL)协议是一种加密协议,可为网络上的数据通信提供隐私和安全保障。
www.ibm.com
7.
The certificates used in SSL contain identity information and are encapsulated in a cryptographic envelope to prevent tampering.
SSL中使用的证书包含标识信息,并被压缩在一个加密的信封中以防篡改。
www.ibm.com
8.
"Key Management" is the term used to encompass the various actions related to the generation and protection of cryptographic keys.
“密钥管理”是一个术语,包括与生成和保护密钥相关的各种操作。
www-128.ibm.com
9.
This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.
此实现不是Windows平台FIPS验证的加密算法的一部分。
msdn2.microsoft.com
10.
Moreover, the cryptographic mode will offer India a first national secure identification capability for protecting its own assets.
此外,加密模块将为印度提供第一个国家安全识别能力以保护自己的资产。
www.etiri.com.cn
1.
Shiro tries to simplify the entire concept of cryptographic ciphers by introducing its CipherService API.
Shiro通过引入它的CipherServiceAPI试图简化加密密码的整个概念。
www.infoq.com
2.
Most importantly, cryptographic authentication information can be stolen.
最重要的是,密码认证信息可能被盗。
www.ibm.com
3.
Creates the specified cryptographic object used to perform the asymmetric algorithm .
创建用于执行不对称算法的指定加密对象。
www.bing.com
4.
The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.
签发机构在证书上“签名”,用的是通过一种密码算法产生的散列值。
www.infoq.com
5.
Typical solutions for maintaining confidentiality and integrity involve using pre-existing secure protocols and cryptographic algorithms.
维护机密性和完整性的典型解决方案涉及使用现有的安全协议和加密算法。
www.ibm.com
6.
We have briefly discussed our encryption strategy in the last section (Java Cryptographic Architecture).
在上一节(Java密码体系结构)中,我们已经简要地讨论了我们的加密策略。
www.ibm.com
7.
The name of the CryptoAPI cryptographic service provider.
CryptoAPI加密服务提供程序的名称。
msdn2.microsoft.com
8.
The stream on which to perform the cryptographic transformation.
对其执行加密转换的流。
msdn2.microsoft.com
9.
Creates an instance of a cryptographic object to perform the Data Encryption Standard (DES) algorithm .
创建加密对象的实例以执行数据加密标准(DES)算法。
www.bing.com
10.
Provide the realization scheme of the simulated distributive and parallelized cryptographic algorithm.
给出模拟的分布式、并行化密码算法实现方案。
dictsearch.appspot.com
1.
Data cryptographic techniques. Procedures for the registration of cryptographic algorithms.
信号系统的安全.数据密码技术.密码算法的记录程序
www.mapeng.net
2.
First countermeasures for the exponentiation computation of RSA cryptographic algorithm were summarized.
综述了rsa密码算法中模幂运算的主要攻击方法及其防御措施。
www.ceps.com.tw
3.
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
www.ibm.com
4.
The employment of cryptographic methods for securing data at rest is still relatively uncommon.
采用加密方法保障静态数据安全的做法目前相对来说仍不是很常见。
www-128.ibm.com
5.
Adnan began applying differential cryptoanalysis and similar standard cryptographic techniques.
Adnan开始进行差异性密码分析及执行相关的标准密码分析技术。
hi.baidu.com
6.
NetBSD uses the cryptographic device driver (CGD) to implement an encrypted file system with a virtual device.
NetBSD使用加密设备驱动程序(CGD)通过虚拟设备实现加密的文件系统。
www.ibm.com
7.
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
此特性让这三种关键的安全技术能够利用ACF提供的硬件密码计算加速设施。
www.ibm.com
8.
In cryptography, the result of securing a block of data by applying a cryptographic function.
利用加密函数对数据块加密的结果。
www.hotdic.com
9.
Symmetric cryptographic operations are efficient than a standard asymmetric cryptographic operations.
对称密码操作比标准的不对称密码操作更有效。
www.ibm.com
10.
This member makes a link demand for the ECMA public key, which is not a valid cryptographic key but a pseudo key.
此成员要求链接到ECMA公钥,此公钥不是一个有效的加密密钥,而是一个伪密钥。
msdn2.microsoft.com
1.
Creates a default cryptographic object used to perform the symmetric algorithm .
创建用于执行对称算法的默认加密对象。
www.bing.com
2.
Data cryptographic techniques. Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.
信息技术.数据密码技术.采用字组数字算法检验密码的数据完整性机制
www.mapeng.net
3.
Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm .
定义访问数据加密标准(DES)算法的加密服务提供程序(CSP)版本的包装对象。
www.bing.com
4.
FIPS 140-2 is the U. S. government computer security standard used to accredit cryptographic modules.
FIPS140-2是用于授权数据加密模型的政府电脑安全性标准。
www.ibm.com
5.
The certificate cannot be installed because of a problem with the cryptographic hardware.
由于加密硬件的问题,无法安装证书。
www.fan6.net
6.
Cryptographic transformations that use asymmetric keys consume significant resources.
使用非对称密钥进行的加密转换会消耗大量资源。
msdn2.microsoft.com
7.
Determines the set of valid key sizes for the symmetric cryptographic algorithms.
确定对称加密算法的有效密钥大小设置。
msdn2.microsoft.com
8.
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
密码技术主要包括对称密码算法和非对称密码算法及协议。
dictsearch.appspot.com
9.
A digital certificate is a file that binds a public cryptographic key with an identity (a user or an organization).
数字证书是一个文件,它绑定了一个带识别码的公用密钥(一个用户或者一个组织)。
www.ibm.com
10.
The content of the cryptographic message has not been decrypted yet.
尚未解密加密消息的内容。
www.fan6.net
1.
The cryptographic strength of HMAC depends on the properties of the underlying hash function.
HMAC的加密强度取决于基础哈希函数的属性。
msdn2.microsoft.com
2.
The cryptographic message does not contain an expected authenticated attribute.
加密消息没有包含预期的验证属性。
angel.w15.5tom.cn
3.
Creates a cryptographic object used to perform the asymmetric algorithm.
创建用于执行不对称算法的加密对象。
msdn2.microsoft.com
4.
Optional features including internal hard drives, hardened cryptographic modules, and additional compact flash bays.
可选特性包括内置硬盘驱动器、硬加密模块,以及更多的闪存架(flashbay)。
www.ibm.com
5.
In a central location, create a backup of the old machine, the CA cryptographic keys, and database.
在中央位置,创建旧机器,CA密钥和数据库的备份。
blog.sina.com.cn
6.
Delegate determines whether authentication succeeds. The security protocol and cryptographic algorithms are already selected when the.
委托的方法时已经选择安全协议和加密算法。
msdn2.microsoft.com
7.
Specifies the cryptographic service providers available for validating digital signatures.
指定可用于验证数字签名的加密服务提供程序。
msdn2.microsoft.com
8.
This paper addresses a low-cost VLSI implementation of the Advanced Encryption Standard (AES) cryptographic engine.
本篇论文描述一个低成本进阶加密标准加密引擎的积体电路实现。
dictsearch.appspot.com
9.
The cryptographic protocol is one of the key problems.
网络安全的关键问题之一是密码协议的安全性。
www.fabiao.net
10.
The private key being imported is not supported by the targeted Cryptographic Service Provider.
将要导入的私钥不被目标加密服务提供程序支持。
www.fan6.net
1.
Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication between clients and servers.
TransportLayerSecurity(TLS)是一种密码协议,可以在客户机和服务器之间提供安全的通信。
www.ibm.com
2.
When overridden in a derived class, gets the specified asymmetric cryptographic algorithm.
在派生类中重写时,获取指定的非对称加密算法。
technet.microsoft.com
3.
Creating and managing keys is an important part of the cryptographic process.
建立和管理金钥是密码编译处理中重要的一部分。
technet.microsoft.com
4.
A good document cryptographic system , the security which works to you greatly strengthens .
一个不错的文件加密系统,对你工作的安全大大加强。
www.bing.com
5.
For SSO to function properly, all servers must agree on cryptographic keys, user information, and miscellaneous other configuration data.
为了让SSO正常工作,所有服务器必须同意密钥、用户信息和各种其他配置数据。
www.ibm.com
6.
The cryptographic service provider cannot be found.
无法找到加密服务提供程序。
msdn2.microsoft.com
7.
For this traffic to be best protected, strong cryptographic ciphers should be used.
为了更好地保护通信流,应该使用强密码。
www.ibm.com
8.
An automated verification tool for analyzing time-dependent cryptographic protocol was proposed and implemented.
设计并实现了一个时间相关安全协议的自动验证工具。
www.ceps.com.tw
9.
Describes how to help create a cryptographic scheme from the various cryptographic primitives.
描述如何从各种加密基元创建加密方案。
technet.microsoft.com
10.
Cryptographic properties analysis of boolean "Composition Function"
布尔“复合函数”的密码学性质分析
service.ilib.cn
1.
Nowadays, the RSA based cryptographic system is widely used in bank, e-business, e-government, etc.
当今,RSA算法加密系统广泛应用于银行、电子商务、电子政务等领域。
www.xuehi.com
2.
Defines a wrapper object to access the cryptographic service provider (CSP) version of the TripleDES algorithm.
定义访问TripleDES算法的加密服务提供程序(CSP)版本的包装对象。
msdn2.microsoft.com
3.
This section describes the key cryptographic tasks that you can perform to create a cryptographic scheme.
本章节描述您可以执行用来建立密码编译配置的金钥密码编译工作。
technet.microsoft.com
4.
Gets or sets the name of the cryptographic key container.
获取或设置加密密钥容器的名称。
msdn2.microsoft.com
5.
Describes conversion issues for cryptographic applications.
说明加密应用程序的转换问题。
msdn2.microsoft.com
6.
The skills involved are software skills, hardware skills, cryptographic skills and interpretative skills.
当中涉及的技术包括软件技术、硬件技术、密码技术及解释技术。
www.icac.org.hk
7.
Isolating the application also provides an added level of security because all cryptographic information stays within the device.
应用程序的隔离还提供了添加的安全性层,因为所有的密码信息驻留在设备里。
www.ibm.com
8.
In popular symmetric ciphers, the S-box substitution is the core operation that dominates the execution of cryptographic algorithms.
盒代换是大多数对称密码算法的核心操作,加快S盒代换是提高密码编码处理速度的关键。
www.dictall.com
9.
Public-key cryptographic algorithms use a fixed buffer size whereas secret-key cryptographic algorithms use a variable-length buffer.
公钥加密算法使用固定的缓冲区大小,而私钥加密算法使用长度可变的缓冲区。
msdn2.microsoft.com
10.
In principle, the technique provides the makings of an unbreakable cryptographic key.
原则上,这种技术可以做出无法破解的秘密钥匙。
edba.ncl.edu.tw
1.
The interfering signal is produced by cryptographic algorithm , with good restoration resistance .
干扰信号由密码算法产生,具有良好的抗还原性能。
www.bing.com
2.
Due to good cryptographic properties, orthomorphisms play an important role in cryptography for resisting cryptanalysis.
正形置换具有良好的密码学性质,可用于分组密码的设计以抵抗密码分析。
www.dictall.com
3.
Messages sent over the wireless in the World War II era could be intercepted so the Germans used a cryptographic device.
二战时,通过无线电传输的情报会被敌方拦截,因此德国人发明了一条密码装置。
www.bing.com
4.
Secondly, the author analyzes briefly the methods of cryptographic technology and the component of PKI correlative with this design.
然后文章对与本设计相关的密码技术的基本原理和PKI组件作了简要介绍,并予以论述与分析。
www.fabiao.net
5.
Similarly, the easiest way to compromise the security of a modern cryptographic cipher is to steal the key.
同样,危害现代加密的安全的最简单的方法是窃取密钥。
www-128.ibm.com
6.
openCryptoki provides application portability by isolating the application from the details of the cryptographic device.
openCryptoki通过将应用程序从密码设备细节的分离来提供应用程序的可移植性。
www.ibm.com
7.
Due to the lack of both XML and cryptographic APIs, the current MIDP 1. 0 specification does not support secure XML standards.
因为缺乏XML和密码API,当前的MIDP1.0规范不支持安全XML标准。
www.ibm.com
8.
Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms.
大多数数位签章系统将公钥密码学和密码杂凑演算法结合使用。
www-128.ibm.com
9.
You need the mkpasswd program (included in most Linux distributions) for generating the cryptographic hashes of the keystroke signatures.
您需要使用mkpasswd程序(附带于大多数Linux分发版中)才能生成击键签名的密码散列。
www.ibm.com
10.
We ll also provide links to other cryptographic packages believed to be robust.
我们还将提供其他被认为是很健壮的密码套装软体的连结。
www-128.ibm.com
1.
The cryptographic message does not contain all of the requested attributes.
加密消息不包含所有请求的属性。
angel.w15.5tom.cn
2.
This requires that a certificate for the externally visible hostname be stored in a Cryptographic Message Syntax (CMS) key database file.
这要求将外部可见的主机名的凭证存储在一个CryptographicMessageSyntax(CMS)密钥数据库文件中。
www.ibm.com
3.
This consideration particularly holds true for cryptographic libraries.
对于密码库,这种考虑尤其适用。
www-128.ibm.com
4.
These classes are part of the Bouncy Castle group's open source cryptographic implementation for the J2ME platform.
这些类是BouncyCastle组的J2ME平台开放源代码加密实现的一部分。
www.ibm.com
5.
Interface that defines the basic operations of cryptographic transformations.
定义加密转换基本操作的接口。
msdn2.microsoft.com
6.
Unlike other outlets, we provide a high security anonymous drop box fortified by cutting-edge cryptographic information technologies.
和其他媒体不同的是,我们提供一个高度安全的匿名泄密箱,这些信息箱绑定了尖端的加密信息技术。
www.bing.com
7.
Side-channel attack is a new cryptanalysis, and the current cryptographic algorithms are vulnerable to higher-order side-channel attack.
旁路攻击是一种新的密码分析方法,现有的密码算法仍然容易遭受高阶旁路攻击。
www.dictall.com
8.
Creates a new instance of the specified cryptographic object with the specified arguments.
用指定的参数创建指定的加密对象的新实例。
msdn2.microsoft.com
9.
Cryptographic random number generators create cryptographically strong random values .
加密随机数生成器创建加密型强随机值。
www.bing.com
10.
Specifies flags that modify the behavior of the cryptographic service providers (CSP).
指定修改加密服务提供程序(CSP)行为的标志。
msdn2.microsoft.com
1.
Importantly, these cryptographic requests consume more resources per call than other request types.
这点很重要,因为这些加密请求比其他类型的请求消耗更多的资源。
www.infoq.com
2.
This allows a long running exchange to use symmetric cryptographic operations to protect the messages during an established session.
这允许一个长时间运行的会话使用对称密码操作在一个已建立的会话期间保护消息。
www.ibm.com
3.
Provides an interesting discussion about the difficulties of implementing a cryptographic solution.
对实现加密解决方案的困难之处进行了有趣的讨论。
www-128.ibm.com
4.
Specifies the cryptographic key operation for which an authorization rule controls access or auditing .
指定授权规则控制其访问或审核的加密密钥操作。
www.bing.com
5.
For instance, changes to cryptography in the core layer require changes to the cryptographic controls, and vice versa.
例如,对核心层的加密技术的更改要求对加密控制进行更改,反之亦然。
www.ibm.com
6.
CBC is a mode of cryptographic operation in which the plain text data is divided into chunks of equally sized data blocks.
CBC是一种加密操作模式,其中纯文本数据分为同样大小的数据块。
www.ibm.com
7.
Cryptographic digital signatures use public key algorithms to provide data integrity.
加密数字签名使用公钥算法提供数据完整性。
msdn2.microsoft.com
8.
CPRM Content Protection for Recordable Media is a cryptographic technology to protect the copyright.
CPRMContentProtectionforRecordableMedia是为保护著作权的加密技术。
rwppi.com
9.
Defines the basic operations of cryptographic transformations.
定义基本的加密转换运算。
msdn2.microsoft.com
10.
This abstract class is provided as the base class for all cryptographic random number generators.
此抽象类作为所有加密随机数生成器的基类提供。
msdn2.microsoft.com
1.
The jamming signal is produced by cryptographic algorithm, with good restoration resistance.
干扰信号由算法产生,具有良好的抗还原性能。
dictsearch.appspot.com
2.
Represents the base class from which all implementations of cryptographic hash algorithms must derive.
表示所有加密哈希算法实现均必须从中派生的基类。
msdn2.microsoft.com
3.
we ll also get down to brass tacks , and actually study some real cryptographic packages , complete with code examples.
我们还将讨论实质问题,并实际研究一些真正的密码套装软体,包括程式范例。
www.ichacha.net
4.
When overridden in a derived class, gets a transform that encrypts XML using the specified cryptographic algorithm.
在派生类中重写时,获取一个使用指定的加密算法加密XML的转换。
msdn.microsoft.com
5.
For more information on cryptographic configuration, see Configuring Cryptography Classes.
有关加密配置的更多信息,请参见配置加密类。
technet.microsoft.com
6.
This handshake produces the cryptographic parameters of the session.
此次握手将生成会话的加密参数。
www.ibm.com
7.
Not a cryptographic message or the cryptographic message is not formatted correctly.
不是一个加密消息或加密消息的格式不正确。
www.drados.com
8.
A key is a unit of cryptographic data, an authentication token, or some similar element represented in the kernel by struct key.
密钥(key)是一组密码学数据、身份验证标记或某些相似的元素,它在内核中由structkey表示。
www.ibm.com
9.
Provable Security is the essential requirement of modern cryptographic schemes.
可证明安全是现代密码方案的基本要求。
www.gs.sjtu.edu.cn
10.
Object that is initialized to the URL identifier of the cryptographic algorithm used to generate the session key .
对象,该对象被初始化为用来生成会话密钥的加密算法的URL标识符。
www.bing.com
1.
Never store a symmetric cryptographic key in plaintext or transfer a symmetric key between machines in plaintext.
不要以纯文本格式存储对称加密密钥,也不要用纯文本在计算机之间传输对称密钥。
msdn2.microsoft.com
2.
Algebraic immunity is a new cryptographic criterion proposed to against algebraic attacks.
代数免疫是随着代数攻击的出现而提出来的一个新的密码学特性。
www.jsjkx.com
3.
This is a cryptographic protocol that takes as its inputs, among others, any attributes to be encoded into the token.
这是在一部分输入和属性需要编码到令牌中的时候所要采用的加密协议。
www.infoq.com
4.
Note Windows 2000 does not list Cryptographic Services in the SERVICES Administrative Utility.
注意:Windows2000未在“服务”管理实用工具中列出“CryptographicServices”。
support.microsoft.com
5.
The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.
NFSRPC请求可以使用密码认证的能力提供了端到端的NFS安全支持。
www.ibm.com
6.
Relevant technologies, such as certificates and cryptographic keys, can be used to reflect and manage these trust relationships.
证书和密钥之类的相关技术可用于反映和管理这些信任关系。
www.ibm.com
7.
Provides an overview of cryptographic services provided by the. NET Framework SDK.
提供由.NETFrameworkSDK提供的加密服务的概述。
msdn2.microsoft.com
8.
The maximum provided by the default Cryptographic Service Provider.
默认的加密服务提供程序提供的最大值。
msdn2.microsoft.com
9.
You must have a cryptographic key pair to sign the assembly with a strong name.
您必须拥有密码编译金钥组以使用强式名称来签署组件。
technet.microsoft.com
10.
Generating cryptographic key and setting key protection. . .
正在生成加密密钥并设置密钥保护…
www.dictall.com
1.
Authentication may be through simple passwords or through MD5 cryptographic checksums.
验证可以通过简单的密码,或通过加密的MD5校验。
chinaunix.net
2.
Cryptographic authentication uses mathematics and a digital secret in order to authenticate users.
密码认证使用数学和数字秘密来认证用户。
www-128.ibm.com
3.
Set the Cryptographic Services to Automatic, and then try to install the program again.
将“加密服务”设置为“自动”,然后尝试再次安装此程序。
support.microsoft.com
4.
You must have a cryptographic key pair to sign an assembly with a strong name.
要使用强名称为程序集签名,必须具有加密密钥对。
msdn2.microsoft.com
5.
There are a variety of cryptographic algorithms to choose from when performing encryption.
在执行加密时,有多种密码学算法可供选择。
www.ibm.com
6.
The streamed cryptographic message requires more data to complete the decode operation.
流程式加密消息需要更多数据才能完成解码。
www.fan6.net
7.
These days, the implementation of cryptographic algorithm has the trend to use hardware more than software.
目前密码算法的实现逐渐由软件向硬件实现过渡,硬件实现的密码产品越来越多。
www.fabiao.net
8.
Every time cryptographic authentication is to be used, a password must be given in order to decode the key.
每次要使用密码认证时,必须给出一个密码以解码密钥。
www-128.ibm.com
9.
An end-entity certificate is a certificate that has been created for specific application cryptographic usage.
终端实体证书是为特定应用程序加密用法创建的证书。
technet.microsoft.com
10.
The menu will then change to include several cryptographic options for the partition.
选项。菜单将包含分区的加密选项。
debian.fr
1.
Cryptographic transform libraries in OpenBSD include Blowfish, Data Encryption Standard (DES), 3DES, and Cast.
OpenBSD中的加密转换库包括Blowfish、数据加密标准(DES)、3DES和Cast。
www.ibm.com
2.
Links data streams to cryptographic transformations.
将数据流链接到加密转换。
msdn2.microsoft.com
3.
A cryptographic module for embedded security across devices and in constrained environments.
这是一种用于各种设备和约束环境中的嵌入式安全性的加密模块。
www.certicom.com
4.
Specifies the mode of a cryptographic stream.
指定加密流的模式。
msdn2.microsoft.com
5.
As with any cryptographic keys, these should be changed periodically.
与任何密码术密钥一样,应该定期改变这些密钥。
www.ibm.com
6.
An error occurred while performing an operation on a cryptographic message.
在进行加密消息操作时出错。
www.fan6.net
7.
There are mainly two systems of cryptographic algorithms--the symmetric key cryptosystem and the public key cryptosystem.
目前商用的密码算法主要有两大体系:对称密钥加密体系和公钥加密体系。
www.boshuo.net
8.
Random number generation is integral to many cryptographic operations.
随机数生成是许多加密操作不可分割的组成部分。
msdn2.microsoft.com
9.
In addition to the basic security providers, IBM also provides for FIPS compliance and support for cryptographic hardware, where available.
除了基本的安全性提供者之外,IBM还为密码术硬件提供了FIPS支持。
www.ibm.com
10.
While in decryption, scrambled data is turned back into the original text by using a cryptographic key.
解密时,通过使用加密密钥将经过编码的数据转换为原始文本。
office.microsoft.com
1.
A StrongNameKeyPair object containing the public and private cryptographic key pair.
包含加密公钥和私钥对的StrongNameKeyPair对象。
msdn2.microsoft.com
2.
The content of the cryptographic message has already been decrypted.
已解密加密消息的内容。
www.fan6.net
3.
DNA cryptography is a new born cryptographic field emerged with the research of DNA computing.
DNA密码是伴随着DNA计算的研究而出现的密码学新领域。
dictsearch.appspot.com
4.
Uses a cryptographic exchange with the user's Microsoft Internet Explorer Web browser.
使用与用户的MicrosoftInternetExplorerWeb浏览器的加密交换。
msdn2.microsoft.com
5.
PKCS #11 is the de facto standard for interfacing to cryptographic hardware devices in a unified manner.
PKCS#11是以统一方式建立与密码硬件设备接口的事实标准。
www.ibm.com
6.
Represents an access rule for a cryptographic key.
表示加密密钥的访问规则。
msdn2.microsoft.com
7.
Two types of evidence, strong names and Authenticode publishers, are based on cryptographic keys and digital signature technology.
强名称和Authenticode出版商这两种类型的证据都基于密钥和数字签名技术。
msdn2.microsoft.com
8.
B- Crypt A symmetric cryptographic algorithm designed by British Telecom .
英国电信公司提出的对称密码算法。
www.bing.com
9.
All cryptographic keys will be deleted and should be exported before continuing.
所有密钥将被删除,并且在继续前应导出。
www.fan6.net
10.
It's hard to get a cryptographic algorithm published.
发表一个密码学算法是很困难的。
www.vipcareer.com
1.
For more information on this process of encrypting and transferring the key and IV, see Creating a Cryptographic Scheme.
有关加密和传输密钥与IV的过程的更多信息,请参见创建加密方案。
msdn.microsoft.com
2.
Object establishes a cryptographic key by a key agreement algorithm or a key transport algorithm.
对象是按密钥协议算法还是密钥传输算法建立加密密钥。
msdn2.microsoft.com
3.
Represents an audit rule for a cryptographic key.
表示加密密钥的审核规则。
msdn2.microsoft.com
4.
Sets the default Cryptographic Service Provider (CSP) to use for strong name signing.
将默认加密服务提供程序(CSP)设置为用于强名称签名。
msdn2.microsoft.com
5.
Specifies the filename containing the cryptographic key.
指定包含加密密钥的文件名。
msdn2.microsoft.com
6.
The Defense Department is modernizing its cryptographic key fill technology, replacing its obsolete KYK-13 devices.
美国国防部正在对加密密钥填充技术进行升级,将取代其过时的KYK-13设备。
www.etiri.com.cn
7.
Computes the SHA1 hash value for the input data using the implementation provided by the cryptographic service provider (CSP).
使用加密服务提供程序(CSP)提供的实现计算输入数据的SHA1哈希值。
msdn2.microsoft.com
8.
Every write to the cryptographic stream object passes the data through this method.
对加密流对象的每个写入均通过此方法传递数据。
msdn2.microsoft.com
9.
The cryptographic algorithm is public in modern cryptography.
现代密码体制中,加密算法是公开的。
kns50.chkd.cnki.net
10.
When you use the DPAPI, you alleviate the difficult problem of explicitly generating and storing a cryptographic key.
使用DPAPI可以减轻显式生成和存储加密密钥的难题。
msdn2.microsoft.com
1.
When you use cryptographic methods, the cryptographic keys must remain secret.
当使用加密方法时,必须对加密密钥保密。
office.microsoft.com
2.
Creates a new instance of the specified cryptographic object.
创建指定的加密对象的新实例。
msdn2.microsoft.com
3.
Object that represents the current cryptographic attribute in the.
集合中的当前加密属性。
msdn2.microsoft.com
4.
If you want to move multiple certificates in one file from one computer to another, use the Cryptographic Message Syntax Standard.
如果要将一个文件中的多个证书从一台计算机移到另一台计算机,请使用加密消息语法标准。
windowshelp.microsoft.com
5.
The cryptographic key operation for which this audit rule generates audits.
此审核规则为其生成审核的加密密钥操作。
msdn2.microsoft.com
6.
A keystore is a facility for storing cryptographic keys and certificates.
密钥存储库用于存储加密密钥和证书。
www.ibm.com
7.
Adds the cryptographic key but does not sign the assembly.
添加加密密钥但不签名程序集。
msdn2.microsoft.com
8.
Performs a cryptographic transformation of data.
执行数据的加密转换。
msdn2.microsoft.com
9.
The core of information security is the cryptographic technique.
信息安全的核心是密码技术。
www.fabiao.net
10.
Instead, a cryptographic hash of the passphrase is stored.
相反,储存了密码的密码杂凑。
www-128.ibm.com
1.
The cryptographic information is kept in the extended attributes for each file.
加密信息保存在每个文件的扩展属性中。
www.ibm.com
2.
Write access to a cryptographic stream.
对加密流的写访问。
msdn2.microsoft.com
3.
The industry will continue to evolve cryptographic algorithms as computational power improves over time and new attacks become known.
计算机安全产业将随着计算机运算能力的提升以及对新型病毒攻击的理解而不断地发展现有的加密算法。
www.infoq.com
4.
I first instantiate the DESEngine class, which implements the DES cryptographic algorithm.
我首先实例化了DESEngine类,这个类实现了DES加密算法。
www.ibm.com
5.
A storage system that encrypts data by cryptographic card on the server is presented.
设计了一个在服务器集中加解密的存储系统,加密算法采用硬件加密卡产品实现。
kns50.chkd.cnki.net
6.
Gets or sets the block size, in bits, of the cryptographic operation.
获取或设置加密操作的块大小(以位为单位)。
msdn2.microsoft.com
7.
The password information is stored in your computer's cryptographic storage database.
密码资讯会储存在电脑的密码编译储存资料库中。
msdn.microsoft.com
8.
No cryptographic provider type specified.
不指定任何加密提供程序类型。
msdn2.microsoft.com
9.
The user can add FM to the system, that is the complete saving and establishing of cryptographic information.
这个用户可以在系统中添加FM,这会完整地保存并建立密码学信息。
www.ibm.com
10.
Please check your systems and make sure that you are both patched, and that you regenerated any potentially weak cryptographic material.
请检查你的系统,确认打了补丁并重新生成了所有潜在的弱加密材料。
forum.ubuntu.org.cn
1.
Read access to a cryptographic stream.
对加密流的读访问。
msdn2.microsoft.com
2.
This will replace the Netscape internal module with the Netscape FIPS-ZZ40-ZZ cryptographic module.
这将把Netscape内部模块替换成FIPS-ZZ40-ZZ加密模块。
dict.ebigear.com
3.
All kinds of cryptographic algorithms used can insure security of these activities.
使用各种各样的加密算法,可以保证这些活动的安全性。
www.fabiao.net
4.
Performs a cryptographic transformation of data using the Rijndael algorithm.
使用Rijndael算法执行数据的加密转换。
msdn2.microsoft.com
5.
The apparatus includes acryptographickey generator which generates a cryptographic key using the random number.
该装置包括使用该随机数来生成密码密钥的密码密钥生成器。
www.bing.com
6.
Provides a method for obtaining cryptographic keys.
可提供取得加密密码匙的方法。
www.info.gov.hk
7.
A cryptographic operation could not be completed.
无法完成加密操作。
msdn2.microsoft.com
8.
When configured with Security Builder GSE, a FIPS 140-2 Validated cryptographic module, it also provides government-approved security.
使用SecurityBuilderGSE(经过FIPS140-2验证的加密模块)进行配置后,它还可以提供经政府部门核准的安全性。
www.certicom.com
9.
As mentioned earlier, messages and certificates make use of cryptographic hashes to verify integrity.
正如前面所提到的那样,消息和证书使用加密哈希来验证完整性。
www.ibm.com
10.
InfoQ - How far are we from quantum computing solutions to some of the cryptographic issues raised in the Intel Technology Journal?
现实中我们离因特尔的技术中所提出的运用量子计算的方法来解决一些加密的问题还有多远的距离?
www.infoq.com
1.
Type Specifies the cryptographic provider type to use.
指定要使用的加密提供程序类型。
msdn2.microsoft.com
2.
These works indicate that the ATL logic based on game is more suitable to describe and analyze cryptographic protocols than traditional CTL.
工作表明基于博弈的ATL逻辑比传统的CTL更适合于描述和分析密码协议。
www.joca.cn
3.
Specifies the file that contains the cryptographic key.
指定包含加密密钥的文件。
msdn2.microsoft.com
4.
If you want to encrypt user data, you can use Cryptographic File System (CFS) in OpenBSD.
如果希望对用户数据进行加密,那么您可以使用OpenBSD中的加密文件系统(CFS)。
www.ibm.com
5.
Derives a cryptographic key from the PasswordDeriveBytes object.
从PasswordDeriveBytes对象导出加密密钥。
msdn2.microsoft.com
6.
The DESEngine and CBCBlockCipher classes perform the actual cryptographic operations.
DESEngine和CBCBlockCipher类进行实际的加密操作。
www.ibm.com
7.
Version 4 adds a private channel to transmit a digital signature to sign cryptographic keys and messages.
版本4添加了专用通道来传输数字签名,并用数字签名来签署加密密钥和消息。
technet.microsoft.com
8.
This will replace the FIPS-ZZ40-ZZ cryptographic module with the Netscape internal module.
这将把FIPS-ZZ40-ZZ加密模块替换成Netscape内部模块。
dict.ebigear.com
9.
we test it by many examples . we hope that our work will benefit the development and application of elliptic curve cryptographic technology.
我们希望我们所做的工作能对椭圆曲线密码技术的发展和应用起到积极的作用。
ichacha.net
10.
The technique works by comparing cryptographic hashes instead of real names.
这项技术的原理是比较杂凑加密档案,而非真正的名字。
dictsearch.appspot.com
1.
To create a strongly named assembly, you need to have a cryptographic key pair (public and private key).
要创建强名称的程序集,需要具有一个加密密钥对(公钥和私钥)。
msdn2.microsoft.com
2.
For example, consider using a cryptographic hash to authenticate users logging into a machine from the console.
例如,考虑使用密码杂凑来认证从控制台登入到机器的使用者。
www-128.ibm.com
3.
User data is stored on a different partition and it is encrypted using cryptographic random numbers.
用户数据存储在不同的分区上并通过随机数字进行加密。
www.infoq.com
4.
In the case of cryptographic objects , this data could contain sensitive information such as key data or a block of plain text .
在加密对象的情况中,这些数据可能包含敏感信息,如密钥数据或纯文本块。
www.bing.com
5.
in the end of the chapter , the security of several kinds of important cryptographic functions is deeply analyzed.
本章末,利用这些安全性指标分析了几类重要的密码函数的安全性。
ichacha.net
6.
Gets or sets the file name containing the cryptographic key.
获取或设置包含加密密钥的文件的名称。
msdn2.microsoft.com
7.
We will now try to form a strategy for cryptographic support.
现在我们将尝试形成一个用于密码支持的策略。
www.ibm.com
8.
To do so, you would want to have a cryptographic hash or full-blown digital signature of the document.
为此,需要使用加密的散列值或者完善的文档数字签名。
www.ibm.com
9.
This paper designs a RSA crypto-coprocessor based on the research of RSA cryptographic algorithm.
本文在对RSA密码算法研究的基础上,进行了RSA密码处理器的设计。
www.fabiao.net
10.
Cryptographic attack based on trapdoor is presented , examples are given .
提出了一种基于陷门的密码攻击方法,并给出了几个例子。
www.bing.com
1.
FIPS 140-2 includes a list of approved cryptographic algorithms and describes approved modes of operation.
FIPS140-2包含了一系列许可的数据加密规则,并描述了操作的许可模式。
www.ibm.com
2.
The cryptographic hash is calculated using the SHA-256 algorithm and the digital signature is generated using the RSA algorithm.
加密散列是使用SHA-256算法来计算的,数字签名是使用RSA算法来生成的。
www.ibm.com
3.
Detailed analysis on the cryptographic properties of AESS-box is given in this paper.
本文对AESS盒的密码性质进行了深入的分析。
jpkc.nwpu.edu.cn
4.
Although cryptographic encryption and signature management are certainly possible using writeObject and readObject, there's a better way.
当然,通过使用writeObject和readObject可以实现密码加密和签名管理,但其实还有更好的方式。
www.ibm.com
5.
The signed cryptographic message does not have a signer for the specified signer index.
经过签名的加密消息没有签名者以进行索引。
www.drados.com
6.
There is no 100-percent uncrackable, full-proof cryptographic method.
不存在100%不受攻击的绝对完整的加密方法。
www.ibm.com
7.
Instead of writing your own cryptographic software, use the Microsoft cryptographic API that is already available.
不要编写您自己的加密软件,应使用现成可用的Microsoft加密API。
msdn2.microsoft.com
8.
The exception that is thrown when an unexpected operation occurs during a cryptographic operation.
当加密操作中出现意外操作时引发的异常。
msdn2.microsoft.com
9.
The openCryptoki API provides a standard programming interface between applications and all kinds of portable cryptographic devices.
openCryptokiAPI提供了应用程序和各种可移植密码设备之间的标准编程接口。
www.ibm.com
10.
Ciphers are cryptographic algorithms that can reversibly transform data using a key.
加密是使用密钥对数据进行可逆转换的加密算法。
www.infoq.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/8/8 8:11:58