单词 | decrypt |
释义 | decrypted是decrypt的过去式
第三人称单数:decrypts 现在分词:decrypting 过去式:decrypted 例句释义: 解…的密码[暗号],解密,解密的,解码 1. The content can only be decrypted by an agent with the corresponding private key. 只能由代理用相应的私钥解密该内容。 www.ibm.com 2. Please DO CHECK the decrypted result files immediately one by one BEFORE any other operations on these files. 请做检查结果文件的解密文件,立即逐一对这些行动在任何其他。 www.opda.net.cn 3. The message can only be decrypted with Alice's private key, which has not been transmitted. 该消息只能用小红的私钥解密,而该私钥没有被传输。 msdn2.microsoft.com 4. You can use the FORCE option to ignore errors , but this option will cause the loss of any data that cannot be decrypted . 您可以使用FORCE选项忽略错误,但是该选项会使无法进行解密的数据丢失。 www.bing.com 5. E-mails sent encrypted from a BlackBerry handset at some point have to be decrypted and sent to the recipient's e-mail server. 人们从黑莓手机发送加密的电子邮件,然后再一些地方需要解码在传送到接受者的服务器。 www.bing.com 6. Switch and the name of the configuration element to be decrypted . 开关以及要解密的配置元素的名称一起使用。 www.bing.com 7. A message encrypted by the private key can only be correctly decrypted by the corresponding public key. 用私钥加密的消息只能由相应的公钥正确解密。 www-128.ibm.com 8. Two packets encrypted with the same IV can be decrypted if the attacker knows the plain text of one of them. 如果攻击者知道两个用相同IV加密的信息包之一的明文,就可以对这两个信息包进行解密。 www-128.ibm.com 9. Any messages encrypted using GPG can be decrypted with GPG, PGP, or any number of e-mail client plug-ins that support either program. 使用GPG加密的任何消息都可以使用GPG、PGP或支持任一程序的任何数量的电子邮件客户机插件来解密。 www.ibm.com 10. At run time, the data digest is decrypted with the public key and compared with the hash value of the stored procedure. 在运行时,数据摘要将使用公钥解密并与存储过程的哈希值进行比较。 technet.microsoft.com 1. Individuals using conventional key distribution methods would have their messages easily decrypted by eavesdroppers using quantum computers. 窃取者透过量子电脑将可轻松地窃取破解使用传统加密理论的使用者所要传递的讯息。 dictsearch.appspot.com 2. January 11, Wikipedia founder A Sangqi decrypted by a court in London to attend the hearing. 1月11日,维基解密创始人阿桑奇抵达伦敦一家法院出席听证会。 www.englishtang.com 3. One property of the key pair is that messages encrypted with one of the keys can be decrypted only with the other. 密匙对的一个特性是使用密匙对中的一个密匙加密的消息只能使用另一个密匙解密。 www.ibm.com 4. Anyone with access to the public key can use it to encrypt messages, which can then be decrypted only by the key owner. 任何访问这个公开密匙的人都可以用它加密消息,而只有密匙所有者才能够对消息解密。 www.ibm.com 5. Unlike cryptography , which allows data to be encrypted and then decrypted , hashing data is a one- way process . 与加密不同,加密允许数据加密后再解密,而哈希数据只允许单向进行。 www.bing.com 6. This means that the data being sent is encrypted by one side, transmitted, and decrypted by the other side before processing. 也就是说,发送的数据由一方加密,在处理之前由另一方来传输和解密。 www-128.ibm.com 7. The key is known to the server, and can only be decrypted and used by the client that generated the premaster secret. 服务器知道该密码,且只能被产生该预置密码的客户端解密与使用。 www-128.ibm.com 8. Conversely, plaintext encrypted with the private key can be decrypted only with the public key. 相反,用秘密密钥加密的普通文本只能由公开密钥解密。 hotdic.com 9. Encrypted passwords are encrypted when stored and can be decrypted for password comparison or password retrieval. Encrypted密码在存储时进行了加密,可以在比较或检索密码时进行解密。 msdn2.microsoft.com 10. The ciphertext can only be decrypted with the corresponding private key. 只能使用相应的私钥对加密文本进行解密。 msdn2.microsoft.com 1. If all information is correct, the tool will generate a decrypted SOAP message and validate the message for you. 如果所有信息都正确,这个工具会生成一个解密的SOAP消息,并为您验证这个消息。 www.ibm.com 2. This information will not be kept in clear text or in a form that can be decrypted by ESD Services Limited. 这些资料将不会以纯文字或可解密的形式保存或传递。 www.esd.gov.hk 3. The content of the cryptographic message has not been decrypted yet. 尚未解密加密消息的内容。 www.fan6.net 4. Consider a system in which all information is transparently encrypted and decrypted by the database. 考虑一个这样的系统,所有信息是由数据库透明地加密或解密的。 www-128.ibm.com 5. The data is encrypted before it even leaves your computer, and is decrypted only once it reaches its intended destination. 数据在离开您的计算机之前就已经被加密,然后只有到达它预定的目标后才被解密。 www.ibm.com 6. Ellie receives the message, which is automatically decrypted. Ellie responds with a confirmation, also signed and encrypted. Ellie收到消息后自动解密,也可以使用签署并加密的回复进行确认。 www-128.ibm.com 7. An encrypted configuration file setting in cannot be decrypted. 无法解密已加密的配置文件设置。 msdn2.microsoft.com 8. The rsreportserver. Config file contains encrypted values that can only be decrypted by the report server instance that created the entries. rsreportserver.config文件包含的加密值只能由创建这些值的报表服务器实例进行解密。 technet.microsoft.com 9. The encrypted packet is decrypted when it reaches the security device of its destination. 当加密包到达目的地上的安全装置时,就被解密。 www.showxiu.com 10. A private key can also be used to encrypt a message that can only be decrypted using the corresponding public key. 专用密钥也能用来对只能用相应公钥解密的讯息进行解密。 www-128.ibm.com 1. SSL can have some performance impacts because every piece of data sent to and from the server must be decrypted. SSL对性能有一定影响,因为每个发送到服务器和从服务器传出的数据片都必须加密。 www.ibm.com 2. Once the private key is obtained, the shared key can be decrypted using an asymmetric algorithm. 一旦获得私钥,就可以使用非对称算法来解密共享密钥。 www.ibm.com 3. Access decrypted configuration information in an ASP. NET page. 访问ASP.NET页中已解密的配置信息。 msdn2.microsoft.com 4. I would like all data stored to be encrypted, and only to be decrypted by software on a pc. 我想储存的所有数据进行加密,只有被解密软件在电脑上。 www.bing.com 5. Besides, the time delay is short, the encryption intensity is strong enough, and the decrypted voice has high intelligibility. 系统延迟小,加密强度大,解密语音可懂度高; tech.ddvip.com 6. The tool will decrypt them and validate decrypted SOAP messages for you. 这个工具能够将消息解密,然后为您验证解密后的SOAP消息。 www.ibm.com 7. Euripides: When a service program decrypts a ticket, how does it know that it has decrypted the ticket properly? 当服务解密一张票的时候,它如何知道它正确解密了这张票?。 hi.baidu.com 8. Mr Rosen decrypted the serial numbers of Amazon's "virtual machines" , the unit of measurement for buying computing power from the firm. 罗斯先对亚马逊“虚拟计算机”的序列号解密(虚拟计算机是一种计量单位,用于向公司购买计算能力); www.ecocn.org 9. You need some way of establishing the expected value for the decrypted message, for one thing. 首先,您需要使用某种方法为解密消息确立预期值。 www.ibm.com 10. Element with a specified decrypted sequence of bytes. 元素替换为指定的解密字节序列。 msdn2.microsoft.com 1. The verifier then compares this decrypted digest value with the digest value computed on the companion data. 然后,验证人将此解密的摘要值与根据附带数据计算的摘要值进行比较。 msdn2.microsoft.com 2. Once the message has been decrypted and the signature validated, the SOAP runtime forwards the response to the Consuming Application. 一旦消息被解密并且确认了签名,SOAP运行时就将响应发送给消费应用程序(ConsumingApplication)。 www.ibm.com 3. True affects performance, because the variable value must be decrypted and encrypted for each round trip of the page. 会影响性能,因为在页的每次往返行程中,都必须加密和解密变量值。 msdn2.microsoft.com 4. In this case, the whole XML document is decrypted by the sales department and the payment information is disclosed. 在这种情况下,销售部门对整个XML文档解密,这就泄露了支付信息。 www.ibm.com 5. Finally the code in Listing 14 handles the secure deletion of the decrypted text file to remove any clear text information stored on disk. 最后,清单14中的代码负责安全删除解密文本文件,从而去除任何存储在磁盘上的纯文本信息。 www.ibm.com 6. If the root user reads data from the guard point, data is not decrypted, and the action is logged for audit. 如果根用户从保护点读取数据,那么数据将不被解密,并且会记录该操作用于审计。 www.ibm.com 7. The cipher byte array is then decrypted, and the decrypted byte array is returned as a text string. 接着对该密码字节数组解密,解密的字节数组作为文本字符串返回。 www.ibm.com 8. The content of the cryptographic message has already been decrypted. 已解密加密消息的内容。 www.fan6.net 9. When Analysis Services starts, the encrypted key for each database is read, decrypted, and stored. AnalysisServices启动时,将对每个数据库的加密密钥进行读取、解密和存储。 technet.microsoft.com 10. The symmetric key cannot be decrypted. 无法解密对称密钥。 msdn2.microsoft.com 1. SSL pages are not cached (or decrypted) by proxy caches, so you don't have to worry about that. 代理服务器上SSL页面不会被缓存(不推荐被缓存),所以你不必为此担心。 blog.163.com 2. Note: Forums or documents that are encrypted must be decrypted before they can be migrated . 注意:加密的论坛或文档在迁移之前必须首先进行解密。 dictsearch.appspot.com 3. Decrypted hash value is compared against the hash value produced on receipt. 将解密的哈希值与接收邮件时产生的哈希值进行比较。 technet.microsoft.com 4. The password is only requested once when the certificate is loaded so that it can be decrypted and stored in memory. 在证书加载时,这个密码只会请求一次,这样它就可以进行解密并保存到内存中了。 www.ibm.com 5. Data encrypted using the private key can be decrypted using the corresponding public key. 使用私有密匙加密的数据可以使用对应的公共密匙解密。 www.ibm.com 6. Once the message has been decrypted and the signature validates the SOAP runtime calls the web services implementation. 一旦消息被解密且确认了签名,SOAP运行时(runtime)就可以调用Web服务的实现。 www.ibm.com 7. Once enough of them are lost, the message can no longer be decrypted and read. 一旦密匙丢失的部分达到一定程度,消息就无法解密和读取。 www.bing.com 8. The important point is that the keys are asymmetric - information encrypted with one key can be decrypted using the other key. 关键的问题是这些密钥是非对称的使用一个密钥加密的信息可以使用另一个密钥来解密。 www-128.ibm.com 9. In this example, if the db2admin user accesses the guard point, data is encrypted when writing, and data is decrypted when reading. 在这个例子中,如果db2admin用户访问保护点,那么将在写入时加密数据,在读取时解密数据。 www.ibm.com 10. The master key must be open and, therefore, decrypted before it is backed up. 主密钥必须为打开状态,因此在备份主密钥之前应对其进行解密。 msdn2.microsoft.com 1. When Ellie opens the message, it is automatically decrypted using her corresponding private key. 当Ellie打开消息的时候,会自动使用相应的私钥解密。 www-128.ibm.com 2. Method returns the decoded and decrypted data as a text string. 方法将已译码和解密的数据作为文本字符串返回。 www-128.ibm.com 3. Then, like all future encrypted messages, we need to make sure the decrypted contents haven't been tampered with. 然后,像所有接下来的加密消息一样,我们要确保解密后的内容没有被篡改。 www.infoq.com 4. Closing the loop, the code in Listing 5 allows encrypted XML to be decrypted. 最后说一下,清单5中的代码可以对加密过的XML进行解密。 www.ibm.com 5. Using these cipher suites the data is encrypted by one end and decrypted by other end. 使用该密码组合时,数据在一端进行加密,在另一端进行解密。 www.ibm.com 6. Object that represents the decrypted contents of the. 对象的已解密内容。 msdn2.microsoft.com 7. The message is then decrypted for each recipient using that recipient's private key. 可使用收件人的私钥为每个收件人解密该邮件。 msdn2.microsoft.com 8. That data can only be decrypted using the private key. 这些数据只能使用私钥进行解密。 www.ibm.com 9. The notation {something}key means that something has been encrypted or decrypted using key. 符号{籔据}key意味着“籔据”已经使苚key加密或解密。 jiaocheng.gdjob168.com 10. The example displays the original data, the encrypted data, and the decrypted data. 此示例显示原始数据、加密的数据和解密的数据。 msdn2.microsoft.com 1. If your list of user passwords falls into the wrong hands, there's literally no way it can be decrypted to plaintext. 如果您的用户密码列表落入不法之徒之手,他们实际上没有将密码解密为明文的方法。 www.ibm.com 2. Also, users that can attach a debugger to the server process can retrieve the decrypted procedure from memory at runtime. 此外,能够向服务器进程附加调试器的用户可在运行时从内存中检索已解密的过程。 msdn2.microsoft.com 3. When configuration file sections are encrypted, these sections must be decrypted in order to edit them. 如果配置文件中的节已加密,则必须对这些节进行解密才能编辑它们。 msdn2.microsoft.com 4. The files are decrypted when they are read from the disk into memory so that the file data kept in memory is in clear format. 在将文件从磁盘读取到内存时对文件解密,因此文件数据能够以明文格式保存在内存中。 www.ibm.com 5. Then using the decrypted conversation key, the server decrypts the client timestamp. 然后,服务器使用解密的对话密钥来解密客户端时间戳。 www.ibm.com 6. The block size is the basic unit of data that can be encrypted or decrypted in one operation. 块大小是在一个操作中可加密或解密的基本数据单元。 msdn2.microsoft.com 7. Message is decrypted with the decrypted session key. 用解密的会话密钥解密邮件。 technet.microsoft.com 8. However, you can follow these steps, if you want to view the decrypted settings. 但是,若要查看已解密的设置,您可以遵循下面的步骤操作。 msdn2.microsoft.com 9. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation (scheme 1). 在大整数分解困难问题的条件下,构造特殊等式来解密S1(方案1)。 www.ceps.com.tw 10. Encrypted hash value is decrypted with the sender's public key. 用发件人的公钥解密加密的哈希值。 technet.microsoft.com 1. If a message is private, its body is encrypted before it is sent and is decrypted when it is received. 如果消息为私有,则消息在发送前其正文被加密并在接收时被解密。 technet.microsoft.com 2. Decrypts by using a symmetric key that is automatically decrypted with a certificate. 使用通过证书自动解密的对称密钥进行解密。 msdn2.microsoft.com 3. If a message is private, it is encrypted before it is sent and is decrypted when it is received. 如果讯息是私用的,它会在传送之前先行加密,并在接收时解密。 technet.microsoft.com 4. Data is automatically encrypted when writing, and decrypted when reading, based on the policy. 将根据策略在写入时自动加密数据,而在读取时自动解密数据。 www.ibm.com 5. An encrypted user data value could not be decrypted. 无法解密已加密的用户数据值。 msdn2.microsoft.com 6. Upon receipt, the session key is decrypted by using the private key of the recipient. 收到邮件后,将使用收件人的私钥为会话密钥解密。 msdn2.microsoft.com 7. Step 4: Create the Decryptor object with decryption key and the location of the encrypted data that is to be decrypted. 步骤4:用解密密钥和需要解密的加密数据所在的位置创建Decryptor对象。 www.ibm.com 8. To authenticate the hash, it must first be decrypted. 要认证杂凑,必须首先对它解密。 www-128.ibm.com 9. The data to be decrypted. 要解密的数据。 msdn2.microsoft.com 10. The specified file could not be decrypted. 指定的文件无法解密。 www.fan6.net 1. Method is not called when, for example, the encrypted input data is garbage and cannot be decrypted. 方法。在某些情况下,例如在加密的输入数据是乱码,无法解密时,不调用。 msdn2.microsoft.com 2. The decrypted data, which is the original plain text before encryption. 已解密的数据,它是加密前的原始纯文本。 msdn2.microsoft.com 3. If a message is private (encrypted), it is encrypted before it is sent and decrypted upon receipt. 如果消息是私有的(加密的),则消息在发送前被加密并在接收时被解密。 technet.microsoft.com 4. The document is decrypted using the decryption key. 解密密钥会被用来对文档进行解密。 www.infoq.com 5. You will see the decrypted values from your encrypted Web. Config file. 您将看到加密的Web.config文件中已解密的值。 msdn2.microsoft.com 6. If a dependent key cannot be decrypted during a forced restore, data that is secured by that key will be lost. 如果在强制的还原过程中不能对某个相关密钥进行解密,则由该密钥所保护的数据便会丢失。 msdn2.microsoft.com 7. Cache lifetime in second on how long to cache the decrypted "Encrypted Key" material. 缓存生命周期(以秒为单位),表示缓存解密后的“EncryptedKey”需要多长时间。 www.ibm.com 8. The data is decrypted only once, which is a major advantage. 数据只经过一次解密,这是一个主要的优点。 www.ibm.com 9. I'm also willing to accept a trade, a legit path to homebrew for knowledge of how to stop new firmwares from being decrypted. 我也愿意接受一个行业,一个合法的路径,自制有关如何防止在新固件解密的知识。 bbs.emu-zone.org 10. The message is then decrypted by using the session key. 然后,使用会话密钥为邮件解密。 msdn2.microsoft.com 1. Is encrypted but it will be decrypted if made available offline. Do you still want to make this file available offline? 是加密的,但一旦可以作为脱机使用就会解密。您仍想让这个文件可以脱机使用吗? angel.w15.5tom.cn 2. Encrypted configuration information is decrypted when loaded into the memory that is used by your application. 在将加密配置信息加载到应用程序使用的内存中时,会对这些信息进行解密。 msdn2.microsoft.com 3. Hashed passwords are more secure than encrypted passwords because they can't be decrypted. 哈希密码比加密密码更安全,因为无法对其进行解密。 www.cnblogs.com 4. With the shared key in the open, the message data can be decrypted using a symmetric algorithm. 通过公开的共享密钥,就可以使用对称算法来解密消息数据。 www.ibm.com 5. If data is encrypted before being transmitted over the network and decrypted when it reaches the remote endpoint; otherwise, 如果在通过网络传输数据前将其加密,并在数据到达远程终结点后将其解密,则为, msdn2.microsoft.com 6. receiving a second decrypted random number returned by the other communication unit; 接收所述另一个通信单元返回的解密后的第二随机数; ip.com 7. listen , send me the decrypted files over to my pda 听着,把解密的文件发到我的pda上 www.ichacha.net 8. The returned data is decrypted using asymmetric key 解密,此密钥已使用密码 msdn2.microsoft.com 9. Garou - Mark of the Wolves (decrypted C) 饿狼-群狼之证(解密版) blog.moogle.cn 10. The decrypted data is converted from 解密后的数据将从 msdn2.microsoft.com |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。