单词 | encrypt |
释义 | encrypting是encrypt的现在分词
第三人称单数:encrypts 现在分词:encrypting 过去式:encrypted 例句释义: 把…译成密码,编密码,译成代码,编码,加密术,预储程序加密 1. Of course, nothing prevents you from encrypting any other partitions that might be of interest. 当然,这不影响您加密任何其他的分区。 debian.fr 2. Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption. 由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。 www.ibm.com 3. Parts easy to attack in the system are LAN and communication link, which need to take link encrypting and point-to-point encrypting. 系统易受攻击的环节是局域网与通信链路,需采取链路加密和端到端加密措施。 www.gongkong.com 4. You may continue without encrypting to yourself, but be aware that you will not be able to read your own messages if you do so. 您仍然可以继续,而不正确自己加密。但请注意,您以后将无法检视您自己的邮件。 translations.launchpad.net 5. Keep in mind that encrypting your data WILL lock it up in a reasonably secure vault. 对您的数据进行加密就相当于把它们锁到一个相当安全的保险柜里。 wiki.ubuntu.org.cn 6. This enables you to manage connection strings independently of your ASP. NET code, including encrypting them using Protected Configuration. 这样,就可以独立于ASP.NET代码来管理连接字符串,包括使用ProtectedConfiguration对这些字符串进行加密。 msdn2.microsoft.com 7. Disk Encryption's easy-to-use interface makes selecting and encrypting a drive, a breeze. 磁盘加密的易于使用的界面,使选择和加密的驱动器,一个轻而易举的事。 bbs.winzheng.com 8. Application settings has no built-in facility for encrypting information automatically. 应用程式设定并没有自动加密资讯的内建机能。 technet.microsoft.com 9. The public key can be made available to anyone ; it is used for encrypting data to be sent to the keeper of the private key . 公钥可以提供给任何人;公钥用于对要发送到私钥持有者的数据进行加密。 www.bing.com 10. With it, you can store session information in a database or implement a handler for encrypting and decrypting all of your data. 使用它,您可以将会话信息存储在数据库中,也可以实现一个用于加密和解密所有数据的处理程序。 www.ibm.com 1. Encrypting view state data can affect the performance of your application, so do not use encryption unless you need it. 对视图状态数据进行加密会影响应用程序的性能,因此,除非确实需要,否则不要使用加密。 msdn2.microsoft.com 2. This message did not include a recommended certificate to use when encrypting messages to the sender. 此邮件中未包括推荐用于加密发送给发件人的邮件的证书。 angel.w15.5tom.cn 3. Note that decryption uses the corresponding private key of the public key used for encrypting the XML. 请注意,解密过程使用的是加密XML时使用的公钥所对应的私钥。 www.ibm.com 4. On selecting the OK button, a new window pops up asking for the password to be used for encrypting and decrypting the data. 单击OK按钮,出现一个新的窗口,要求输入数据加密和解密所用的密码。 www.ibm.com 5. By encrypting the information, it ensures the confidentiality of that information, for both the identity and the validity of the token. 通过对信息进行加密,它可以确保该信息的机密性,包括标识和令牌的有效性。 www.ibm.com 6. If it does not help, try encrypting the system partition only. 如果仍然没有帮助,请尝试仅加密系统分区。 mymemory.translated.net 7. As Lifehacker has covered, when it comes to encrypting your files, there is nothing better than TrueCrypt. 就像Lifehacker所介绍的,要想加密文件,没有比TrueCrypt更好的了。 www.bing.com 8. You use the name of the protected configuration provider instance when encrypting configuration sections. 加密配置节时,使用受保护配置提供程序的名称。 msdn2.microsoft.com 9. The result of the research in this thesis has practical value for designing and exploiting link layer encrypting network card. 论文的研究成果将对链路层加密网卡的设计与开发具有实用价值。 www.edu-hb.com 10. Database Protection helps you to protect your Office Access 2007 database by encrypting it with a password. “数据库保护”通过用密码对OfficeAccess2007数据库加密来帮助您保护数据库。 office.microsoft.com 1. The user is denied access to the device if the result of one-way encrypting does not equal the pass phrase. 如果单向加密的结果不等于所述密码短语则拒绝对所述设备的访问。 www.bing.com 2. Provides a step-by-step example for encrypting sections of a configuration file for an ASP. NET application. 提供有关加密ASP.NET应用程序配置文件的节的逐步骤示例。 msdn2.microsoft.com 3. Properties of the package to protect packages by encrypting all or part of a package using passwords or user keys. 属性,通过使用密码或者用户密钥加密包的全部或部分来保护包。 msdn2.microsoft.com 4. A symmetric key is dynamically created and used for encrypting a database backup image. 为数据库备份映像加密时,将动态创建并应用一个对称密匙。 www.ibm.com 5. For more information about protected configuration, see Encrypting Configuration Information Using Protected Configuration. 有关受保护配置的更多信息,请参见EncryptingConfigurationInformationUsingProtectedConfiguration。 msdn2.microsoft.com 6. When encrypting an image, several waves could be performed to enhance our algorithm as a phenomenon called superposition of waves. 在加密图像时可在图像上模拟多个波,选择多个不同的点为它们波源,进行叠加。 www.joca.cn 7. It prevents transmission of clear text passwords over the network by encrypting authentication messages between clients and servers. 通过对客户端和服务器之间的身份验证消息进行加密,它可以防止在网络上使用明文来传输密码。 www.ibm.com 8. Whole-value substitution attacks can be thwarted by adding contextual information to the plaintext before encrypting it. 加密纯文本前在该文本中添加上下文信息,可避免上述整个值替换攻击。 msdn2.microsoft.com 9. Before encrypting the information, process all the original information into two-dimension and establish the original information tables. 在信息加密前,对所有可能用到的原始信息进行二维化处理,建立原始信息表。 www.joca.cn 10. An online policy is used for encrypting data written to a file system and protecting data with access control. 在线策略,用于加密写到文件系统的数据,以及通过访问控制保护数据。 www.ibm.com 1. Beyond the DOM issue, much of the WS-Security overhead is the computationally intensive work of generating digests and encrypting data. 除了DOM问题之外,大部分WS-Security开销都是计算紧密型的生成摘要和加密数据的任务。 www.ibm.com 2. The default e-mail delivery extension does not provide support for digitally signing or encrypting outgoing mail messages. 默认电子邮件传递扩展插件不支持给待发邮件进行数字签名或加密。 msdn2.microsoft.com 3. To combat this problem, information from the previous block is mixed into the process of encrypting the next block. 为了防止这个问题,前一个块中的信息被混合到下一个块的加密过程中。 technet.microsoft.com 4. Privacy and integrity: When the messaging network or volume of message data is large, encrypting all traffic can be prohibitively expensive. 保密和完整性:当消息网络或消息数据量非常大时,对所有流量加密的代价高得惊人。 www.ibm.com 5. For more information, see Encrypting Configuration Information Using Protected Configuration. 有关更多信息,请参见使用受保护的配置加密配置信息。 msdn2.microsoft.com 6. The user is allowed access to the device if the result of one-way encrypting equals the pass phrase. 如果单向加密的结果等于所述密码短语则允许访问所述设备。 www.bing.com 7. You can help prevent modification to your application configuration by encrypting sections of configuration files. 您可以通过对配置文件的节进行加密来帮助防止他人修改您的应用程序配置。 msdn2.microsoft.com 8. The system ran out of memory while encrypting the data. 加密数据时系统内存不足。 msdn2.microsoft.com 9. You can prevent people from viewing this data in two ways: transmitting the page over SSL and by encrypting the view state data. 可以通过下面两种方式来防止他人查看此数据:通过SSL传输页以及加密视图状态数据。 msdn2.microsoft.com 10. For details, see Encrypting Configuration Information Using Protected Configuration. 有关详细信息,请参见使用受保护的配置加密配置信息。 msdn2.microsoft.com 1. In practice, more is involved in signing messages than just encrypting with your private key. 在实际中,消息签名的过程不仅仅是使用私有密匙加密消息。 www.ibm.com 2. Encrypting data is much like translating it into a secret code. 加密的数据很像转化为一个秘密代码。 bbs.winzheng.com 3. With an IDS in place, you ll be able to add other levels of security such as digitally signing and encrypting your backups. IDS到位后,您将可以添加其他层次上的安全,比如对您的备份进行数字签名和加密。 www-128.ibm.com 4. Direction induced encrypting system and automobile navigating system are two examples of the uses of embedded devices. 本论文涉及的方向感应加密系统和汽车导航系统就是嵌入式设备众多应用中的两个实施例。 www.fabiao.net 5. For more information about encrypting communications, see Encryption connection parameter [ENC]. 有关对通信加密的详细信息,请参见Encryption连接参数[ENC]。 www.ianywhere.com 6. The inspiration for Permanent Privacy came from the idea of encrypting a piece of plain text that was unintelligible gibberish . 永久的隐私的启发来自加密是难理解的无用讯息的纯文本的想法。 dictsearch.appspot.com 7. Encrypting the network connection using HTTPS resulted in message confidentially for this solution. 对于这个解决方案,加密使用HTTPS的网络连接提供了消息的机密性。 www.ibm.com 8. The following figure shows the sequence of signing and encrypting with the addition of the supporting elements of public key cryptography. 下图显示在添加了公钥加密的支持元素的情况下进行签名和加密的顺序。 technet.microsoft.com 9. In the scheme, the private key and its encrypting key is separated, which makes the KMC and KEC can't separately get the private key. 将加密的私钥和加密私钥的密钥分离,使得KMC和KEC都不能单独解密出私钥。 dictsearch.appspot.com 10. Be especially cautious before encrypting data in files close to maximum file size. 所以在加密已经接近最大文件大小的文件中的数据时,要特别小心。 www-128.ibm.com 1. This increases security by encrypting all information about the device in addition to any storage cards. 这样可以通过对有关设备和任何存储卡的所有信息进行加密来提高安全性。 technet.microsoft.com 2. True to use Optimal Asymmetric Encryption Padding (OAEP) when encrypting and decrypting; otherwise, false. 如果加密和解密时使用最优非对称加密填充(OAEP),则为true;否则为false。 msdn2.microsoft.com 3. after mainframe encrypts data stream by data cipher key, the encrypting data stream is transmitted to handset by bluetooth technology. 主机用所述数据密钥对数据流进行加密后,通过蓝牙技术将所述加密后的数据流发送至子机。 ip.com 4. The stacks don't support using WS-Security asymmetric encryption for only encrypting a message, instead requiring signing to be done also. 这些工具并不支持使用WS-Security对称加密来只加密一条消息,而是同时还要求使用签名才能完成。 www.ibm.com 5. The enforcement of proper usage permission is commonly achieved by access control, or by encrypting the content for distribution. 正确使用许可权的执行通常是通过控制接入和为内容流通进行加密。 www.cyberport.com.hk 6. Biostorage -- the art of storing and encrypting information in living organisms -- is a young field, having existed for about a decade. 生物储存——在生物储存和加密信息的艺术——是一个才发展近10年的年轻的科学领域。 www.bing.com 7. After encrypting the data, the code in Listing 6, below, reads the encrypted event text back in. 对数据进行加密之后,清单6中的代码读回加密后的事件文本。 www.ibm.com 8. The connection to the Active Directory server is secured by digitally signing and encrypting each packet sent to the server. 到ActiveDirectory服务器的连接安全是通过以下方式实现的,即对发送至服务器的每个数据包进行数字签名和加密。 msdn2.microsoft.com 9. This processing can be performed by encrypting the Payment element in the Order. xml file. 可以通过对Order.xml文件中的Payment元素加密来完成这个处理。 www.ibm.com 10. Also consider encrypting configuration settings. 还要考虑对配置设置进行加密。 msdn2.microsoft.com 1. Encryption Expert uses a hybrid encryption algorithm for encrypting database backup images. EncryptionExpert对加密数据库备份映像使用混合的加密算法。 www.ibm.com 2. Question: What is the big deal about encrypting part of a Web services message? 问:加密部分Web服务消息时的主要问题是什么? www.ibm.com 3. If a new account needs to be created, the tables are unlocked and this information is INSERTed after encrypting the password. 如果需要创建一个新的账号,表就会被解锁,并且在加密密码之后这个信息是插入的(INSERTed)。 www.ibm.com 4. In some circumstances, using channel compression can reduce the amount of processor time spent encrypting data for SSL-based connections. 在某些情况下,使用通道压缩可以减少为基于SSL的连接加密数据花费的处理器时间。 www.ibm.com 5. Encrypting secrets and passwords in the database will be quite useless, if the log files list them in clear text. 如果日志文件以明文列出secret和密码,那么把它们加密保存到数据库里是完全无用的。 www.bing.com 6. SUSE Linux Enterprise Server provides different ways to secure data by encrypting partitions and files. SUSELinuxEnterpriseServer通过分区加密和文件加密提供不同的数据保护方法。 www.ibm.com 7. This folder already contains encrypted files, please decrypt before encrypting it again. 该文件夹已包含加密文件,再次加密之前请先解密。 angel.w15.5tom.cn 8. This parameter specifies what required algorithm must be used when encrypting a message. 此参数指定加密邮件时必须使用哪种必要算法。 technet.microsoft.com 9. To ensure secure communication, every multicast member shares a common group key for encrypting data. 在组播通信中,所有成员共享一个组密钥,用于加密群组数据。 202.119.108.211 10. Computes the signature for the specified hash value by encrypting it with the private key. 通过用私钥对其进行加密来计算指定哈希值的签名。 msdn2.microsoft.com 1. Encrypting long keys could potentially exceed key length restrictions. 如果加密较长的键,则可能超出长度限制。 www-128.ibm.com 2. An error occurred while encrypting or decrypting the value of this secure string. 加密或解密此安全字符串的值时出错。 msdn2.microsoft.com 3. The following figure shows the sequence of encrypting with the supporting elements of public key cryptography. 下图显示在具有公钥加密的支持元素的情况下进行加密的顺序。 technet.microsoft.com 4. MessageCipher: component responsible for decrypting the input message and encrypting the reply message. MessageCipher:负责解密输入消息并加密回复消息的组件。 www.ibm.com 5. An error occurred while encrypting or decrypting the value of this instance. 加密或解密此实例的值时出错。 msdn2.microsoft.com 6. Provides steps for encrypting connection strings for database access. 提供有关步骤,说明如何加密用于数据库访问的连接字符串。 msdn2.microsoft.com 7. For more information about database file encryption, see Encrypting a database. 有关数据库文件加密的详细信息,请参见对数据库进行加密。 www.ianywhere.com 8. For more information on this process of encrypting and transferring the key and IV, see Creating a Cryptographic Scheme. 有关加密和传输密钥与IV的过程的更多信息,请参见创建加密方案。 msdn.microsoft.com 9. The following example shows the entire process of creating a stream, encrypting the stream, writing to the stream, and closing the stream. 下面的示例显示创建流、加密流、写入流和关闭流的整个过程。 www.juyy.net 10. Encrypting messages using a shared secret is much faster than with asymmetric keys. 使用共享密钥加密消息要比使用非对称密钥加密快的多。 www.ibm.com 1. The two most common ways code is obfuscated are through encoding and encrypting. 这两个最常见的方式是伪装的代码是通过编码和加密。 word.hcbus.com 2. Make sure to use an IDS if you re planning on automating the signing and encrypting of archive files. 如果您正在计划自动化对存档文件的签名和加密,那么一定要使用一个IDS。 www-128.ibm.com 3. For an antivirus program, it is important to hide this database of signatures somehow - e. G. By encrypting it. 作为一个杀毒程序,隐藏这个签名数据库是非常重要的-通过对其加密。 avast.com.cn 4. What support does it offer for authenticating users and encrypting its traffic? 它在认证用户和加密传输方面提供了怎样的支持? www.ibm.com 5. Encrypting a database scrambles the data in your tables and helps prevent unwanted users from reading your data. 加密数据库将打乱表中的数据,并有助于防止不请自来的用户读取数据。 office.microsoft.com 6. New built-in functions provide methods for encrypting and decrypting data. 新的内置函数提供了加密和解密数据的方法。 www.ibm.com 7. Must be the same value passed to EncryptByKey when encrypting the data. 对数据进行加密时,该值必须与传递给EncryptByKey的值相同。 msdn2.microsoft.com 8. Specifies the access permissions for encrypting data and memory. 指定加密数据和内存的访问权限。 msdn2.microsoft.com 9. This means SSL is working by our certificate, thereby encrypting all transfer of data. 这表明,SSL在利用我们的证书工作,对所有传送数据加密。 bfrboots.com 10. So, instead of encrypting the original message sent by Alice, Bob constructs a message digest and encrypts that. 葰以,取笩直扌妾加密甲发来菂原始信息,乙创建弌个信息摘要并且加密该摘要。 jiaocheng.gdjob168.com 1. HTTP Digest authentication improves this by encrypting the password, but not all browsers support it. HTTPDigest验证通过加密口令改进了这种方法,但是并不是所有的浏览器都支持这种改进。 www.ibm.com 2. A new system for encrypting and decrypting digital images is proposed in this article. 提出了一种新的数字图像加密解密系统。 www.ceps.com.tw 3. Encrypting information stored in the database helps. 对储存在数据库中的信息加密是有帮助的。 www.hotdic.com 4. Encrypting network data has little effect on client performance. 加密网络数据对客户端性能的影响微乎其微。 www.ibm.com 5. Sets the public key to use for encrypting the key exchange data. 设置用于对密钥交换数据进行加密的公钥。 msdn2.microsoft.com 6. This is the same configuration used in earlier articles with Axis2 examples of WS-Security asymmetric signing and encrypting. 这与此前文章中WS-Security非对称签名和加密的Axis2例子中的配置一致。 www.ibm.com 7. You also need a certificate if you want to encrypt a file using Encrypting File System. 如果要使用加密文件系统加密文件,也需要证书。 windowshelp.microsoft.com 8. Sets the options for encrypting the workbook using a password. 设置使用密码加密工作簿的选项。 msdn2.microsoft.com 9. use security precautions such as encrypting a password , or prompting the user for a password when you set the password. 使用安全预防措施,例如,对密码加密,或提示用户输入密码(如果您设置了。 www.ichacha.net 10. The Listing 5 policy demonstrates selective use of message encryption, encrypting only those messages that include book information. 清单5中的策略演示了选择性使用消息加密,仅加密那些包含订单信息的消息。 www.ibm.com 1. The cryptosystem is dedicated to the application of encrypting a batch of plaintexts. 该加密算法专注于一次批量加密多个明文的特殊应用。 www.13191.com 2. Using private key-certificate pairs for signing and encrypting messages is more complex to configure than the simple UsernameToken example. 与简单的UsernameToken示例相比,使用私有密钥-证书对进行消息签名和加密的配置比较复杂。 www.ibm.com 3. The Encrypting File System value could not be changed. 加密文件系统卷不能被更改。 www.fan6.net 4. Encrypting a message makes the message private. 加密消息使消息成为专用的。 msdn2.microsoft.com 5. Aiming at the safety of telephone communication, a telephone encrypting system is realized based on 3DES algorithm. 针对电话和传真安全方面存在的问题,设计并实现了一种基于3DES算法的电话传真加密系统。 www.fabiao.net 6. Even if you have chosen not to authenticate the link from the Web server to the Web container, you might want to consider encrypting it. 即使不对从Web服务器到Web容器的链路进行身份验证,也可能希望考虑对它进行加密。 www.ibm.com 7. To learn more about encrypting configuration settings, see the documentation for the Enterprise Library Configuration Application Block. 要了解有关加密配置设置的更多信息,请参阅企业程序库配置应用程序块文档。 msdn2.microsoft.com 8. This can be more performant than encrypting a user's entire disk or operating system. 这比加密用户的整个磁盘或操作系统能获得更好的性能。 www.infoq.com 9. The following figure shows the sequence of encrypting an e-mail message. 下图显示了电子邮件加密过程的顺序。 technet.microsoft.com 10. The direction induced encrypting system, which is based on electronic compass technology, puts forward a fire-new password input method. 方向感应加密系统以电子指南针技术为基础,提出了一种全新的密码输入方式。 www.fabiao.net 1. By database encrypting, and key management and users access control, we can protect the database from destroying . 通过数据加密、密钥管理、用户拜访控制等一系列的手腕来维护数据库内部数据的安全。 www.starlunwen.net 2. This will have the effect of not encrypting connection information on its way to the zSeries machine. 这样的结果是,不会加密到zSeries机器的连接信息。 www.ibm.com 3. Some commercial e-mail systems, such as Lotus Notes, provide means for automatically encrypting local e-mail. 一些商业电子邮件系统,比如LotusNotes,提供了自动加密本地电子邮件的方法。 www.ibm.com 4. Some key data, such as the password, is encrypted by the encrypting technology, such as MD5 and DES. 对于一些关键的信息如密码,选用了如MD5及DES加密技术。 www.sosheji.com 5. Since version 9. 1 TM1 supports encrypting those connections by SSL which is considered best practice. 自9.1版以来,TM1支持用SSL对这些连接进行加密,这是最佳实践。 www.ibm.com 6. This is probably the most widely used technique for signing or encrypting messages with WS-Security, and it does have some advantages. 这是使用WS-Security进行消息签名或加密中最广泛使用的技术,而且它有一些优势。 www.ibm.com 7. Encrypting messages, on the other hand, just processes all the XML with little modification. 另一方面,加密消息,只对所有XML进行小修改。 www.ibm.com 8. For more information, see Encrypting Connections to SQL Server. 有关详细信息,请参阅加密与SQLServer的连接。 technet.microsoft.com 9. Are you sure you want to delete the Encrypting File System policy from this Group Policy object? 您确信要从这个组策略对象删除加密文件系统策略吗? angel.w15.5tom.cn 10. the encryption chip is connected with the central processing unit and used for encrypting and decrypting the data; 一加密芯片,其与所述的中央处理器相连接,用以对数据进行加解密; ip.com 1. Encrypting Configuration Information Using Protected Configuration 使用受保护的配置加密配置信息 msdn2.microsoft.com 2. "Let's just be blunt: if you aren't encrypting your API calls, you aren't even pretending to be secure" , He says 他说,“让我们变得简单些:如果你不加密API调用,你甚至连假装安全都做不到”。 www.infoq.com 3. building communication between mobile terminal and security module, encrypting and decrypting voice and data service; 移动终端和保密模块之间建立通信,对语音和数据业务进行加密和解密; ip.com 4. a first random number is generated and the cryptographic key is used for encrypting the first random number to obtain a cipher text; 产生第一随机数,用所述密钥加密所述第一随机数得到密文; ip.com 5. Encrypting Communications with a Remote Object 加密与远程对象的通信 msdn2.microsoft.com 6. Application of Element Conduct Matrix Regulative Method by Encrypting Gauss Point in Seepage Analysis with Free Surface 加密高斯点单元传导矩阵调整法在有自由面渗流分析中的应用 www.ilib.cn 7. Video encrypting component developed with directshow filter technology 技术开发视频加密组件 scholar.ilib.cn 8. Encrypting digital holography with aberrated phase of the object wavefront 物光相位畸变加密数字全息图 168.160.184.82:8080 9. A simple cryptographic scheme for encrypting and decrypting data might specify the following steps 用于加密和解密数据的简单加密方案可能指定以下步骤 msdn2.microsoft.com 10. Public key cryptography and digitally signing and encrypting of an e-mail message 公钥加密以及对电子邮件进行数字签名和加密 technet.microsoft.com 1. Encrypting digital holograph with magic transformation 幻方变换加密数字全息图 ilib.cn 2. Warn on encrypting messages with less than this strength: , W 邮件加密不足该强度时发出警告 www.fan6.net 3. Shallow to talk about the application of bank data encrypting technology 浅谈银行数据加密技术的应用 www.ilib.cn 4. Technical Methods for Encrypting and Hiding Digital Watermark in GIS Spatial Data GIS空间数据水印信息隐藏与加密技术方法研究 www.ilib.cn 5. Encrypting complete documents with XML Encryption 使用XML加密对整个文档加密 www.ibm.com 6. Encrypting Algorithm Based upon MPEG with Medium Intensity 基于MPEG中等强度加密算法的研究 service.ilib.cn 7. To Improve and Apply the Way of Dynamic Pseudorandom Serial Encrypting 动态伪随机序列加密法的改进及其应用 service.ilib.cn 8. A. by encrypting all passwords passing through the router 所有的密码进行加密,通过路由器传递 wenku.baidu.com 9. Solution of WAP gap problem using complex encrypting algorithm 问题的混合加密算法解决方案 www.ilib.cn 10. Research on Deciphering Method of a Kind of Chaotic Encrypting Picture 对一种混沌加密图像方法的破译研究 www.ilib.cn 1. Digital signing and encrypting of an e-mail message 电子邮件的数字签名和加密 technet.microsoft.com 2. Encrypting the kernel of PC information prevents from copying 计算机信息内核加密防拷贝 www.ilib.cn 3. Study and Application of Encrypting Java Software Java软件的加密方法研究与应用 ilib.cn 4. Signing and Encrypting Individual E-Mail Messages 对各个电子邮件进行签名和加密 technet.microsoft.com 5. The Use and Encrypting Techniques of Computer 计算机使用技术与加密 www.ilib.cn 6. B. by encrypting passwords in the plain text configuration file 通过加密的纯文本配置文件的密码 wenku.baidu.com 7. Analysis of RSA Verifying and Encrypting of PE Executable File PE可执行文件RSA验证加密机制的分析 service.ilib.cn 8. The Method of Encrypting Software Using DES Algorithm 利用DES算法实现软件加密的方法 www.ilib.cn 9. Encrypting enhanced journaled file system (JFS2) 对增强型日志文件系统(JFS2)进行加密 www.ibm.com 10. A novel way for encrypting optical information 一种新的光信息加密方法 www.ilib.cn 1. Best Practices for Encrypting File System 加密文件系统的最佳做法 www.pcpro.com.cn 2. Encrypting the message with the public key of the receiver's X. 509 certificate to ensure that only they can access the message content 使用接收方的X.509证书的公钥来加密消息,以便确保只有它们才能访问消息内容。 www.ibm.com 3. Encrypting and Decrypting of Car Audio System 轿车音响系统的加密与解密 www.ilib.cn 4. Research on Key Algorithm of Encrypting TIN Model 加密不规则三角网模型的关键算法研究 www.ilib.cn 5. The encrypting technique in network 网络的加密技术 www.ilib.cn 6. Encrypting optical image based on compound encoding on space-fractional domain 基于空域-分频域混合编码的光学图像加密 www.ilib.com.cn 7. A New Class of Digital Image Scrambling Algorithm for Encrypting Based on the Method of Determinant Computing 一类基于行列式计算思想的图像置乱加密算法 www.wanfangdata.com.cn 8. An Algorithm for Chaotically Encrypting Images 混沌加密图象算法 www.ilib.cn 9. The simple methods of file hiding and encrypting 文件隐藏与加密的简便方法 www.ilib.cn 10. Encrypting a single element with XML Encryption 使用XML加密对单个元素加密 www.ibm.com 1. For encrypting a particular element in the XML file 用于加密XML文件中的特定元素 www-128.ibm.com 2. Image Encrypting Algorithm Based on Cascade-Chaotic Mapping 基于级联混沌映射的图像加密算法 service.ilib.cn 3. The simulation of rolling code encrypting of sound signal based on variable split-band 可变分离频带技术的语音滚动加密仿真 www.ilib.cn 4. An Algorithm for Hyperchaos Encrypting Images Based on Coupled Map Lattices Mapping 基于耦合映象格子映射的超混沌加密图像算法 ilib.cn 5. Encrypting and Unbinding the Chinese Words in Computer Exam 计算机考试中汉字的加密与解密 www.ilib.cn 6. Methods and Technology of Software Encrypting 软件加密方法及技术 service.ilib.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。