网站首页  词典首页

请输入您要查询的英文单词:

 

单词 encryption
释义

encryption

美 [?n'kr?p?(?)n]
英 [?n'kr?p?(?)n]
  • n.〔计〕加密
  • 网络数据加密;加密技术;资料加密
n.
1.
〔计〕加密

例句

释义:
1.
You did not select an encryption key for the recipient of this message; therefore, the message will not be encrypted.
您没有为此信件的收件人选择加密密钥;因此,无法加密此信件。
translations.launchpad.net
2.
As should by now be obvious, appropriate key management procedures should be part of the core design of any encryption implementation.
现在您应该清楚了,恰当的密钥管理规程应该成为任何加密实现的核心设计部分。
www-128.ibm.com
3.
We recommend using one of these encryption methods for the connections between computers in a replication topology.
建议对复制拓扑中各计算机之间的连接,使用这些加密方法之一。
www.kuenglish.info
4.
Make sure that you use an encryption API that does not require the key to be stored somewhere and is not derived from the users password.
确保使用的加密API不需要在其他位置存储密钥,并且不是由用户的密码派生而来。
msdn2.microsoft.com
5.
There is no form of data encryption used, given that this is intended to be used in a public setting.
只要用在公共场合,就不会使用数据加密的形式。
www-128.ibm.com
6.
Adding encryption to a database application will almost certainly decrease performance, at least minimally .
在数据库应用程序中增加加密或多或少要降低性能。
www.bing.com
7.
Certificates are also used for authentication and encryption to help secure communications between a Client Access server and clients.
证书还可用于身份验证和加密,以帮助保护客户端访问服务器与客户端之间的通信。
technet.microsoft.com
8.
You did not select an encryption key for any of the recipients of this message; therefore, the message will not be encrypted.
您没有为此信件的任何一个收件人选择加密密钥;因此,无法加密此信件。
translations.launchpad.net
9.
Specify encryption algorithm (-ea) This option allows you to choose a strong encryption algorithm to encrypt your new database.
指定加密算法(-ea)此选项允许您选择用于加密您新数据库的高度加密算法。
www.ianywhere.com
10.
You did not select an encryption key for yourself (encrypt to self). You will not be able to decrypt your own message if you encrypt it.
您没有为您自己选择加密金钥(对自己加密)。如果您对邮件加密的话,您自己将无法解密邮件。
translations.launchpad.net
1.
Encryption has been used for thousands of years to secure data.
数千年来,人们长期使用加密来保护数据。
www-128.ibm.com
2.
If the portion of traffic that requires encryption is relatively small, carving out a separate class of service for it might be appropriate.
如果需要加密的流量部分相对较小,则为其划出单独的服务分类也许是适当的。
www.ibm.com
3.
I really like this feature, but after adding it to the installation the request to enter the encryption key is far from obvious.
我非常喜欢这个特性,但是在安装是勾选了这个设置后,输入加密密钥的请求却无从找寻。
www.bing.com
4.
Digital signatures require the use of two distinct but mathematically-related encryption keys known as a public key and a private key.
数字签名需要使用两个密钥一个是公钥一个是私钥。
www.cocoachina.com
5.
No matter how much encryption you use, leaving that vulnerability open won't help a bit.
无论您使用多少个加密,公开弱点没有一点好处。
www.ibm.com
6.
Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.
由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。
www.ibm.com
7.
You did not select encryption keys for some of the recipients; these persons will not be able to decrypt the message if you encrypt it.
您没有对此信件的其中几位收件者选择加密金钥,因此如果您加密此信件的话,这几位收件者可能无法解密。
translations.launchpad.net
8.
Try to use built-in primitives instead of building your own construction out of an encryption algorithm and a hash function.
尝试使用内置原语而不是抛开加密演算法和杂凑函数去建构自己的构造。
www-128.ibm.com
9.
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
www.ibm.com
10.
If it gets stolen or accidentally left somewhere, it can be accessed if it has no sort of encryption or locking device.
如果万一硬盘被盗或是被偶然落在别处,里面的数据就一览无余。
www.elanso.com
1.
Encryption can be applied to files or to information exchanged over a network connection.
可以对通过网络连接交换的文件或信息进行加密。
windowshelp.microsoft.com
2.
Data encryption is of little use unless you apply it to specifically mitigate a risk or to address a legal requirement.
数据加密用处不大,除非你把它应用于特定减轻风险或定加密风险应用位法律要件。
www.cto360.com
3.
They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one.
他们可以寻找密码算法中的缺陷,然后恶意修改它们,让强的加密算法变弱。
www.ibm.com
4.
In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.
在以色列的案例中,安全和加密技术一直是他们的强项,但这不是像它过去一样是个增长行业。
www.bing.com
5.
Encryption Even if intruders manage to break through a firewall, the data on a network can be made safe if it's encrypted.
加密即使入侵者设法突破了防火墙,如果网络上的数据是加密的,就能使其安全。
www2.ccw.com.cn
6.
The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key (KEK).
所述KDC向所述ME提供密钥加密密钥(KEK)形式的单点登录证书。
ip.com
7.
Likewise, if you write down your pass phrase and stick it on a post-it note on your monitor you might as well not use encryption at all.
此外,如果您喜欢把密码写在便笺上,然后把它粘贴到您的显示器上,那么您还是干脆不要加密的好。
wiki.ubuntu.org.cn
8.
Standard PDF Encryption with owner and user passwords used to be the only PDF protection.
标准的PDF加密与用来保护PDF格式的唯一拥有者和用户密码。
www.jisuxz.com
9.
Similarly, the encryption and validation keys and the encryption scheme and validation scheme used for cookie data must be exactly the same.
同样,用于Cookie数据的加密和验证密钥以及加密方案和验证方案也必须完全相同。
msdn2.microsoft.com
10.
You might hear this referred to as "setting up the encryption domain" for the firewalls.
您可能会听到这被称之为防火墙“设置加密域”。
www.ibm.com
1.
Because nonrepudiation is a direct result of authentication, message encryption also does not provide nonrepudiation.
由于认可是身份验证的直接结果,因此邮件加密也不提供认可。
www.kuenglish.info
2.
Determines whether the content of this partition should be overwritten with random data before setting up the encryption.
决定在建立加密前是否使用随机数据覆盖分区内容。
debian.fr
3.
Outlook does not allow you to use Basic authentication when connecting to your RPC proxy server without using SSL encryption.
不使用SSL加密而连接到RPC代理服务器时,Outlook禁止使用基本身份验证。
technet.microsoft.com
4.
The associated username value identifies the key (for signing) or certificate (for encryption) within that store to be used for processing.
相关联的用户名值指定存储中要使用的密钥(用于处理签名)或证书(用于处理加密)。
www.ibm.com
5.
Thomas, passive RFID tags is very easy to counterfeit, because they do not contain the traditional encryption and security protocols.
Thomas教授称,无源RFID标签很容易伪造,因为它们不含有传统的加密算法和安全协议。
www.bing.com
6.
Disk Encryption's easy-to-use interface makes selecting and encrypting a drive, a breeze.
磁盘加密的易于使用的界面,使选择和加密的驱动器,一个轻而易举的事。
bbs.winzheng.com
7.
The government has no legal instrument to compel the manufacturer of the American encryption system or Dantas to give the access codes.
政府没有可以迫使美国加密系统的生产商或者Dantas本人交出密码的法律文书。
www.bing.com
8.
This means that it's at least theoretically possible to specify encryption or signing on a per-message basis.
这意味至少从理论上可以在消息令牌基础上指定加密或签名。
www.ibm.com
9.
Encryption strength is no longer restricted by the United States government.
加密力度不再受美国政府的限制。
office.microsoft.com
10.
Encrypting view state data can affect the performance of your application, so do not use encryption unless you need it.
对视图状态数据进行加密会影响应用程序的性能,因此,除非确实需要,否则不要使用加密。
msdn2.microsoft.com
1.
Note that the container will be created if it does not exist, and an encryption operation is executed.
注意,如果该容器不存在,将创建它,并将执行加密操作。
msdn2.microsoft.com
2.
As a new encryption technology, the digital chaotic encryption technology has already got much more interest from all over the world.
作为新的密码技术,数字混沌加密技术已经引起了国内外学者的广泛兴趣。
www.boshuo.net
3.
If you use Basic authentication , we strongly recommend that you use Transport Layer Security ( TLS ) encryption to help improve security .
如果您使用基本身份验证,我们强烈建议您使用传输层安全性(TLS)加密来帮助提高安全性。
www.bing.com
4.
If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.
如果有一种理想的加密技术,将会有很多法律障碍来限制它的使用。
www.ibm.com
5.
It's easy to use, utilizes SSL (encryption), LIBZ (compression), and simple password protection.
它易于使用,并利用SSL(加密)、LIBZ(压缩)和简单的口令保护。
osl.cssp.com.cn
6.
While encoding is about changing the form of data, encryption suggests that recovering the plain text is intended to be difficult: It isn't.
有关更改数据的形式编码时,加密建议的恢复纯文本用于很困难:不是这样的。
technet.microsoft.com
7.
The short form of the cypherpunk's obsession with encryption can be summarized as: Pretty good privacy means pretty good society.
密码朋克对加密技术的执迷可以总结成:不错的隐私就意味着不错的社会。
www.showxiu.com
8.
Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data.
一般的安全特性是确保至少六个字符的密码,并且对敏感数据进行加密。
www.ibm.com
9.
Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest.
使用强式名称签署组件,就会将公开金钥加密加入含有组件资讯清单的档案中。
msdn.microsoft.com
10.
Virtually all encryption methods used for highly sensitive data are vulnerable to one quantum algorithm or another.
几乎所有用于保护高度敏感资料的密码系统,都会被某个量子算则所破解。
edba.ncl.edu.tw
1.
DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.
即美国国家数据加密标准(theUnitedStatesDataEncryptionStandard),是一个块密码算法,块长8字节,密钥长56位。
www.ibm.com
2.
In the case of PCI-DSS, a requirement exists for protection of cardholder data. This is usually implemented with encryption.
对于PCI-DSS,存在保护持卡人数据的要求,这通常通过加密来实现。
www.ibm.com
3.
To see the results of these tests, see the sidebar, " Port Encryption Test Results. "
要查看这些测试的结果,请参见补充栏“端口加密测试结果”。
www.ibm.com
4.
Encryption refers to the conversion of a message into an incomprehensible , meaningless form of data .
加密是指将讯息转换成不能理解及无意义的数据。
www.bing.com
5.
What was the encryption type requested during authentication handshake?
在身份验证握手期间请求的加密类型
www.ibm.com
6.
This service is compatible with Windows and Macintosh operating systems, and its state-of-the-art encryption technology ensures privacy.
此服务适用于Windows及Macintosh作业系统,其最先进的加密技术保证私隐不外泄。
www.ups.com
7.
For this reason, the best practice is to add the new form of encryption before removing the old form of encryption.
因此,最佳实践是在删除旧加密格式之前添加新的加密格式。
msdn2.microsoft.com
8.
Notice that unlike in the encryption example, the original entry information is still present; the signature has just been added to it.
注意,与加密的例子有所不同,原始的条目信息仍然会显示出来;签名只是被添加到其中。
www.ibm.com
9.
After backing out of the menu, an encryption key can be selected by moving the trackball and typing characters on the keyboard.
退回菜单后,通过移动轨迹球或输入键盘上的字母选择一个密钥。
www.bing.com
10.
"Homomorphic encryption gives you a way out of the dilemma " Gentry says. "It gives you a way to process data without having access to it. "
“同态加密给你走出困境的方法,”Gentry说。“它使你无需访问数据即可对其处理。”
www.bing.com
1.
The difference between the encryption types is the strength of algorithm and length of the key being used.
不同加密类型之间的差异在于算法的强度和使用的密钥长度。
www.ibm.com
2.
The CSP generates the public and private key pair used for the encryption and decryption of messages.
CSP生成用于信息加密和解密的公钥和私钥对。
www.fan6.net
3.
The last chapter is a summary, pointing out the work this paper do and what encryption card needs to be perfected.
最后一部分介绍了本文所做的工作及PCI加密卡需要完善的地方。
www.juhe8.com
4.
When a database encryption system is designed, the design of key-managing module is a very difficult problem and must be solved firstly.
密钥管理方案的设计是数据库加密系统设计时必须首先解决的一个难题。
kns50.chkd.cnki.net
5.
The file transparent encryption system proposed in this paper is an important part of a whole data loose prevention solution.
本文所研究的文档透明加密系统是一个完整数据泄漏防护解决方案的重要组成部分。
www.fabiao.net
6.
HTTP are the verbs: GET, PUT and POST as well as a number of thoroughly tested solutions in the fields of authentication and encryption.
HTTP是动词:GET、PUT和POST以及很多在身份验证和加密领域经过仔细测试的解决方案。
www.ibm.com
7.
Encryption granularity can be further refined by specifying whether the encryption is of type element or content.
加密的粒度还可以进一步细化,规定加密的类型是元素还是内容。
www.ibm.com
8.
One of the most popular secret-key encryption schemes is IBM's Data Encryption System (DES), which became the U.
ibm的数据加密系统(des)是最流行的秘钥加密方案之一。
www.1stenglish.com
9.
To ensure the maximum performance, memcached does not provide any form of security, either in authentication or encryption.
为了确保最佳性能,memcached并未提供任何形式的安全性,没有身份验证,也没有加密。
www.ibm.com
10.
WebSphere Application Server encrypts various user tokens (including the LTPA cookie) using what are known as the LTPA encryption keys.
WebSphereApplicationServer使用LTPA加密密钥加密各种用户令牌(包括LTPAcookie)。
www.ibm.com
1.
This thesis is to focus on research group of the key agreement protocol session keys, as well as the mainstream encryption algorithm, etc.
本论文的重点就是研究群组密钥协商协议中的会话密钥,以及主流的加密算法等。
zhidao.baidu.com
2.
SSL can be used for server validation when a client connection requests encryption.
客户端连接请求加密时,SSL可用于服务器验证。
msdn2.microsoft.com
3.
It is not the only option which to increase the key length of encryption algorithm in order to enhance security.
仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。
www.mr5i.com
4.
The secure exchange of encryption keys used to scramble and unscramble data is one of the most vexing aspects of modern cryptography.
加密与解密数据的密钥的安全传输是现代密码学最棘手的问题之一。
www.bing.com
5.
Someone needs to be around to feed passwords to any software needing encryption keys.
旁边需要一个人来为需要加密密钥的任何软件提供密码。
www.ibm.com
6.
It then saves the XML-encrypted file to disk, as well as the key used for encryption.
然后它将XML加密的文件以及用于加密的密钥保存到磁盘。
www-128.ibm.com
7.
Even the encryption can tie up the RFID Web services, as it must perform complex calculations to achieve desired results.
甚至加密也可能使RFIDWeb服务陷于停顿,因为必须执行复杂的计算才能获得希望的结果。
www.ibm.com
8.
If you wish to make cross cell IIOP calls, but want to avoid sharing LTPA encryption keys, it is possible.
如果要进行跨计算单元的IIOP调用,但希望避免共享LTPA加密密钥,则完全可以实现。
www-128.ibm.com
9.
Provides links to reference documentation for classes used for XML encryption and digital signatures.
提供指向用于XML加密和数字签名的类的参考文档的链接。
msdn2.microsoft.com
10.
Includes WD Sync synchronization and encryption software that lets you save your critical data, and take it with you.
附送WDSync同步及加密软件,让您安心储存重要数据,随身携带。
www.westerndigital.com
1.
The work of this paper is of practical significance for promoting the research and development of the network encryption products.
论文工作对促进网络加密产品的研究和开发具有一定的实际意义。
www.fabiao.net
2.
Like most certificate based encryption schemes it allows a client and server to talk in a trusted manner without the use of a password.
跟大多数基于证书加密的方案类似,它能做到让客户端和服务器无需密码就可以安全地交流。
wiki.ubuntu.org.cn
3.
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.
该系统能有效的防止网络内部的重要数据通过网络泄露出去,无需用户进行手动的加密解密操作。
www.lunwenchina.net.cn
4.
Data stored on removable tape cartridges may be encrypted by an encryption engine to protect the data.
可更换的盒式带上存储的数据可被加密引擎加密以保护该数据。
www.pat365.com
5.
This type of encryption is referred to as "symmetric key" encryption, because both parties use the same key.
此类加密称为“对称密钥”加密,因为双方使用相同的密钥。
technet.microsoft.com
6.
If the encryption algorithm or minimum key length is not available on a given client, Outlook Web Access does not allow encryption.
如果在给定的客户端上加密算法或最小密钥长度不可用,OutlookWebAccess将不允许加密。
technet.microsoft.com
7.
Since chaos system is extremely sensitive for initial value, ergodic and a period, it was widely applied for image encryption.
由于混沌系统具有非周期性、遍历性、伪随机性和对初值的高度敏感性,因而已被广泛应用于图像置乱。
cjig.cn
8.
It is possible to set up an encrypted partition using a pass phrase as encryption key .
但可以使用密码作为密钥来建立加密分区。
www.bing.com
9.
American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms.
美国20世纪的数据加密标准DES是到目前为止使用最广、讨论最多的分组密码算法之一。
www.fabiao.net
10.
BMP file, to save space, security encryption, data protection, while multimedia and increase the space and time of parallelism .
BMP文件中,以达到节省空间,安全加密,数据保护,多媒体同时运行,提高空间与时间的并行性。
dictsearch.appspot.com
1.
Another solution would be IP-over-IP tunneling which could avoid the time penalty of the encryption but requires more implementation effort.
另一个解决方案应该是IP-over-IP隧道,这样可以避免加密的时间消耗,但是其实现需要付出更多努力。
www-128.ibm.com
2.
Requires that only FIPS-approved algorithms should be used for strong database and communication encryption.
要求仅使用FIPS认可的算法来对数据库和通信进行高度加密。
www.ianywhere.com
3.
Password security at the workbook level uses advanced encryption to help protect your workbook from unauthorized access .
工作簿级别的密码安全使用高级加密来帮助保护工作簿免受未授权的访问。
www.bing.com
4.
It scans a physical memory image file of the target computer and extracts all the encryption keys for a given BitLocker disk.
它扫描目标计算机物理内存的映像文件然后释放出给定的BitLocker加密磁盘的加密密钥。
www.cnbeta.com
5.
This book reveals the Windows platform for a comprehensive encryption and decryption technology!
本书全面揭示Windows平台的加密与解密技术!
www.pudn.com
6.
However, for this to work the Gateway has to be configured with a suitable certificate for TLS encryption.
然而,为了使起动作起来,网关必须被配置适用于TLS加密的证书。
www.infoq.com
7.
Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption.
公钥加密湜使苚弌对非对称菂密钥加密或解密菂技术。
jiaocheng.gdjob168.com
8.
By default, the certificates that are used for authentication and encryption for TLS are self-signed certificates.
默认情况下,用于TLS的身份验证和加密的证书是自签名证书。
technet.microsoft.com
9.
Dialog security provides encryption, remote authentication, and remote authorization for a specific conversation.
对话安全模式可以为特定会话提供加密、远程身份验证和远程授权。
msdn2.microsoft.com
10.
In the transmitter of cryptosystems, the plaintext is encrypted by means of international data encryption algorithms (IDEA).
密码系统之传送端,明文信号以国际资料编码演算法(IDEA)密码器编码。
www.etop.org.tw
1.
With both security configurations, symmetric encryption is used for the messages exchanged between the client and the service.
通过这两种安全性配置,客户端和服务之间的消息交换使用了对称加密。
www.ibm.com
2.
The public-key system uses a pair of mathematically related sequences, one each for encryption and decryption [1].
公钥系统采用一对数学上相关的序列,一个用于加密,另一个用于解密。
www.ltesting.net
3.
Two features of Encryption Expert that help you to ensure high availability are the use of failover servers and encryption key caching.
EncryptionExpert能够保证高可用性的两个特性是使用故障转移服务器和加密密匙缓存。
www.ibm.com
4.
Such ciphers permit length-preserving encryption of a data stream with only a single pass through the data.
这些加密方法使得对只有单一输入数据的数据流实施保持长度不变的加密成为可能。
www.fabiao.net
5.
Specifies the encryption algorithm used to encrypt the message body of a private message.
指定用于对私有消息的消息体进行加密的加密算法。
msdn2.microsoft.com
6.
At all points in between, the message is protected, either for integrity (using hashing) or for privacy (using encryption).
在消息生成和消息使用之间的所有时点上,消息都受到保护,不管是为了完整性(使用散列表)还是为了私密性(使用加密)。
www.ibm.com
7.
View state encryption prevents the users from being able to read the values in the hidden view state field.
视图状态加密会阻止用户能够读取隐藏视图状态字段中的值。
msdn2.microsoft.com
8.
Data encryption is an important tool to help application developers meet the need for greater security.
数据加密是帮助应用程序开发人员满足更高安全性要求的重要工具。
www-128.ibm.com
9.
Encryption technology can be divided into two categories: symmetric and asymmetric encryption technology, encryption technology.
加密技术可以分为两类:对称加密技术和非对称加密技术。
zhidao.baidu.com
10.
Intrusion Detection is an important security technology of protecting information system as well as firewall and data encryption techniques.
入侵检测是继数据加密、防火墙等传统安全保护技术后的又一种新的安全技术。
www.fabiao.net
1.
At least one encryption method must be specified.
至少要指定一个加密方式。
www.fan6.net
2.
The result of simulation shows that the algorithm can give satisfactory result of encryption and decryption.
仿真结果表明,该算法具有很好的加密、解密结果。
www.ceps.com.tw
3.
First of all, this paper described the definition and the security model of the identity-based encryption.
首先叙述了基于身份的加密定义和安全模型;
www.ceps.com.tw
4.
Encapsulates the encryption algorithm used for XML encryption.
封装用于XML加密的加密算法。
msdn2.microsoft.com
5.
The initialization process creates and stores a symmetric key used for encryption.
初始化过程将创建并存储一个用于加密的对称密钥。
technet.microsoft.com
6.
The encrypt key, include. encrypt and exclude. encrypt, options can be used to manage encryption for Tivoli Storage Manager operations.
加密密钥include.encrypt和exclude.encrypt选项可用于管理TivoliStorageManager操作的加密。
www.ibm.com
7.
In short, it s another encryption standard that has fallen victim to modern computing power and can be cracked in no time at all.
简单来说,这些都属于其他加密标准,但由于现代计算机的强大性能,很快也被破解。
www.bing.com
8.
The proposed algorithm can be applied to digital image encryption or preprocessing of information hiding. . .
该方法可用于图像加密或信息隐藏的预处理。
kns50.chkd.cnki.net
9.
The present invention relates to a solution for handling encryption of control messages in a wireless telecommunications network.
本发明涉及用于处理无线电信网络中控制消息的加密的解决方案。
ip.com
10.
The chip, the algorithms are specific procedures may be read out key data encryption used to counter the logic analyser.
此芯片中存有特定的算法程序,可将读出的密钥数据进行加密变换,以对抗逻辑分析仪。
ks.cn.yahoo.com
1.
SSL is the encryption used to secure your communications with banks, e-mail providers and anything else you don't want to be snooped.
SSL是一种加密手段,用于保障你和各种机构之间联系的安全性,包括银行、电子邮件供应商以及任何你不想泄露隐私的机构。
dongxi.net
2.
Simply run each cell with a different operating system user ID, different encryption keys, and different administrative passwords.
直接使用不同的操作系统用户ID、不同的加密密钥和不同的管理密码运行每个计算单元即可。
www.ibm.com
3.
Step 1: Convert the XML to be digitally signed into a DOM object as was done prior to encryption.
步骤1:同前面加密的步骤一样,将需进行数字签名的XML转换为DOM对象。
www.ibm.com
4.
If the main device fails, the backup can take over, duplicating all the encryption parameters, that were in force.
如果主设备失灵,备用设备可切换过来,将所有有效的加密参数复制下来。
www.ayste.com
5.
Is the name of an instance of Notification Services that uses argument encryption.
使用参数加密的NotificationServices实例的名称。
msdn2.microsoft.com
6.
This protects the key from being accessed by an attacker and rendering your encryption useless.
这一方面可以防止密钥遭到攻击者的访问,另一方面也可以避免使您的加密变得无用。
msdn2.microsoft.com
7.
Asymmetric algorithms are usually used to encrypt small amounts of data such as the encryption of a symmetric key and IV .
不对称算法通常用于加密少量数据,如加密对称密钥和IV。
www.bing.com
8.
You can select the levels of encryption that this profile supports.
您可选择此配置文件支持的策略加密级别。
angel.w15.5tom.cn
9.
Use this page to create, back up, or restore the encryption key. It is recommended that you back up the encryption key after you create it.
使用此页面可创建、备份或恢复加密键。建议在创建加密键后对其进行备份。
it.bab.la
10.
SSH offers certificate based authentication, strong encryption, and other features, and is considered to be far more secure.
SSH提供基于验证的证书、强加密和其他特性,并且被认为安全多了。
www.ibm.com
1.
Require encryption of data at least 8 bytes, number of bytes to be divisible by 4.
要求被加密的数据至少8字节,字节数能被4整除。
www.pudn.com
2.
The French-owned company already has a growing security solutions and services business in the U. K. , including some encryption products.
这家法国跨国公司已经在英国制定了安全解决方案,并设立了业务部,其中包括一些加密产品。
www.etiri.com.cn
3.
Encryption and digital signatures are techniques to expand the dynamics of trust into a new territory.
而加密技术和数字签名则正是一种把信任动力学扩展到新领域的技术。
www.showxiu.com
4.
The design proposal of the U-disk with identity authentication and data encryption is implemented in this thesis.
本文实现了一种具有身份认证及数据加密U盘的设计方案。
www.13191.com
5.
In this paper, generalized Knight's Tour Problem (KTP) is combined with video encryption, and a novel video encryption scheme is proposed.
将广义骑士巡游与视频加密相结合,提出了一种新的视频加密方案。
www.ceps.com.tw
6.
For instance, you can implement an encryption or compression algorithm to run with an existing Web service.
例如,您可以实现加密或压缩算法以便与现有的Web服务一起运行。
msdn2.microsoft.com
7.
It was mainly introduced the design solution by the digital watermark technology solving keys security of dynamic encryption and decryption.
介绍一种结合数字水印技术解决动态加解密密钥安全性的设计方案。
www.dictall.com
8.
Generating a suitable key is one of the thornier problems associated with encryption.
生成适当的密钥是与加密相关的一个更棘手的问题。
www-128.ibm.com
9.
Specifies that the application uses both data validation and encryption to help protect the cookie.
指定应用程序同时使用数据验证和加密方法来保护Cookie。
msdn2.microsoft.com
10.
Compiling a generic encryption program that encrypts data using any specified key into a program that is optimized for a particular key.
编译一个一般加密程序,该程序将使用任何指定密钥的数据加密为为特定密钥优化的程序。
msdn2.microsoft.com
1.
The service most commonly used seems to offer good encryption of data in transit and at rest, but weak password security.
最常用的服务似乎能为数据的传输和保持提供优良的加密,但却存在弱口令的问题。
shi-wei.net
2.
And a brief introduction of two important agreements TKIP encryption and CCMP.
并简单介绍了两种重要的加密协议TKIP与CCMP。
zhidao.baidu.com
3.
These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.
可用各种方式组合这些机制,以便用各种加密技术建立各种安全模型。
www.ibm.com
4.
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
www.ibm.com
5.
Encryption errors indicate a problem with creating, storing, or reading the encryption keys used to protect sensitive data.
加密错误则表示在创建、存储或读取用于保护敏感数据的加密密钥时有问题。
technet.microsoft.com
6.
The selected EAP package does not provide encryption keys. Select an EAP package that does provide keys or select not to encrypt.
所选的EAP程序包没有提供加密键。请选提供键的EAP程序包或选择不加密。
angel.w15.5tom.cn
7.
Using a set of encryption connection parameters, you specify trusted public certificates, the type of encryption, and the network protocol.
使用一组加密连接参数指定受信任公共证书、加密类型和网络协议。
www.ianywhere.com
8.
with encryption , mr . lam can be assured that the contents of the exam . paper will be kept from the prying eyes of unauthorized parties.
利用加密技术,林老师可保障讯息的机密性,确保考试卷不会被未获授权的人读取。
www.ichacha.net
9.
Data encryption is one of the basic measures for computer system security defence .
数据加密是计算机系统安全防护的基本措施之一。
dict.kekenet.com
10.
Object that encapsulates the algorithm used for XML encryption.
对象,封装用于XML加密的算法。
msdn2.microsoft.com
1.
In public-key or two-key encryption, a key pair is used for encryption and decryption.
公钥加密是使用一对非对称的密钥加密或解密的技术。
www.dictall.com
2.
You could also use a custom encryption algorithm to encrypt the username and the password at the client end using WMLScript.
您也可以用WMLScript来编写自定义的加密算法,以对客户端的用户名和密码进行加密。
www.ibm.com
3.
Once identity is verified, kerberos provides the two computer with encryption keys for a secure communication session.
一旦身份得到验证,KERBEROS协议给这两台计算机提供密匙,以进行安全通讯对话。
www.24en.com
4.
The link between the ESB and provider services may be secured by network architecture, by ESB credentials or by encryption using PKI.
ESB和提供者服务之间的链路可能由网络体系结构、ESB凭据或使用PKI的加密进行保护。
www.ibm.com
5.
The security properties of this connection have been reset to the available encryption strengths.
此连接的安全属性被重设为使用可用的加密强度。
www.dictall.com
6.
RSA_TLS encryption protects the confidentiality and integrity of network packets as they pass between the client and the server.
当网络数据包在客户端和服务器之间进行传输时,使用RSA_TLS加密可保护它们的保密性和完整性。
www.ianywhere.com
7.
He explains that such a move is needed for homomorphic encryption and cloud security.
他解释说这样一个动态之所以被需要是出于单态加密(homomorphicencryption)和云安全性的考虑。
www.infoq.com
8.
File encryption does not eliminate the role of traditional access permissions, but it does add more granularity and flexibility.
文件加密不排除传统访问权限的角色,而是增加了更高的粒度和灵活性。
www.ibm.com
9.
The only point where the coding details really require explanation is Step 9, where I actually performed the DES-CBC encryption.
编码细节中真正需要解释的一点是第9步,在这里我实际执行了DES-CBC加密。
www.ibm.com
10.
Apple uses industry-standard encryption to protect the confidentiality of your personal information.
Apple使用行业标准加密来保护您的个人信息的机密。
docs.info.apple.com
1.
Voice Recorder with Encryption allows you to easily record all your mobile phone conversations.
加密留声机允许你轻松的记录下你所有的手机通话。
bbs.wda.com.cn
2.
The conversation in this example allows the message to travel over the network without encryption if encryption is not available.
如果加密不可用,则此示例中的会话允许消息在不加密的状态下通过网络传输。
technet.microsoft.com
3.
Please note KDC is configured to support encryption types which are a variant of des-cbc-crc, as it works well with OpenAFS.
请注意,KDC被配置为支持des-cbc-crc变体的这些加密类型,因为des-cbc-crc非常适用于OpenAFS。
www.ibm.com
4.
National information security expert, academician Shen Chang-xiang first proposed the idea of trusted storage does not rely on encryption.
国内信息安全专家沈昌祥院士首次提出了不依赖于加密的可信存储思想。
www.fabiao.net
5.
Also, in SSH, the degree of security needed can be configured by choosing the appropriate method of encryption desired by the user.
在SSH中,可以通过选择用户需要的适当的加密方法,来配置所需的安全级别。
www.ibm.com
6.
A new fair exchange protocol with semi-trusted third party is proposed on the basis of a new convertible authenticated encryption scheme.
基于一种可转换的认证加密方法,设计出一种新的包含半可信第三方的公平交换协议。
211.103.157.156
7.
Also, multiple filters can be added to provide increasing levels of security, encryption, and non-repudiation services as necessary.
此外还可以添加多个过滤器,以便根据需要提高安全、加密和不可拒绝的服务的等级。
www-128.ibm.com
8.
Shows whether the stored procedure was created with an optional encryption parameter.
显示选定存储过程是否是用可选的加密参数创建的。
msdn2.microsoft.com
9.
XML Encryption allows a document to contain multiple encrypted elements and allows an element to be encrypted multiple times.
XML允许一个文档包含多个加密的元素,并允许多次加密一个元素。
msdn2.microsoft.com
10.
Defined by the application and used in conjunction with connector applications or message encryption.
与连接器应用程序或消息加密一起使用。
msdn2.microsoft.com
1.
Access can also be limited by the strength of the encryption. Select this option only if 128-bit encryption is supported on this computer.
可以通过加密限制访问。只有在此计算机支持128位加密的情况下才选择此选项。
blog.sina.com.cn
2.
Ideally, the same format used internally but externally (UFS) but without the layer of encryption to be connected externally.
好像是相当的格式用于内部,但外部没有加密??
bbs.a9vg.com
3.
not the illegal reselling of reception facilities, encryption card, a positioning card, making false information.
不得非法倒卖接收设施、加密卡、定位卡,编制虚假用户信息。
blog.sina.com.cn
4.
Reporting Services uses encryption keys to secure credentials, connection information, and accounts that are used in server operations.
ReportingServices使用加密密钥来保护服务器操作中所使用的凭据、连接信息和帐户。
msdn2.microsoft.com
5.
The result of the encryption of the last 8-byte block (discarding all previous cipher blocks) is the outcome of Step 9.
第9步的结果是最后8字节块的加密结果(放弃所以以前的密文块)。
www.ibm.com
6.
With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.
通过组合使用不同的密钥长度和散列算法,IBMNAS提供表1所示的加密类型。
www.ibm.com
7.
Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.
公钥加密密钥的分布问题在秘钥系统中一直是一个薄弱环节。
net.sxtcm.com
8.
When you specify that encryption is required for the messages sent to a queue, only the message bodies are encrypted.
当指定要求对发送到队列的消息进行加密时,仅加密消息体。
msdn2.microsoft.com
9.
The invention can be applied to the computer equipment with any kind of encryption request.
本发明可以应用于任何有保密要求的计算机设备上。
ip.com
10.
If ENCRYPT_CDR = 1, it encrypts if the server to which it's connecting also supports encryption.
如果ENCRYPT_CDR=1,且所连接的服务器也支持加密,则进行加密。
www.ibm.com
1.
Payload interception and encryption of this process is what this article uses to add encrypted events to your calendar.
本文通过负载截取和过程加密的方式向日程表添加加密事件。
www.ibm.com
2.
Each of these use their own local storage format and proprietary encryption mechanism to store the login passwords.
其中每个用自己的本地存储格式和专有加密机制来保存登录密码。
www.jisuxz.com
3.
Bulk Encryption Simultaneous encryption of all channels of a multichannel telecommunications trunk.
集中加密多信道电信中继线中所有信道同时加密。
swtrunk.bokee.com
4.
A possible cause is that this encryption keys for this server may have been modified illicitly .
一种可能的原因是,该服务器的加密密钥已被非法修改。
www.bing.com
5.
It is capable of message digests, encryption and decryption of files, digital certificates, digital signatures, and random numbers.
它可以实现消息摘要、文件的加密和解密、数字证书、数字签名和随机数字。
www.ibm.com
6.
The approach to generating digital chaotic sequence can be applied in secret communications and information encryption.
这种产生数字混沌序列的方法可应用于保密通信和信息加密之中。
www.joca.cn
7.
This is a kind of cheapest way of encryption. So long as you buy a set of encryption software, numerous key disks can be created.
这是一种成本最低的加密方式,只要购买一套加密软件,便能生成无数的密钥盘。
www.touchscreen.com.cn
8.
The principles of cryptography are today applied to the encryption of fax, television, and computer network communications.
密码法的原则现今应用于传真、电视与计算机网络通讯的加密。
chinafanyi.com
9.
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
www.ibm.com
10.
In order to provide a more effective encryption technique, the concept of random chaotic dynamical systems group was given.
为提供更有效的加密方法,提出了随机混沌动力系统组的概念。
www.ceps.com.tw
1.
The presented method is quite different to ordinary random phase encryption method, and the random phase mask is not needed.
该加密方法显著区别于常用的随机相位加密方法,不再需要制作随机相位板。
202.119.108.211
2.
Describes the elements of replication security: authentication, authorization, encryption, and filtering.
介绍复制安全性的元素:身份验证、授权、加密和筛选。
msdn2.microsoft.com
3.
They have implemented the most up-to-date encryption and data protection methods and standards.
他们实施最切合时宜的加密和数据保护的方法和标准。
xtdownload.com
4.
If your wireless network is protected by WEP encryption, ensure that you specify your network password when configuring your connection.
如果你的无线网络受WEP加密保护,那么在设置连接的时候,请确保你的网络密码明确无误。
translations.launchpad.net
5.
Because each packet is encrypted individually, encryption keys can be changed with virtually unlimited frequency.
由于每个包是分别加密的,加密密钥实际上能以无限制的次数加以改变。
www.jukuu.com
6.
WebSphere CloudBurst also includes an image repository, built into the appliance, which leverages encryption and sharding technologies.
WebSphereCloudBurst还包含一个内置到设备中的映像库,该库利用了加密和碎片技术。
www.ibm.com
7.
In a Reporting Services installation, only the Report Server Windows service can perform encryption operations.
在ReportingServices安装中,只有报表服务器Windows服务可以执行加密操作。
msdn2.microsoft.com
8.
We have briefly discussed our encryption strategy in the last section (Java Cryptographic Architecture).
在上一节(Java密码体系结构)中,我们已经简要地讨论了我们的加密策略。
www.ibm.com
9.
The bit length of the encryption key determines the strength of the encrypted certificate which you send to the third-party CA.
加密密钥的位长决定了您发送给第三方证书颁发机构的加密证书的加密效果。
blog.163.com
10.
The addition of encryption is a perfect example of a non-semantic contribution to the service specification.
增加加密是处理服务规范的非语义特征的好例子。
www.ibm.com
1.
A protector is a program that controls the encryption and decryption of rights-managed files of a specific file format.
保护程序是一种可以控制对特定文件格式的权限管理文件进行加密和解密的程序。
office.microsoft.com
2.
You will set the frequency of calling of the encryption interface in the application software and measures to be taken when no Dog is found.
您的应用程式需要重新编译。由您来设置应用程式中调用加密介面的次数以及没有发现狗采取的措施。
wells.hk
3.
It prompts you for certificate identification and file information and uses RSA or elliptic - curve encryption technology .
它向您提示证书标识和文件信息,并使用RSA或椭圆曲线加密技术。
www.bing.com
4.
IC card initialization encryption, to users, customers IC card issuance systems, the cards will generate its own system dedicated key.
IC卡初始化加密后,交给用户使用时,客户通过IC卡发行系统,又将各用户卡生成自己系统的专用密钥。
www.videodoorphone.com.cn
5.
Encryption Protect the data stored on your computer and transmitted over the internet.
保护被存储在您的计算机和被传送在互联网的数据。
board.verycd.com
6.
To verify the expiration date of each Encryption Expert component, check the X. 509 certificate files shown in Table 4.
要核实每个EncryptionExpert组件的有效期,请查看表1所示的X.509证书文件。
www.ibm.com
7.
Because encryption is performed only by the Report Server Windows service, the keys must be updated when you reset the Windows service.
由于仅由报表服务器Windows服务执行加密,因此只需在重置该Windows服务时更新这些密钥即可。
msdn2.microsoft.com
8.
In a strategy paper published last week, the EU said research was needed to make tags more secure - through authentication and encryption.
欧盟在上周发表的一份策略文件里表示,有必要通过鉴定和加密研究使标签更安全。
blog.gkong.com
9.
This combination refers to the name of the key that Imran uses for data encryption.
这个组合引用了Imran用于数据加密的密钥名称。
www.ibm.com
10.
We must then consider whether developing systems to break encryption schemes is ethical or not.
然后我们也不得不考虑发展破坏加密技术体系是否是道德的。
www.ibm.com
1.
This level of encryption has been approved by the U. S. National Security Agency for the protection of classified information.
这种级别的加密已经被美国国家安全局批准用以保护机密信息。
www.realsoftware.com
2.
The Office Access 2007 encryption tool uses a stronger algorithm than was used in earlier encryption tools.
OfficeAccess2007加密工具使用的算法比早期的加密工具使用的算法更强。
office.microsoft.com
3.
Sets the key being used for Passport encryption and decryption.
设置用于Passport加密和解密的密钥。
msdn2.microsoft.com
4.
Developers that transmit sensitive information should add some additional data encryption-there are tools available to help here.
如果需要传输敏感数据的话,开发者必须在GSM加密技术之外提供额外的数据加密-有很多工具可以帮助开发者完成这项工作。
www.infoq.com
5.
Creates an instance of a cryptographic object to perform the Data Encryption Standard (DES) algorithm .
创建加密对象的实例以执行数据加密标准(DES)算法。
www.bing.com
6.
The prevailing of RFID arouses the security concern. Re-encryption is an approach with many advantages among approaches for RFID security.
RFID的普遍应用引起了安全问题,在众多的RFID安全解决方案中重加密技术具有很多优点。
kns50.chkd.cnki.net
7.
If clear text is not secure enough for your application, add an encryption algorithm.
对您的应用程序来说,如果明文形式不够安全,请添加加密算法。
msdn2.microsoft.com
8.
Most corporations do not need the level of email security provided by PGP or built-in public key encryption in most email systems.
大多数企业的大多数电子邮件系统不需要PGP或内置公匙加密提供的电子邮件安全级别。
blog.sina.com.cn
9.
Basic website display and secure encryption requested (The RSS feed will display on a website). Superior design skills are a plus.
网站上显示的基本要求和安全加密(RSS源将显示在网站上)。卓越的设计能力者优先。
www.bing.com
10.
File encryption can be accomplished in a variety of ways, but it's rarely used because of the burden on system administrators or users.
可以通过各种方式来实现文件加密,但通常很少使用,因为这会加重系统管理员或用户的工作负担。
www.ibm.com
1.
Image scrambling is evaluated from position and pixel value according to the kind of image encryption.
由于图像置乱分成位置和像素值置乱两类,图像置乱衡量也从这两方面进行分析。
oldweb.cqvip.com
2.
Netscape is unable to communicate securely with this site Because the server does not support high-grade encryption.
Netscape无法安全地与此网站进行通信,因为服务器不支持高级加密。
dict.ebigear.com
3.
SSH supports multiple encryption types, with most of its implementation supporting stronger encryption types like AES.
SSH支持多种加密类型,它的大多数实现支持诸如AES之类的更强的加密类型。
www.ibm.com
4.
Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.
可以利用加密技术来使Web服务请求和响应中交换的信息不可读。
www.ibm.com
5.
This process of changing information into a code is encryption and the process of changing code back is decryption .
将信息更改为代码的这一过程称为加密,而将代码重新更改为信息的过程则称为解密。
www.bing.com
6.
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
www.ibm.com
7.
Values that specifies the type of padding used for encryption.
指定加密所用的填充类型的。
msdn2.microsoft.com
8.
After the folder encryption to exist independently EXE file, the software can be installed without an independent declassified .
加密后的文件夹,以EXE文件独立存在,不需安装本软件即可独立解密。
dictsearch.appspot.com
9.
The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.
加密过程或解密过程一般被称作密码术,且依赖于数学算法。
www.ibm.com
10.
Keys are used for digitally signing documents and verifying signatures , and they help with the encryption and decryption processes .
密钥用于数字签署文档和验证签名,也用于加密和解密过程。
www.bing.com
1.
This would allow someone with access to the disk to recover parts of the encryption key or pass phrase.
这样别人可以通过访问磁盘来恢复加密密钥或口令句的一部分。
translations.launchpad.net
2.
With XML Encryption, each party can maintain secure or insecure states with any of the communicating parties.
使用XML加密,每一方都可以保持与任何通信方的安全或非安全状态。
www.ibm.com
3.
The encryption offered by SSL over HTTP only exists for the duration of transit and is not persistent.
基于HTTP的SSL提供的加密仅仅在传输的过程中存在,它是不持久的。
www.ibm.com
4.
The text of a stored procedure created with the ENCRYPTION option cannot be viewed by using the.
目录视图查看使用ENCRYPTION选项创建的存储过程的文本。
msdn2.microsoft.com
5.
It has implemented XML encryption with encryption, and got encryption with digital signature algorithm.
最后用文档加密算法实现XML文档加密,按数字签名算法把要加密元素进行加密。
kns50.chkd.cnki.net
6.
Encryption also suggests that the encoding algorithm is supposed to be resilient to attack: It isn't.
加密还建议的编码的算法是应该复原攻击:不是这样的。
technet.microsoft.com
7.
In particular, encryption can dramatically increase the size of a message.
尤其是可能会大幅增加讯息大小的加密步骤。
technet.microsoft.com
8.
The grouping cryptography is widely used in database encryption which now leads to great difficulty in substring query .
数据库加密通常采用分组加密算法,这给子串查询带来了很大的困难。
dictsearch.appspot.com
9.
An encryption communication system including a host and a data terminal card device is disclosed.
包括主机和数据终端卡装置的加密通信系统。
ip.com
10.
For streaming encryption, block cipher needs to be translated into the work flow model.
对于流加密,需要将分组密码转化为流模式工作。
nulung.com
1.
Substitute the name of the Web application where you want to test the encryption.
请替换要测试加密的Web应用程序的名称。
msdn2.microsoft.com
2.
Brute force attack on the RC4 encryption algorithm is one of the research directions of cryptology.
暴力破解加密算法是密码学的研究方向之一。
goabroad.zhishi.sohu.com
3.
CA certificate to the participating parties, and centralized management, storage, digital certificate and private key encryption.
认证中心向参与各方颁发证书,并集中管理,存储数字证书和加密私钥。
zhidao.baidu.com
4.
The release is capable of testing authentication, digital signature and encryption.
这个发布可以测试身份认证、数字签名以及加密。
www.infoq.com
5.
If yes, you need file encryption tool to protect your contents, Touch Crypto is the smart encryption tool just for you.
如果是的话,你需要的文件加密工具来保护您的内容,触摸加密是智能加密工具,只为你。
www.opda.net.cn
6.
The SSL protocol provides authentication, data encryption, and data integrity, in a public-key infrastructure (PKI).
SSL协议在一个公共密钥基础设施中提供认证、数据加密和数据完整性。
www.ibm.com
7.
When creating the endpoint, a system administrator specifies the authentication and encryption methods of the server instance.
创建端点时,系统管理员指定服务器实例的身份验证和加密方法。
technet.microsoft.com
8.
The encryption is transparent to the application, and you do not need to make any changes to the application itself.
加密对应用程序是透明的,您不需要更改应用程序本身。
www.ibm.com
9.
Digital certificates and encryption technology help to guard against unauthorised access and ensure confidentially of tender submission .
利用数码证书及先进的加密科技,系统可以防止有人擅自进入浏览及确保投标资料的保密。
www.bing.com
10.
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
www.ibm.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/2/21 17:19:30