单词 | encryption keys | ||||
释义 | encryption keys
例句释义: 加密密钥,密钥加密 1. Digital signatures require the use of two distinct but mathematically-related encryption keys known as a public key and a private key. 数字签名需要使用两个密钥一个是公钥一个是私钥。 www.cocoachina.com 2. You did not select encryption keys for some of the recipients; these persons will not be able to decrypt the message if you encrypt it. 您没有对此信件的其中几位收件者选择加密金钥,因此如果您加密此信件的话,这几位收件者可能无法解密。 translations.launchpad.net 3. WebSphere Application Server encrypts various user tokens (including the LTPA cookie) using what are known as the LTPA encryption keys. WebSphereApplicationServer使用LTPA加密密钥加密各种用户令牌(包括LTPAcookie)。 www.ibm.com 4. The secure exchange of encryption keys used to scramble and unscramble data is one of the most vexing aspects of modern cryptography. 加密与解密数据的密钥的安全传输是现代密码学最棘手的问题之一。 www.bing.com 5. Someone needs to be around to feed passwords to any software needing encryption keys. 旁边需要一个人来为需要加密密钥的任何软件提供密码。 www.ibm.com 6. If you wish to make cross cell IIOP calls, but want to avoid sharing LTPA encryption keys, it is possible. 如果要进行跨计算单元的IIOP调用,但希望避免共享LTPA加密密钥,则完全可以实现。 www-128.ibm.com 7. It scans a physical memory image file of the target computer and extracts all the encryption keys for a given BitLocker disk. 它扫描目标计算机物理内存的映像文件然后释放出给定的BitLocker加密磁盘的加密密钥。 www.cnbeta.com 8. Simply run each cell with a different operating system user ID, different encryption keys, and different administrative passwords. 直接使用不同的操作系统用户ID、不同的加密密钥和不同的管理密码运行每个计算单元即可。 www.ibm.com 9. Encryption errors indicate a problem with creating, storing, or reading the encryption keys used to protect sensitive data. 加密错误则表示在创建、存储或读取用于保护敏感数据的加密密钥时有问题。 technet.microsoft.com 10. The selected EAP package does not provide encryption keys. Select an EAP package that does provide keys or select not to encrypt. 所选的EAP程序包没有提供加密键。请选提供键的EAP程序包或选择不加密。 angel.w15.5tom.cn 1. Once identity is verified, kerberos provides the two computer with encryption keys for a secure communication session. 一旦身份得到验证,KERBEROS协议给这两台计算机提供密匙,以进行安全通讯对话。 www.24en.com 2. Reporting Services uses encryption keys to secure credentials, connection information, and accounts that are used in server operations. ReportingServices使用加密密钥来保护服务器操作中所使用的凭据、连接信息和帐户。 msdn2.microsoft.com 3. A possible cause is that this encryption keys for this server may have been modified illicitly . 一种可能的原因是,该服务器的加密密钥已被非法修改。 www.bing.com 4. Because each packet is encrypted individually, encryption keys can be changed with virtually unlimited frequency. 由于每个包是分别加密的,加密密钥实际上能以无限制的次数加以改变。 www.jukuu.com 5. Encryption keys are a crucial aspect of information security in the delivery of assured communications to military personnel. 加密密钥是信息安全的关键环节,保障军事人员的通信传递。 www.etiri.com.cn 6. On a server that hosts multiple applications, it is recommended that you define unique encryption keys for each application. 在承载多个应用程序的服务器上,建议您为每个应用程序定义唯一的加密密钥。 msdn2.microsoft.com 7. So can use exhaustively scrambling method to calculate the encryption keys used, easily the watermark and safety reduction is not high. 因此可以采用穷举法计算出置乱时使用的加密密钥,轻而易举的还原出水印信息,安全性不高。 stae.com.cn 8. Current market software encryption key : soft encryption, disk encryption keys, encryption cards and encryption software dog. 目前市场上软件的加密方法主要有:软加密、钥匙盘加密、加密卡和软件狗加密。 ks.cn.yahoo.com 9. The default encryption keys are eliminated. A cell-specific set of keys is created automatically. 不使用缺省加密密钥,会自动创建计算单元特定的密钥集。 www.ibm.com 10. These values are used to create two DES encryption keys, one from each half with a parity bit added to each to create 64 bit keys. 使用这些值创建两个DES加密密钥,并为每一组添加一个奇偶校验位,这样即可创建出64位的密钥 www.bing.com 1. The encryption keys are sent over dedicated links, and the messages ciphered with those keys are transmitted over the Internet. 密钥透过专用的连结发送,然后将加密过的讯息,透过网际网路传送出去。 edba.ncl.edu.tw 2. Please reconfigure your encryption keys and certificates for this identity in the identity configuration dialog. 请在身份配置对话框中重新配置您为此身份指定的加密密钥以及证书。 translations.launchpad.net 3. Examples of sensitive information include user names, passwords, connection strings, and encryption keys. 敏感信息的示例包括用户名、密码、连接字符串和加密密钥。 msdn.microsoft.com 4. The header can contain some metadata about the message, which could be a transaction ID or encryption keys. 头包括一些关于消息的元数据,它可以是一个事务ID或者加密密钥。 www.ibm.com 5. This example shows how to remove the encryption keys for a single report server in a report server scale-out deployment. 此示例显示如何删除报表服务器扩展部署中单个报表服务器的加密密钥。 msdn2.microsoft.com 6. With this option, only the encryption keys for the specified report server instance are removed. 使用此选项,将仅删除指定报表服务器实例的加密密钥。 msdn2.microsoft.com 7. Replication does not provide a secure mechanism to transport encryption keys. 复制并不提供安全机制来传输加密密钥。 technet.microsoft.com 8. Existing encryption keys will not be available after migration. 迁移之后,现有加密密钥将不可用。 technet.microsoft.com 9. Used to manage encryption keys on a report server. 用于管理报表服务器上的加密密钥。 msdn2.microsoft.com 10. Deleting the encryption keys removes all symmetric key information from the report server database and deletes any encrypted content. 删除加密密钥会将所有对称密钥信息从报表服务器数据库中删除,并会删除所有加密内容。 msdn2.microsoft.com 1. Deleting and re-creating encryption keys are activities that fall outside of routine encryption key maintenance. 删除和重新创建加密密钥不属于加密密钥例行维护活动。 msdn2.microsoft.com 2. Click Remove to remove the encryption keys of the selected report server instance from the report server database. 单击“删除”可以从报表服务器数据库中删除选定报表服务器实例的加密密钥。 msdn2.microsoft.com 3. Explains how to add and remove encryption keys to control which report servers are part of a scale-out deployment. 介绍如何添加和删除加密密钥以控制在扩展部署中包括哪些报表服务器。 msdn2.microsoft.com 4. For more information about the encryption keys, see Managing Encryption Keys and Initializing a Report Server. 有关加密密钥的详细信息,请参阅管理加密密钥和初始化报表服务器。 technet.microsoft.com 5. Certificate Services switched to the default provider to generate encryption keys. 证书服务切换到默认提供程序,以生成加密密钥。 angel.w15.5tom.cn 6. The encryption keys for other report servers in the scale-out are unaffected by the service account change. 扩展部署中的其他报表服务器的加密密钥不会受到服务帐户更改的影响。 msdn2.microsoft.com 7. You can control scale-out deployment membership by adding and removing encryption keys for specific report server instances. 通过为特定的报表服务器实例添加和删除加密密钥,可以控制扩展部署成员身份。 msdn2.microsoft.com 8. This catalog view returns information about encryption keys that are open in the current session. 此目录视图可返回当前对话中打开的加密密钥的有关信息。 technet.microsoft.com 9. Encryption keys are based partly on the profile information of the Report Server Windows service. 加密密钥部分基于报表服务器Windows服务的配置文件信息。 msdn2.microsoft.com 10. Delete existing encryption keys and unusable encrypted content when you cannot restore the symmetric key. 当无法还原对称密钥时,应删除现有加密密钥和不可用的加密内容。 msdn2.microsoft.com 1. Certificate Services switched to the default provider for encryption keys. 证书服务切换到加密密钥的默认提供程序。 angel.w15.5tom.cn 2. For more information on digital signatures, encryption keys, and certificates, see Security Overview and Code Signing Guide. 更多有关数字签名的信息,加密和证书你参考代码签名指南中的安全概述。 www.cocoachina.com 3. Reporting Services uses encryption keys to secure credentials and connection information that is stored in a report server database. ReportingServices使用加密密钥来保护存储的凭据和连接信息。 msdn2.microsoft.com 4. LTPA encryption keys are automatically changed at regular intervals. LTPA加密密钥会定期自动进行更改。 www.ibm.com 5. When you delete the encryption keys, the report server re-initializes itself automatically by adding a new symmetric key. 删除加密密钥时,报表服务器通过添加新的对称密钥自动对自身进行重新初始化。 msdn2.microsoft.com 6. This paper proposes an update method for batch encryption keys based on the marking algorithm applied to key tree. 提出一种基于密钥树标记算法的批量密钥更新方法。 www.dictall.com 7. On a server that hosts multiple applications, you should define unique encryption keys for each application. 在承载多个应用程序的服务器上,应为每个应用程序定义唯一的加密密钥。 msdn2.microsoft.com 8. Back up a copy of the database encryption keys. 备份数据库加密密钥的副本。 www.microsoft.com 9. Part of the problem is the encryption keys themselves. 部分问题在加密密钥自身。 www.ecocn.org 10. Enter the wrong password and the chip won't enable the encryption keys, so the data remains unreadable. 如果输入的是错误密码,那么新棉就无法解开密钥,也就无法读取数据了。 www.bing.com 1. That statement didn't say anything about who holds encryption keys or what mechanisms prevent access to the data. 该声明没有透露谁持有加密密钥或者通过什么样的机制来禁止访问客户的数据。 dongxi.net 2. You can use the same encryption key or different encryption keys against files and directories under the guard point. 您可以对保护点下的文件和目录使用相同或不同的加密密匙。 www.ibm.com 3. This server's encryption keys may have been modified illicitly. 此服务器的加密密钥可能已被非法修改。 www.microsoft.com 4. This is a hypothetical method for finding encryption keys by employing consumer appliances as distributed computing nodes. 这是一种用于查找加密密钥的假想方法,方法是使用用户设备作为分布式计算节点。 www.ibm.com 5. A remote connection is necessary for configuring the report server database connection and managing the encryption keys. 远程连接是配置报表服务器数据库连接和管理加密密钥所必需的。 msdn2.microsoft.com 6. On the Encryption Keys page, backup a copy of the symmetric key. 在“加密密钥”页上,备份一份对称密钥。 technet.microsoft.com 7. The following examples show how to extract, restore, and delete encryption keys, and how to configure a report server scale-out deployment. 这些示例将说明如何提取、还原以及删除加密密钥,并显示如何配置报表服务器扩展部署。 technet.microsoft.com 8. If you selected to use methods other than a passphrase to create encryption keys, they will be generated now. 如果您选择passphrase之外的方法创建加密密钥,它们现在就会生成。 debian.fr 9. Encryption keys are configured as Key Selection Rules. 加密密匙被配置为密匙选择规则。 www.ibm.com 10. Encryption keys are created automatically when you configure the database for the first time. 首次配置数据库时,会自动创建加密密钥。 msdn2.microsoft.com 1. This example shows how to delete all encryption keys stored in a report server. 此示例显示如何删除报表服务器中存储的所有加密密钥。 msdn2.microsoft.com 2. Also, to clarify we've never stated we don't have access to encryption keys. 此外,也是为了澄清我们从未声明我们无法获取加密密钥。 dongxi.net 3. Having valid encryption keys is necessary for storing and retrieving sensitive data. 拥有有效的加密密钥对于存储和检索敏感数据是必要的。 technet.microsoft.com 4. Explains how to back up encryption keys and restore them to recover or migrate a report server installation. 介绍如何备份加密密钥以及如何还原备份以恢复或迁移报表服务器安装。 msdn2.microsoft.com 5. Rskeymgmt is used to backup and restore the encryption keys used by the report server. Rskeymgmt用于备份和还原报表服务器使用的加密密钥。 technet.microsoft.com 6. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used. 密钥的RC4加密后生成的初始密钥交换中的RSA非对称加密使用。 www.wda.com.cn 7. An online policy holds one or more encryption keys and rules for access control. 在线策略包含一个或多个加密密匙以及访问控制规则。 www.ibm.com 8. Removing Encryption Keys for a Single Report Server in a Scale-out Deployment 删除扩展部署中单个报表服务器的加密密钥 msdn2.microsoft.com 9. To avoid sharing the role names cookie across multiple applications, specify separate encryption keys in the 若要避免在多个应用程序之间共享角色名cookie,请在 msdn2.microsoft.com 10. For more information about encryption keys used by a report server, see 有关报表服务器所使用的加密密钥的详细信息,请参阅 msdn2.microsoft.com 1. iwlist: Initiates scanning and list frequencies, bit-rates, and encryption keys iwlist:初始化扫描频率、列表频率、比特率和密钥。 www.ibm.com 2. Certificates, private keys, and encryption keys are too hard to manage 证书、私钥和加密密钥非常难于管理 www.ibm.com 3. Deleting Encryption Keys and Encrypted Content 删除加密密钥和加密的内容 msdn2.microsoft.com 4. For more information about working with encryption keys, see 有关使用加密密钥的详细信息,请参阅 msdn2.microsoft.com 5. Adding and Removing Encryption Keys for Scale-Out Deployment 添加和删除扩展部署的加密密钥 technet.microsoft.com 6. Secure Encryption Keys and Hashing 保证加密密钥和哈希算法的安全 msdn2.microsoft.com |
||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。