• Represents an access rule for a cryptographic key.

    表示加密密钥访问规则

    youdao

  • Unable to store the public cryptographic key of this computer.

    无法存储台计算机公用加密密钥

    youdao

  • The public cryptographic key of this computer cannot be stored.

    无法存储计算机公用密钥

    youdao

  • Describes how to create a cryptographic key pair for signing an assembly.

    描述如何创建用于对程序集签名的密钥

    youdao

  • A credential can be anything from simple password to a complex cryptographic key.

    凭证可以是从简单密码复杂加密密钥任何东西

    youdao

  • You must have a cryptographic key pair to sign the assembly with a strong name.

    必须拥有密码编译金使用强式名称签署组件

    youdao

  • Certificate Services is generating the cryptographic key and setting key protection.

    证书服务正在生成加密密钥设置密钥保护

    youdao

  • While in decryption, scrambled data is turned back into the original text by using a cryptographic key.

    解密时通过使用加密密钥将经过编码数据转换原始文本

    youdao

  • A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.

    身份验证服务器使用目标服务器的一个密码密钥将票据提供客户端。

    youdao

  • A digital certificate is a file that binds a public cryptographic key with an identity (a user or an organization).

    数字证书文件它绑定识别码的公用密钥(一个用户或者一个组织)。

    youdao

  • Unable to store the public cryptographic key of this computer. This computer cannot send or receive encrypted messages.

    无法存储计算机公用加密密钥。这台计算机无法发送接收经过加密消息

    youdao

  • The public cryptographic key of this computer cannot be stored. This computer cannot send or receive encrypted messages.

    无法存储计算机公用密钥。此计算机无法发送接收加密消息

    youdao

  • The public cryptographic key of this computer cannot be stored. This computer cannot send or receive encrypted messages.

    必须与所有收件人交换公共密钥才能发送接收密钥加密的传真信息

    youdao

  • We propose a new cryptographic key dynamic access scheme with time-constraint and can solve the problems we mentioned above.

    方案能够足够灵活的处理层级系统中动态存取控制问题。

    youdao

  • In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.

    第三节中展示如何生成一个用于Kerveros通信中进行加密解密的密钥。

    youdao

  • The cryptographic key and cryptographic value of this system possesses stronger anti-translated capability and is easy expanded.

    结果表明系统密钥具备的抗破译能力易于推广应用

    youdao

  • Gets or sets the cryptographic key that is used to verify the digital signature that is identified by this SAML subject statement.

    取得设定钥识别码,这个金钥使用者存取SAML安全性权杖主体所持有的密码编译金

    youdao

  • Finally, there is strong authentication in which an identity is verified using two or more methods, such as a password and a cryptographic key.

    最后身份验证其中使用两种或者更多方法对一个标识进行验证,密码加密密钥。

    youdao

  • Copy the cryptographic key and the database from the old computer to the new one. (Make sure the new computer has the same name as the old one.)

    密钥数据库计算机复制计算机。(确认新计算机与老计算机同名。)

    youdao

  • The physical name includes the name of the assembly that the code lives in, the version number, the locale, and the cryptographic key associated with the name.

    物理名称包括代码所在程序名称、版本区域信息以及此名称密钥

    youdao

  • For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.

    为了确保安全可以结合使用rsync加密技术,确保在没有正确密码加密密钥的情况下无法读取远程文件

    youdao

  • The data Encryption Standard is a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time.

    数据加密标准密码意义一个密钥算法应用于一个数据块同时不是一个比特。

    youdao

  • Encrypted cryptographic key, which need to be saved in the extern media, was encrypted with Password-Based Encryption technology and was saved in the computer file system.

    对于系统需要外在的物理媒介保存加密密钥使用基于口令的加密技术对密钥加密,将密钥保存计算机文件系统中。

    youdao

  • For example, one schema could define a key element as base64 data for storing a cryptographic key while another schema would define key as an integer for storing a database identifier.

    例如模式可能定义key元素用于密钥base64数据个模式key定义为一个用于储存数据库标识符整数

    youdao

  • In this paper, the author, under the full grasp of status of quantum cryptographic key research, does research concentrating on the BB84 quantum cryptographic key distribution protocol.

    本文充分掌握量子密钥研究现状的基础上,重点针对BB 84量子密钥分配协议展开了研究。

    youdao

  • With the application of symmetric cipher and asymmetric cipher, a cryptographic key management scheme for hierarchy is presented and a workgroup cryptographic key management scheme is presented.

    结合单钥加密双钥加密理论,分别给出了纵向的等级安全管理密钥管理方法横向的协同工作安全管理的工作组密钥管理方法。

    youdao

  • Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.

    深度防御可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵机器问题

    youdao

  • Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.

    密钥—密钥一些密码数据通常使用特定加密算法用户密码中获得

    youdao

  • This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.

    特性三种关键安全技术能够利用 ACF提供硬件密码计算加速设施

    youdao

  • Every time cryptographic authentication is to be used, a password must be given in order to decode the key.

    每次使用密码认证时,必须给出一个密码解码密钥

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定