Represents an access rule for a cryptographic key.
表示加密密钥的访问规则。
Unable to store the public cryptographic key of this computer.
无法存储这台计算机的公用加密密钥。
The public cryptographic key of this computer cannot be stored.
无法存储此计算机的公用密钥。
Describes how to create a cryptographic key pair for signing an assembly.
描述如何创建用于对程序集签名的密钥对。
A credential can be anything from simple password to a complex cryptographic key.
凭证可以是从简单的密码到复杂的加密密钥的任何东西。
You must have a cryptographic key pair to sign the assembly with a strong name.
您必须拥有密码编译金钥组以使用强式名称来签署组件。
Certificate Services is generating the cryptographic key and setting key protection.
证书服务正在生成加密密钥并设置密钥保护。
While in decryption, scrambled data is turned back into the original text by using a cryptographic key.
解密时,通过使用加密密钥将经过编码的数据转换为原始文本。
A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.
身份验证服务器使用目标服务器的一个密码密钥将票据提供给客户端。
A digital certificate is a file that binds a public cryptographic key with an identity (a user or an organization).
数字证书是一个文件,它绑定了一个带识别码的公用密钥(一个用户或者一个组织)。
Unable to store the public cryptographic key of this computer. This computer cannot send or receive encrypted messages.
无法存储这台计算机的公用加密密钥。这台计算机无法发送或接收经过加密的消息。
The public cryptographic key of this computer cannot be stored. This computer cannot send or receive encrypted messages.
无法存储此计算机的公用密钥。此计算机无法发送或接收加密消息。
The public cryptographic key of this computer cannot be stored. This computer cannot send or receive encrypted messages.
必须与所有收件人交换公共密钥,才能发送和接收密钥加密的传真信息。
We propose a new cryptographic key dynamic access scheme with time-constraint and can solve the problems we mentioned above.
方案能够足够灵活的处理一个层级系统中动态存取控制问题。
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.
在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
The cryptographic key and cryptographic value of this system possesses stronger anti-translated capability and is easy expanded.
结果表明该系统的密钥与密值具备较强的抗破译能力,易于推广应用。
Gets or sets the cryptographic key that is used to verify the digital signature that is identified by this SAML subject statement.
取得或设定金钥识别码,这个金钥可让使用者存取SAML安全性权杖主体所持有的密码编译金钥。
Finally, there is strong authentication in which an identity is verified using two or more methods, such as a password and a cryptographic key.
最后是强身份验证,其中使用两种或者更多的方法对一个标识进行验证,如密码和加密密钥。
Copy the cryptographic key and the database from the old computer to the new one. (Make sure the new computer has the same name as the old one.)
把密钥和数据库从老计算机复制到新计算机。(确认新计算机与老计算机同名。)
The physical name includes the name of the assembly that the code lives in, the version number, the locale, and the cryptographic key associated with the name.
物理名称包括代码所在程序集的名称、版本号、区域信息以及此名称的密钥。
For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.
为了确保安全,可以结合使用rsync与加密技术,确保在没有正确的密码或加密密钥的情况下无法读取远程文件。
The data Encryption Standard is a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time.
数据加密标准是一个块密码,意义一个密钥和算法应用于一个数据块同时而不是一个比特。
Encrypted cryptographic key, which need to be saved in the extern media, was encrypted with Password-Based Encryption technology and was saved in the computer file system.
对于系统中需要外在的物理媒介来保存的加密密钥,使用基于口令的加密技术对密钥加密,将密钥保存在计算机文件系统中。
For example, one schema could define a key element as base64 data for storing a cryptographic key while another schema would define key as an integer for storing a database identifier.
例如,一个模式可能定义一个key元素为用于密钥的base64数据,而另一个模式将key定义为一个用于储存数据库标识符的整数。
In this paper, the author, under the full grasp of status of quantum cryptographic key research, does research concentrating on the BB84 quantum cryptographic key distribution protocol.
本文在充分掌握了量子密钥研究现状的基础上,重点针对BB 84量子密钥分配协议展开了研究。
With the application of symmetric cipher and asymmetric cipher, a cryptographic key management scheme for hierarchy is presented and a workgroup cryptographic key management scheme is presented.
结合单钥加密和双钥加密的理论,分别给出了纵向的等级安全管理密钥管理方法和横向的协同工作安全管理的工作组密钥管理方法。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.
密钥—密钥就一些密码数据,通常使用特定加密算法从用户的密码中获得。
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
此特性让这三种关键的安全技术能够利用 ACF提供的硬件密码计算加速设施。
Every time cryptographic authentication is to be used, a password must be given in order to decode the key.
每次要使用密码认证时,必须给出一个密码以解码密钥。
应用推荐