• Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.

    步骤4:利用数据加密密钥个密钥加密密钥、与这两个密钥相关联算法以及将来包含输出信息中的密钥信息,根据它们创建一个Encryptor对象

    youdao

  • It can be used to authenticate the messages, to provide integrity, as well as encryption key to ensure confidentiality of the data.

    用于验证消息提供完整性检查以及提供加密密钥保证数据机密性

    youdao

  • The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.

    加密可以保证有关某个主题数据机密性原因只有拥有正确服务提供者才能正确执行解密因此也能读懂数据。

    youdao

  • Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.

    密钥—密钥一些密码数据通常使用特定加密算法用户密码中获得

    youdao

  • Use the key that was previously generated to encrypt the sensitive data within the SOAP message (symmetric encryption).

    使用以前生成密钥加密SOAP消息中的敏感数据对称加密)。

    youdao

  • The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.

    用于数字加密密钥可能最初请求传送同一密钥,可能是另一个随机生成的密钥,后者更具代表性。

    youdao

  • There's another solution, one that works with whole-disk encryption products like PGP disk (I'm on PGP's advisory board), TrueCrypt, and BitLocker: encrypt the data to a key you don't know.

    另外一种方法即用全磁盘加密产品PG P磁盘(PGP顾问委员会),加密软件,驱动器加密。用知道的密钥加密数据

    youdao

  • The encryption key is used to encrypt the data transfer between the NAS and the RADIUS server.

    加密密钥用于加密nasRADIUS服务器之间数据传输

    youdao

  • All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.

    XML加密标记存在解密需要所有信息:加密算法名称加密数据类型以及加密密钥的名称。

    youdao

  • When the loop exits, I simply return the encryption result of the last data block, which is the result of Step 9 of the secret key generation process.

    循环退出时只是返回最后一个数据加密结果就是密钥生成过程第9的结果。

    youdao

  • To encrypt file data, an encryption key password must be selected, which Tivoli Storage Manager uses to generate the encryption key for encrypting and decrypting the file data.

    加密文件数据必须选择一个加密密钥口令TivoliStorageManager使用它生成加密密钥,加密解密文件数据。

    youdao

  • DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.

    美国国家数据加密标准(the United States Data Encryption Standard),一个密码算法8字节密钥56位。

    youdao

  • This encrypted data element references the <xenc:EncryptedKey> value from the security header as the key for the symmetric encryption used on the Body content.

    这个加密数据安全头部引用 <xenc:EncryptedKey>作为Body内容用于对称加密的密匙。

    youdao

  • When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.

    一旦计算机断开对等网络,网络形成节点随即不复存在储存在节点上的密钥数据随之消失

    youdao

  • Encryption using a public-private key is slow and is directly proportional to the size of the data being encrypted.

    使用公司密钥加密很慢而且直接与加密数据大小成正比

    youdao

  • Cryptography is sent by the general approach to data encryption to protect digital content before, the key given only to those legitimate users.

    密码学一般方式发送受维护数字内容之前数据加密密钥给予那些合法用户

    youdao

  • Encryption is a fancy computer-person word for scrambling your data until no one can understand what it says without a key.

    加密一个高大上的计算机术语,意思是数据加以处理,直到没有密钥没有理解为止。

    youdao

  • The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.

    网络系统主要安全技术数据加密RSA算法密钥系统安全的一种体制

    youdao

  • The private key forever in chip, and public key authentication and encryption to send to the chip sensitive data.

    这个私有密钥永远芯片里,公共密钥用来认证加密发送芯片的敏感数据

    youdao

  • If for some reason you cannot restore the encryption key, the report server will never be able to decrypt and use any data that is encrypted with that key.

    如果由于某些原因无法还原加密密钥报表服务器永远无法解密使用密钥加密所有数据

    youdao

  • The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.

    用于数据加密密钥使用带有与服务提供者(Service Provider)的 X.509 证书相关联公钥对称算法进行加密的。

    youdao

  • Note that changing an encryption key may require a significant maintenance window; all existing encrypted data will require decryption with the old key and encryption with the new key.

    注意更改加密密钥时可能需要一个有效维护窗口所有已经被加密数据需要的密钥进行解密,然后用新的密钥加密。

    youdao

  • As a result, Public Key Institution (PKI) is proved to be the reliable system for encryption of data, which also draws attention of the commercial society.

    其结果,“公钥基础结构”或PK I被证实不是加密数据可靠系统而且商业社会也已经注意到了一点。

    youdao

  • The data encryption transmission is realized between Client and Server. Furthermore key management is realized including generating, storing, deleting, modifying and searching of key.

    实现客户机服务器数据加密传输同时实现了密钥管理包括密钥的生成存储删除修改查询

    youdao

  • First, it introduces the basic principle of the encryption of data, including key and two kinds of cipher system. Then, the chat system developed by us is given as an example.

    首先介绍数据加密基本原理包括密钥密码体制然后给出自行开发交谈系统作为示例。

    youdao

  • Key management, key disperse arithmetic authentication mechanism, data encryption contribute to the security of downloading OTA service.

    密钥管理、密钥分散算法认证机制数据加密四个方面有助于提高OTA业务下载安全性

    youdao

  • Firstly, some key technologies correlated with security are discussed in detail, such as data interception, data encryption, key management, etc.

    首先详细讨论了安全技术相关的一系列关键技术,包括数据拦截技术、数据加密技术、密钥管理技术

    youdao

  • Secondly we introduce these key technology when develop mobile enterprise application such as J2ME, J2EE, XML and data encryption in details.

    然后详细介绍了实现移动企业级应用关键技术J2MEJ2EEXML以及数据加密技术

    youdao

  • Secondly we introduce these key technology when develop mobile enterprise application such as J2ME, J2EE, XML and data encryption in details.

    然后详细介绍了实现移动企业级应用关键技术J2MEJ2EEXML以及数据加密技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定