• Then analyzing based on the format of data transmission, encryption-decryption basic algorithm and work mode, algorithm is realized by software.

    随后在分析理解数据传输格式、具体解密算法工作模式基础通过软件进行了算法的实现

    youdao

  • Based on the importance of P transform and coherence in encryption-decryption in the S-P networks, we put forward the definition of involution-typed mixcolumn transform.

    基于S-P网络P置换重要性解密一致性本文提出了对合型列混合变换的概念,并对其代数结构、枝数和计数问题进行了深入地研究和分析。

    youdao

  • The offline policy controls backup and restore commands, and the encryption and decryption of database backup images.

    离线策略控制备份恢复命令以及数据库备份映像加密解密

    youdao

  • Handlers can manage encryption and decryption, logging and auditing, and so on.

    处理程序可以处理加密解密日志记录审计

    youdao

  • Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.

    对称算法非常有效并且可以与用于加密解密计算的单一密钥一起使用

    youdao

  • This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    安全策略使用非对称加密执行数字签名验证加密解密

    youdao

  • This section concludes by putting together all the concepts of signature, verification, encryption, and decryption in secure XML messaging applications.

    总结了安全XML消息传递应用程序签名验证加密解密等全部概念

    youdao

  • The most expensive operations in terms of performance are usually the serialization and deserialization of the data and return values, and the encryption and decryption of the request and response.

    性能而言,开销最大操作通常数据返回序列化和反序列化以及请求响应加密解密

    youdao

  • The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.

    加密可以保证有关某个主题数据机密性原因只有拥有正确服务提供者才能正确执行解密因此也能读懂数据。

    youdao

  • The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.

    加密过程解密过程一般称作密码术依赖数学算法

    youdao

  • Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.

    XML加密关于加密解密结构化信息,而规定密钥交换任何特定方法

    youdao

  • Keys are used for digitally signing documents and verifying signatures, and they help with the encryption and decryption processes.

    密钥用于数字签署文档验证签名用于加密解密过程

    youdao

  • A mismatch in either the encryption key or key version number causes the decryption process to fail.

    密密版本的不匹配导致解密过程失败

    youdao

  • Encryption and decryption with PHP.

    使用PHP进行加密解密

    youdao

  • In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.

    第三节中展示如何生成一个用于Kerveros通信中进行加密解密的密钥。

    youdao

  • tmp/CalendarCrypt.pl is a Perl program described in a later section that handles the encryption, decryption, and secure delete functions.

    tmp/CalendarCrypt.pl一个Perl程序(将后面介绍),它处理加密解密安全删除函数

    youdao

  • We'll demonstrate the working of encryption and decryption classes and their interaction with parsing logic, and present applications of XML encryption in Web services.

    我们演示加密解密工作方式以及它们使用解析逻辑交互展示Web服务xml加密应用程序

    youdao

  • Multiply them to get "n = p*q." Next, you pick a small public exponent "e" which is the "encryption exponent" and a specially crafted inverse of "e" called "d" as the "decryption exponent."

    接下来一个较小e作为指数用作“加密指数”,而对e的进行特殊的逆反函数计算所得到d”作为“解密指数”。

    youdao

  • You can also use AES_ENCRYPT and AES_DECRYPT functions for encryption and decryption of column data.

    可以使用AES_ENCRYPTAES_DECRYPT函数数据进行加密解密

    youdao

  • If you can't read the data when you have accessed it, the decryption keys are corrupted, or the server rejects it because the vendor is using its own encryption algorithm.

    如果试图访问数据无法读取数据,原因之一解密密钥无效,原因之二服务器拒绝因为提供商使用的是自己加密算法。

    youdao

  • The same key is used for both encryption and decryption.

    加密解密使用相同密钥

    youdao

  • All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.

    XML加密标记存在解密需要所有信息:加密算法名称加密数据类型以及加密密钥的名称。

    youdao

  • Though symmetric keys have their disadvantages (primary among them being how to pass them among the trusted parties), the major advantage they offer is speed of encryption and decryption.

    尽管对称密钥自身缺陷主要如何互信双方之间传递),它们最大的优点加密解密速度快

    youdao

  • The pass phrase is used only for client-side encryption and decryption of your browser data.

    短语用于客户端的浏览器数据解密

    youdao

  • In terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram.

    根据加密密钥解密密钥在性质上差异可以密码体制分为对称密码和公钥密码两大类。

    youdao

  • Can be achieved document encryption and decryption.

    可以实现文件加密解密

    youdao

  • Transparent database encryption refers to the encryption and decryption of data in the database, the database access program is completely unaware.

    数据库透明加密对库内数据加密解密,对数据库访问程序完全无感知的。

    youdao

  • This version of SQL Server has built-in encryption/decryption so you do not need to modify your application code.

    这个SQLServer版本建有加密/解密这样不用修改应用代码

    youdao

  • This version of SQL Server has built-in encryption/decryption so you do not need to modify your application code.

    这个SQLServer版本建有加密/解密这样不用修改应用代码

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定