• When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.

    一旦计算机断开对等网络,网络形成节点随即不复存在储存在节点上的密钥数据随之消失

    youdao

  • Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.

    通过网络由传输提供的安全性消息已批准的声明以及收件人已知密钥请求进行加密请求可以收件人进行身份验证

    youdao

  • The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.

    网络系统主要安全技术数据加密RSA算法密钥系统安全的一种体制

    youdao

  • ADFS USES a set of secure protocols like SSL and Public Key encryption to provide Single Sign on to applications that are not hosted inside your network.

    ADFS使用SSL公开密钥加密安全协议提供了登录访问没有放在内部网络上的应用程序这个便利。

    youdao

  • When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.

    一旦计算机断开对等网络,网络形成节点随即不复存在储存在节点上的密钥数据随之消失

    youdao

  • File service is provided that encrypts data of file transparently for users. Each user has a different key for encryption, users access the storage system by network driver mapping.

    系统用户提供了透明文件解密服务用户通过映射网络驱动器的方式访问自己存储空间

    youdao

  • The processes for key creating and managing in radar network are given based on common key encryption method.

    用户控制权管理方面,本文根据项目实践经验,给出一种高效的用户控制权管理结构及方式。

    youdao

  • The processes for key creating and managing in radar network are given based on common key encryption method.

    用户控制权管理方面,本文根据项目实践经验,给出一种高效的用户控制权管理结构及方式。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定