crypto

crypto

美 ['kr?pto?]  英 ['kr?pt??]

  • n.秘密支持者
  • 網絡加密;加密解密;密碼

英漢解釋

n.
1.
(政黨,社團等的)秘密成員,秘密支持者

例句

There does not seem to be sufficient memory available to install additional crypto components.

看來沒有足夠內存用于安裝額外密碼處理組件

That it used to be illegal under US law to export crypto to any country, which has been relaxed though, but does not include Cuba.

以往根據美國法律輸出編碼方式其它國家違法雖然禁令放寬不少古巴并不放寬對象

Crypto lies at the center of this transition, and we're going to ask a lot of it over the next few years.

密碼這種轉變處于中心地位今后幾年我們需求量很大

For starters, every possible Cipher configuration is always represented by an instance of javax. crypto. Cipher.

對于學者每個可能加密配置總是一個javax.crypto.Cipher實例表示

Before I could get far in my efforts, I needed to figure out what the line import Crypto in the twisted. conch package was trying to find.

深入工作之前需要弄清twisted.conchimportCrypto一行究竟什么用處

The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).

Windows密碼APIcryptoAPI密碼服務提供程序CSP名稱

These entities are usually stored in a file or disk or in a key container owned by a Crypto API Cryptographic Service Provider (CSP).

這些實體通常存儲文件磁盤或者存儲加密API加密服務提供程序CSP擁有容器

The other end of the security negotiation is requires strong crypto but it is not supported on the local machine.

安全協商一端要求較強加密本地計算機支持

Each message is transported in its own crypto envelope, which includes both the payload and the identity of the sender.

消息自己加密信封傳輸加密信封包含發送者負載身份

The WebSphere DataPower SOA Appliance allows the crypto objects to be created individually and then selected in the configuration needed.

WebSphereDataPowerSOAAppliance允許逐個創建crypto對象然后配置進行選擇

The receiver, known as Bob in crypto-speak, makes a similarly random decision about which mode to measure the incoming bits.

至于接收者稱為鮑伯隨機決定模式一來量測射入位元

To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.

進一步提高密碼芯片安全性密碼芯片必須防止簡單能量分析差分能量分析攻擊

Meanwhile, you can ask for a special order, like various materials and sizes, Additional "hidden" words on crypto tumblers , etc.

同時可以定做比如各式材質大小內部加上隱藏文字

Crypto causes a diarrheal illness and may rinse off the bodies of infected people or diapered children into the pool.

感染者使用尿布兒童孢子

DRBD uses the Linux crypto application programming interface and is therefore flexible on the integrity algorithm used.

DRBD使用Linux加密應用程序編程接口因此完整性算法使用方面比較靈活

If yes, you need file encryption tool to protect your contents, Touch Crypto is the smart encryption tool just for you.

如果的話需要文件加密工具保護內容觸摸加密智能加密工具

Mad. Exe (the system attendant process) does not have access to (permission for) the Crypto container.

Mad.exe(系統助理進程具有訪問Crypto容器權限

Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.

驗證選擇剛剛上載公鑰配置加密認證文件名稱

In this paper, through DBMS CRYPTO, the authors introduce a general database encryption package CIPHER, based on an application example.

基于具體應用實例介紹利用DBMS_CRYPTO設計一個數據庫加密程序CIPHER

When you do so using Office Access 2007 and a file that uses the new file format, Access uses the Windows Crypto API to encrypt the data.

使用OfficeAccess2007采用新型文件格式文件進行操作Access使用WindowsCryptoAPI數據進行加密

Giardia: Like crypto, giardia is a microscopic parasite passed through feces, which can cause diarrhea.

鞭毛蟲孢子一樣鞭毛蟲一種極小寄生蟲通過糞便傳播導致腹瀉

replacing all the closed code with open source one: libc_i18n, NFS lock manager, portions of crypto framework, many critical drivers.

使用開源代碼替換所有開源代碼包括libc_i18n、NFS管理器加密框架部分以及大量關鍵驅動程序

Both crypto and isosporiasis cause diarrhoea, nausea, vomiting and stomach cramps.

孢子crypto球蟲病都會引起腹瀉惡心嘔吐痙攣

crypto: One who covertly suppORts a certain doctrine, group, OR party.

秘密成員秘密支持信條團體黨派

The crypto system or checksum function is invalid because a required function is unavailable .

由于要求程序不可加密系統校驗和函數無效

The crypto checkpoint files for the resource identified by the GUID.

GUID標識資源加密檢查點文件

Sectra's voice crypto for tactical radio protects radio communications between vehicles and troops in the field from eavesdropping.

Sectra戰術無線電語音加密技術可以保護野外車輛部隊之間無線電通訊被竊聽

Touch Crypto is a smart and handy encryption tools designed specially for touch screen mobile.

觸摸加密一個聰明方便加密移動工具專門設計觸摸

The issues in the crypto-battle, the first great war of the digital age, were more straightforward.

數字時代第一次大戰——密碼——問題更為直接

Crypto objects are created and configured into the processing rules.

創建Crypto對象配置處理規則

Our flagship product, Security Builder Crypto, initially released in 1997, was the first commercial product based on ECC.

我們旗艦產品SecurityBuilderCrypto1997年首次發布基于ECC第一個商業產品

In this example, the crypto objects are created as needed while configuring the web service proxy.

在此示例根據需要創建crypto對象配置Web服務代理

Crypto map cisco client configuration address respond !

響應客戶端地址請求

The crypto solution will be used to protect calls from eavesdropping in Rakel, the Swedish Public Safety Network.

加密解決方案用于保護瑞典公共安全網絡——Rakel免遭竊聽

Cryptosporidiosis (crypto) and isosporiasis are both caused by protozoan parasites.

孢子crypto球蟲病都是動物寄生蟲引起

Specifies all elements that are in the crypto settings schema .

指定密碼設置架構所有元素

Will feats of crypto really send "digital cash" to replace the paper money, and enable us to spend it in stores?

密碼發送數字現金代替紙幣使我們商店使用嗎?

Native Windows applications often use the Crypto API interface.

Windows本地應用程序很多情況使用Crypto應用程序接口

Using the best available crypto on the weakest platform on the planet won't buy you much security!

世界脆弱平臺使用最好加密不會帶來多少安全性

The Crypto container that contains the private key is corrupted.

包含私鑰Crypto容器損壞