国产高清精品免费区-男女一进一出抽搐免费视频-中日韩一二三级黄色永久视频-日韩精品人妻一区二区免费视频-日本久久视频在线观看-99热这里只有精品88热-亚洲韩国黄色最新短视频一区-日韩伦理在线观看免费全集-国产av一区二区三区天堂

cryptographic

cryptographic

美 [?kr?pt?'græf?k]  英 ['kr?pt??'græf?k]

  • adj.關(guān)于暗號(hào)的
  • n.隱晶文象狀
  • 網(wǎng)絡(luò)密碼;密碼的;用密碼寫(xiě)的

英漢解釋

adj.
1.
關(guān)于暗號(hào)的
n.
1.
隱晶文象狀

英英解釋

adj.

例句

When in "record" mode, these dwell times are expanded into a string and used to generate a cryptographic hash of the signature.

當(dāng)處于record模式時(shí)這些停頓時(shí)間擴(kuò)展字符串用于生成簽名密碼散列

The developed signature will then be transformed into a cryptographic hash and stored on disk to be compared later during the monitor phase.

然后開(kāi)發(fā)簽名轉(zhuǎn)換密碼散列存儲(chǔ)磁盤(pán)稍后監(jiān)視階段進(jìn)行比較

After setting up the cryptographic library, the next step is to exchange certificates between the systems.

設(shè)置CryptographicLibrary之后下一步系統(tǒng)之間交換證書(shū)

An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site.

Java密碼擴(kuò)展系統(tǒng)一個(gè)實(shí)現(xiàn)Sun網(wǎng)站可以找到密碼服務(wù)提供者目錄

They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one.

他們可以尋找密碼算法缺陷然后惡意修改它們強(qiáng)加密算法

Again , let us remind you that using proprietary cryptographic algorithms , including hash functions, is usually a bad idea .

再次提醒使用專(zhuān)用密碼算法包括雜湊函數(shù)通常一個(gè)主意

The specified cryptographic service provider cannot be used for the selected Certificate Template.

不能證書(shū)模板使用指定加密服務(wù)提供程序

A popular idea is to have email servers provide cryptographic keys so that messages can be verified as they arrive in an inbox.

其中呼聲一個(gè)方案就是要求郵件服務(wù)器提供密匙以便當(dāng)郵件抵達(dá)時(shí)判斷有效性

You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application.

可以使用方法確定選定加密算法強(qiáng)度是否滿(mǎn)足應(yīng)用程序要求

BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography.

BLS簽名線性密碼學(xué)應(yīng)用最為廣泛密碼元件之一

Unable to store the public cryptographic key of this computer. This computer cannot send or receive encrypted messages.

無(wú)法存儲(chǔ)臺(tái)計(jì)算機(jī)公用密密臺(tái)計(jì)算機(jī)無(wú)法發(fā)送接收經(jīng)過(guò)加密消息

Gets or sets the name of the cryptographic provider used to generate the digital signature of the message.

獲取設(shè)置用于生成消息數(shù)字簽名加密提供程序名稱(chēng)

The public cryptographic key of this computer cannot be stored. This computer cannot send or receive encrypted messages.

無(wú)法存儲(chǔ)計(jì)算機(jī)公用密鑰計(jì)算機(jī)無(wú)法發(fā)送接收加密消息

When overridden in a derived class, creates an instance of the specified implementation of a cryptographic random number generator.

派生類(lèi)中重寫(xiě)時(shí)創(chuàng)建加密隨機(jī)數(shù)生成器指定實(shí)現(xiàn)實(shí)例

The root of trust within a cryptographic system starts with a key, which needs to be accessed and stored securely .

加密系統(tǒng)信任需要安全訪問(wèn)存儲(chǔ)密鑰開(kāi)始

Class defines the algorithm used for a cryptographic operation.

類(lèi)定義用于加密操作算法

A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.

身份驗(yàn)證服務(wù)器使用目標(biāo)服務(wù)器一個(gè)密碼密鑰票據(jù)提供客戶(hù)端

On top of it are the middle layer of access, audit, and cryptographic controls and then the outermost layer of technologies.

上部包含訪問(wèn)審核加密控制中間層然后技術(shù)所在外層

Specify the location of a key container from the system's cryptographic service provider (CSP) to use to name the assemblies.

指定用于命名組件系統(tǒng)密碼編譯服務(wù)提供者CSP容器位置

Principals share their cryptographic key with the authentication server of the realm to which they belong.

主體它們所屬領(lǐng)域身份驗(yàn)證服務(wù)器共享

Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash.

嘗試普通使用場(chǎng)景鍵入數(shù)千個(gè)單詞然后再輸出密碼散列

Specifies the name of the cryptographic provider on the system.

指定系統(tǒng)加密提供程序名稱(chēng)

You do not have to generate a new cryptographic key pair for every assembly you want to give a strong name.

不必希望賦予強(qiáng)名稱(chēng)每個(gè)程序集生成加密密鑰對(duì)

This firmware is available on a limited basis from IBM, and essentially turns the 4758 Coprocessor into a cryptographic processor.

這個(gè)固件來(lái)自IBM受限基礎(chǔ)可用本質(zhì)上4758Coprocessor變成密碼處理器

The previous step generates cryptographic keys and a password used in LTPA token generation.

之前步驟生成用于生成LTPA令牌密鑰密碼

It prevents saving configuration in IBM Cognos Configuration by guarding the establishing of cryptographic information with a password.

密碼保護(hù)密碼學(xué)信息建立從而阻止IBMCognosConfiguration保存配置

Provided the session key has not been compromised , the value of the cryptographic function will be the same at each of the correspondents .

生成會(huì)話密鑰信息一起對(duì)應(yīng)方之間進(jìn)行傳輸

The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).

Windows密碼APIcryptoAPI密碼服務(wù)提供程序CSP名稱(chēng)

These entities are usually stored in a file or disk or in a key container owned by a Crypto API Cryptographic Service Provider (CSP).

這些實(shí)體通常存儲(chǔ)文件磁盤(pán)或者存儲(chǔ)加密API加密服務(wù)提供程序CSP擁有容器

Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.

黑客可以利用密碼分析技術(shù)惡意實(shí)例資源破解密碼算法

Outlook uses certificates in cryptographic e-mail messaging to help provide more secure communications.

Outlook電子郵件加密使用證書(shū)來(lái)幫助提供更加安全通信

Creates an instance of an implementation of a cryptographic random number generator.

建立密碼編譯數(shù)產(chǎn)生實(shí)執(zhí)行個(gè)體

The value of the cryptographic function cannot be compromised or modified without access to the session key .

只要會(huì)話密鑰沒(méi)有受到損害對(duì)應(yīng)雙方加密函數(shù)就是相同

Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support.

其他特性包括加密散列函數(shù)加密轉(zhuǎn)換庫(kù)加密硬件支持

You must have at least one cryptographic service provider installed to perform this operation.

執(zhí)行這個(gè)操作至少安裝一個(gè)加密服務(wù)提供程序

Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.

SecureSocketsLayerSSL協(xié)議一種加密協(xié)議網(wǎng)絡(luò)數(shù)據(jù)通信提供隱私安全保障

The certificates used in SSL contain identity information and are encapsulated in a cryptographic envelope to prevent tampering.

SSL使用證書(shū)包含標(biāo)識(shí)信息壓縮一個(gè)加密信封以防篡改

"Key Management" is the term used to encompass the various actions related to the generation and protection of cryptographic keys.

管理一個(gè)術(shù)語(yǔ)包括生成保護(hù)相關(guān)各種操作

This implementation is not part of the Windows Platform FIPS-validated cryptographic algorithms.

實(shí)現(xiàn)不是Windows平臺(tái)FIPS驗(yàn)證加密算法一部分

Moreover, the cryptographic mode will offer India a first national secure identification capability for protecting its own assets.

此外加密模塊印度提供第一個(gè)國(guó)家安全識(shí)別能力保護(hù)自己資產(chǎn)

熱門(mén)查詢(xún)