国产高清精品免费区-男女一进一出抽搐免费视频-中日韩一二三级黄色永久视频-日韩精品人妻一区二区免费视频-日本久久视频在线观看-99热这里只有精品88热-亚洲韩国黄色最新短视频一区-日韩伦理在线观看免费全集-国产av一区二区三区天堂

decryption

decryption

美 [di'kr?p?n]  英 [di:'kr?p?n]

  • n.解釋編碼的數(shù)據(jù)
  • 網(wǎng)絡(luò)解密;譯碼;解密模塊

英漢解釋

n.
1.
解釋編碼的數(shù)據(jù)

例句

Note that decryption uses the corresponding private key of the public key used for encrypting the XML.

請(qǐng)注意解密過程使用加密XML時(shí)使用公鑰對(duì)應(yīng)私鑰。

The CSP generates the public and private key pair used for the encryption and decryption of messages.

CSP生成用于信息加密解密公鑰私鑰對(duì)。

On decryption, each event is written to disk, unencrypted, and the plain text read back in to be displayed to the user.

解密階段,每個(gè)事件磁盤,然后進(jìn)行解密,最后文本顯示用戶。

The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.

系統(tǒng)有效防止網(wǎng)絡(luò)內(nèi)部重要數(shù)據(jù)通過網(wǎng)絡(luò)泄露出去無需用戶進(jìn)行手動(dòng)加密解密操作。

The recipient's unique information is then used in a decryption operation performed against the encrypted message .

然后,使用收件人唯一信息對(duì)加密郵件執(zhí)行解密操作

This book reveals the Windows platform for a comprehensive encryption and decryption technology!

全面揭示Windows平臺(tái)加密解密技術(shù)!

Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption.

公鑰加密使對(duì)非對(duì)稱加密解密技術(shù)。

The public-key system uses a pair of mathematically related sequences, one each for encryption and decryption [1].

公鑰系統(tǒng)采用一對(duì)數(shù)學(xué)上相關(guān)序列一個(gè)用于加密,另一個(gè)用于解密。

If the private key is encrypted with a password in the database, the decryption password must be specified.

如果數(shù)據(jù)庫(kù)使用密碼對(duì)私鑰進(jìn)行加密,必須指定解密密碼。

The result of simulation shows that the algorithm can give satisfactory result of encryption and decryption.

仿真結(jié)果表明,算法具有加密解密結(jié)果。

The DECRYPTION BY PASSWORD clause can be omitted if the password in the file is protected with a null password.

如果文件密碼密碼保護(hù),省略DECRYPTIONBYPASSWORD子句。

It was mainly introduced the design solution by the digital watermark technology solving keys security of dynamic encryption and decryption.

介紹一種結(jié)合數(shù)字水印技術(shù)解決動(dòng)態(tài)密密安全性設(shè)計(jì)方案

Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.

對(duì)稱算法非常有效,并且可以用于加密解密計(jì)算單一密鑰一起使用。

In public-key or two-key encryption, a key pair is used for encryption and decryption.

公鑰加密使用一對(duì)對(duì)稱加密解密技術(shù)

It is capable of message digests, encryption and decryption of files, digital certificates, digital signatures, and random numbers.

可以實(shí)現(xiàn)消息摘要、文件加密解密、數(shù)字證書、數(shù)字簽名隨機(jī)數(shù)字。

Instead, the other key in the pair must be used for the decryption.

相反對(duì)另外一個(gè)必須用于解密。

A protector is a program that controls the encryption and decryption of rights-managed files of a specific file format.

保護(hù)程序一種可以控制對(duì)特定文件格式權(quán)限管理文件進(jìn)行加密解密程序。

Sets the key being used for Passport encryption and decryption.

設(shè)置用于Passport加密解密密鑰。

This process of changing information into a code is encryption and the process of changing code back is decryption .

信息更改代碼過程稱為加密代碼重新更改信息過程稱為解密。

In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.

第三節(jié)展示如何生成一個(gè)用于Kerveros通信進(jìn)行加密解密密鑰。

The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms.

加密過程解密過程一般稱作密碼術(shù),依賴數(shù)學(xué)算法。

Keys are used for digitally signing documents and verifying signatures , and they help with the encryption and decryption processes .

用于數(shù)字簽署文檔驗(yàn)證簽名用于加密解密過程。

The string manipulation functions in Listing 13 replace the lost formatting before the decryption command is called.

調(diào)用解密命令之前,清單13字符串操作函數(shù)替換丟失格式。

This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

安全策略使用非對(duì)稱加密執(zhí)行數(shù)字簽名驗(yàn)證、加密解密。

Its encryption and decryption operations are in the system drive layer and the whole process is completely transparent.

解密操作系統(tǒng)驅(qū)動(dòng)實(shí)現(xiàn),整個(gè)過程對(duì)用戶完全透明特點(diǎn)

Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key .

此類對(duì)稱轉(zhuǎn)換較比使用對(duì)稱密鑰進(jìn)行加密解密方法,開銷

Encryption and decryption of a cookie are performed by the same Client Access server.

Cookie加密解密同一臺(tái)客戶端訪問服務(wù)器執(zhí)行。

Security -- authorization of the request, encryption and decryption as required, validation, etc.

安全性——請(qǐng)求授權(quán)、加密解密需要時(shí))、確認(rèn)等等

The performance of RSA decryption has direct relationship with the efficiency of modular exponentiation implementation.

RSA算法解密性能數(shù)運(yùn)算實(shí)現(xiàn)效率有著直接關(guān)系。

Decryption: The decryption ability reveals all enemy movements within a sector. Orders are represented by red arrows.

解密解密才干揭露指定分區(qū)友好部隊(duì)意向紅色箭頭表示。

You must specify the validation key, decryption key, and the type of encryption used for validation of data.

必須指定驗(yàn)證、密密以及用于數(shù)據(jù)驗(yàn)證加密類型。

GOST encryption standards the former Soviet Union, the former Soviet Union, a Chinese encryption and decryption of the source code.

gost蘇聯(lián)加密標(biāo)準(zhǔn),蘇聯(lián)加密解密代碼。

Symmetric encryption and decryption is relatively fast, and is suitable for working with large amounts of data.

對(duì)稱加密解密速度相對(duì)較,適于處理大量數(shù)據(jù)

Concentration of this 3-year domestic encryption and decryption technology, a very worthy collection!

濃縮3國(guó)內(nèi)加密解密技術(shù)發(fā)展,非常值得收藏

Step 5: The final step in the decryption process is to call either the decryptInPlace or decrypt method on the Decryptor object.

步驟5:解密過程最后一個(gè)步驟Decryptor對(duì)象調(diào)用decryptInPlace或者decrypt方法。

a nonlinear flow encryption algorithms, symmetric encryption, the encryption and decryption are with the same key completion.

一種非線性加密算法,對(duì)稱加密,加密解密同一密鑰完成

In order to perform the decryption, the receiver must be in possession of a special piece of data called the key.

為了進(jìn)行解密,接收必須稱為密鑰特殊數(shù)據(jù)。

At decryption time, the same authenticator must be passed to DecryptByKey.

解密時(shí)必須同一驗(yàn)證器傳遞。

This paper introduces a number of encryption and decryption technologies on commonly used software.

介紹常用軟件加密軟件破解一些方法。

Access code availability is further controlled by selectively providing for updates of decryption access codes.

接著存取可用選擇地提供用于更新解密存取控制。

熱門查詢