• Encryption and decryption with PHP.

    使用PHP进行加密解密

    youdao

  • Can be achieved document encryption and decryption.

    可以实现文件加密解密

    youdao

  • The same key is used for both encryption and decryption.

    加密解密使用相同密钥

    youdao

  • We are almost to the point of encryption and decryption.

    我们几乎加密解密问题

    youdao

  • Handlers can manage encryption and decryption, logging and auditing, and so on.

    处理程序可以处理加密解密日志记录审计

    youdao

  • A symmetric key is one key that is used for both encryption and decryption.

    对称密钥加密解密使用一个密钥。

    youdao

  • In the end, image encryption and decryption with the new sequence are studied.

    最后应用此序列进行了图像加密解密的研究。

    youdao

  • Finally a software encryption and decryption method of PE file is put forward.

    最后提出了用软件PE可执行文件加密解密方法

    youdao

  • The author puts forward a new style net transport encryption and Decryption system.

    提出一种新型网络传输解密系统

    youdao

  • Knapsack public-key cryptosystem is characterized by fast encryption and decryption.

    背包公钥密码体制具有快速加密解密的优点。

    youdao

  • Used for encryption and decryption code I now further study, we hope to receive help.

    用来加密解密代码现在正在进一步研究希望能够得到大家的帮助

    youdao

  • So the problems of embedded system's data soft encryption and decryption are resolved.

    解决了一般嵌入式系统数据解密问题

    youdao

  • The pass phrase is used only for client-side encryption and decryption of your browser data.

    短语用于客户端的浏览器数据解密

    youdao

  • You can also use AES_ENCRYPT and AES_DECRYPT functions for encryption and decryption of column data.

    可以使用AES_ENCRYPTAES_DECRYPT函数数据进行加密解密

    youdao

  • Due to simple system initialization, efficient encryption and decryption, this scheme is easy to realize.

    方案系统初始化简单加密解密效率高便于实现

    youdao

  • This encryption method uses quantum state as the key used for the encryption and decryption of information.

    这种加密方法是用量子状态来作为信息加密解密密钥

    youdao

  • Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.

    对称算法非常有效并且可以与用于加密解密计算的单一密钥一起使用

    youdao

  • The encryption and decryption of these new schemes are much easier and much faster than the famous RSA scheme.

    这些公钥体制著名RSA公钥体制相比的最大优点加密解密算法简单,实现速度快。

    youdao

  • The offline policy controls backup and restore commands, and the encryption and decryption of database backup images.

    离线策略控制备份恢复命令以及数据库备份映像加密解密

    youdao

  • This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    安全策略使用非对称加密执行数字签名验证加密解密

    youdao

  • The double random phase real-value encryption and decryption method is proposed for the optical image security system.

    提出了一种基于随机相位图像实值编码方法,该方法可应用于光学图像加密

    youdao

  • Moreover, the encryption and decryption schemes of the ECC are designed and the security problem of ECC is also considered.

    文章设计了椭圆曲线加密系统解密方案,讨论椭圆曲线系统的安全性问题

    youdao

  • In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging.

    第三节中展示如何生成一个用于Kerveros通信中进行加密解密的密钥。

    youdao

  • Keys are used for digitally signing documents and verifying signatures, and they help with the encryption and decryption processes.

    密钥用于数字签署文档验证签名用于加密解密过程

    youdao

  • A group key distribution scheme utilizing a polynomial expansion is proposed, which features in no traditional encryption and decryption.

    提出了一种利用多项式展开密钥分配方案特点使用传统加密解密

    youdao

  • With the In System Programming technique(ISP), the system reconfiguration, the encryption and decryption for data communication are realized.

    采用系统可编程技术ISP)实现系统重构传输数据加密解密编码。

    youdao

  • Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.

    XML加密关于加密解密结构化信息,而规定密钥交换任何特定方法

    youdao

  • Transparent database encryption refers to the encryption and decryption of data in the database, the database access program is completely unaware.

    数据库透明加密对库内数据加密解密,对数据库访问程序完全无感知的。

    youdao

  • This approach is transparent to the database itself, the database management system can not feel the existence of encryption and decryption process.

    这种方式对于数据库自身来说也是透明,数据库管理系统也感觉不到加密解密过程的存在

    youdao

  • This approach is transparent to the database itself, the database management system can not feel the existence of encryption and decryption process.

    这种方式对于数据库自身来说也是透明,数据库管理系统也感觉不到加密解密过程的存在

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定