• The KDC maintains a database of secret keys.

    KDC维护一个秘密密匙数据库

    youdao

  • It takes your access and secret keys as Strings.

    访问密钥秘密密钥视为String

    youdao

  • Asymmetric keys for exchange of secret keys.

    用于交换非对称密钥

    youdao

  • This story carries one of the most secret keys of Tao.

    这个故事蕴含着隐秘诀窍之一

    youdao

  • Normally, and as mentioned, secret keys are protected by a passphrase.

    正常情况下正如前面提到的,机密密钥密码短语的保护。

    youdao

  • You should have received one or more PuTTY SSH secret keys (PPK file).

    应该收到一个更多PuTTYSSH秘密密钥PPK文件)。

    youdao

  • The public and secret keys are stored in a public database (/etc/publickey file).

    这些公钥机密密钥存储一个公共数据库(/etc/publickey文件)中。

    youdao

  • This opposite is the path, and I say this is one of the most secret keys of Tao.

    相反才是途径道的隐秘诀窍之一

    youdao

  • Support the use of TGTs obtained from a credentials cache and secret keys obtained from key tables.

    支持凭证高速缓存获得TGT使用,支持从密钥获得密钥的使用。

    youdao

  • The scheme is of very strong security, and it allows all users to select their own secret keys.

    方案具有很强的安全性并且允许所有用户自主选择秘密密钥。

    youdao

  • Each user using Secure RPC with DES authentication is supposed to have a pair of public and secret keys.

    每个通过DES身份验证使用安全rpc用户必须拥有一对公钥机密密钥

    youdao

  • As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.

    作为现在流行采用密钥加密解密算法,无非分为对称密钥和非对称密钥两种类型。

    youdao

  • For secret keys, some reasonable factors are key version number and the time the key was added to the key table.

    对于密钥一些合理因素密钥版本密钥添加密钥中的时间

    youdao

  • This is an administrative daemon managing a database of principals, their secret keys, and policy configurations.

    一个管理守护进程,负责管理主体数据库、主体数据库密钥策略配置

    youdao

  • The -s option tells kdb5_util to create a stash file (a file containing a set of secret keys) to authenticate itself.

    s选项告诉kdb5_util创建个存储文件(包含密钥文件),以便自身进行身份验证。

    youdao

  • Then, we realize the real-time secret coding on the digital chip TMS320VC5402 and analyze the similarity of symbol secret keys.

    使用数字可编程芯片TMS320 VC 5402实现实时保密编码对混沌符号密钥相似性作了分析

    youdao

  • An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.

    对称密钥(公钥)算法用于交换对称算法中使用加密密钥以及用于数字签名

    youdao

  • It obtains these credentials and secret keys from the Subject and fails if the Subject does not contain the necessary credentials and secret keys.

    Subject获得这些凭证密钥并且如果Subject没有包含必要的凭证和密钥时就会失败。

    youdao

  • It is a crux for security of ring signature that exposure of secret keys can be a devastating attack on cryptosystem which ring signature base on.

    作为签名基础公钥加密体制,存在着密钥泄露问题,对于环签名的安全性来说致命的。

    youdao

  • The system administrator runs the newkey command for each user to generate unique public and secret keys for the user who wants to use DES authentication.

    系统管理员每个用户运行newkey命令,以便为希望使用DES身份验证用户生成唯一的公钥机密密钥

    youdao

  • Once the public and secret keys of the users are created, they must log in and run the keylogin command anytime they wish to run the Secure RPC application.

    创建了用户公钥机密密钥之后,当这些用户希望运行安全RPC应用程序时,他们必须登录运行keylogin命令

    youdao

  • This protocol actually contains a series of messages containing secret keys and other information that help clients and servers identify each other securely.

    协议实际上包含一系列消息,其中包含秘密密钥以及有助于客户端服务器安全地相互验证的其他信息

    youdao

  • The authors designed the communication system of the teaching platform and the pseudo random number generator to generate secret keys of the algorithm.

    设计了实验平台通信系统算法过程中产生密钥随机序列发生器

    youdao

  • These functions are helpful for simulations (so you can re-run the simulation), but they are extremely dangerous if you're using them to create secret keys for security.

    虽然这些函数对于模拟程序来说帮助的(因此可以重新运行模拟程序),但是如果使用这些函数创建安全密钥可实在是非常危险

    youdao

  • You've seen in this article how symmetric encryption, using client-generated secret keys, can be used to secure message exchanges without the need for client certificates.

    已经本文了解了对称加密如何需要客户证书情况下使用客户端生成的保密密钥保证消息交换的安全。

    youdao

  • Even though some secret keys of the system may be known, the security of this system is unlikely to be broken and thus secure communication may continue even in this event.

    论证表明新方案加密变换几乎不可破译,整个系统的工作不会部分秘密密钥的泄露而受到任何破坏。

    youdao

  • For simplicity, the login module chooses default credentials and secret keys based on the time when they were added to the Subject; hence, the timestamp in KerberosCredentials.

    达到简洁性登录模块根据凭证密钥Subject时间选择缺省的凭证和密钥;从此时起即为KerberosCredentials中的时间戳记。

    youdao

  • Though not shown in this article, this use of secret keys is essentially the same as the signing example for WS-SecureConversation discussed in "WS-SecureConversation performance."

    虽然本文没有介绍,但是保密密钥使用方法本质上与“WS -SecureConversation性能”讨论WS - SecureConversation签名例子一样的。

    youdao

  • As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.

    按照惯例,出现加密时候,理解整个系统出发点就是思考密钥有关问题多少密钥,持有,如何使用。

    youdao

  • As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.

    按照惯例,出现加密时候,理解整个系统出发点就是思考密钥有关问题多少密钥,持有,如何使用。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定