• SSH秘密密钥转换为putty格式

    Convert SSH secret key to PuTTY format.

    youdao

  • 使用同一个秘密密钥加密解密它们之间交换消息

    Same secret key is used to encrypt and decrypt the messages exchanged among them.

    youdao

  • 访问密钥秘密密钥视为String

    It takes your access and secret keys as Strings.

    youdao

  • 秘密密钥加密分布式系统安全机制中一重要技术

    Secret key cryptography is one of the most important technologies in distributed systems security.

    youdao

  • 身份验证服务获取PSTkt请求使用秘密密钥解密

    The authentication service gets the PSTkt request and decrypts it using its secret key.

    youdao

  • 目标服务器接收PSTkt使用自己秘密密钥解密

    The target server receives the PSTkt and decrypts it using its own secret key.

    youdao

  • 服务器客户接收票证然后使用自己秘密密钥进行解密

    Receiving the ticket from the client, server then decrypts it using its own secret key.

    youdao

  • 客户端接收KDC回复然后使用自己秘密密钥解密消息

    Receiving the reply from KDC, client then decrypts the message using its own secret key.

    youdao

  • SSH秘密密钥转换为putty格式(用于分发团队成员)。

    Convert SSH secret key to PuTTY format (for distribution to team members).

    youdao

  • 相反秘密密钥加密的普通文本只能公开密钥解密

    Conversely, plaintext encrypted with the private key can be decrypted only with the public key.

    youdao

  • 连接实例时,ssvnc包向Pageant请求SSH秘密密钥

    Whenever you connect to a cloud instance, the SSVNC package requests the SSH secret key from Pageant.

    youdao

  • Kerberos根据秘密密钥加密使用可信第三身份验证而设计的。

    Kerberos was designed based on secret key cryptography and using trusted third party authentication.

    youdao

  • 方案具有很强的安全性并且允许所有用户自主选择秘密密钥

    The scheme is of very strong security, and it allows all users to select their own secret keys.

    youdao

  • 网络部分包含获取票证其他服务所需信息(比如包含主体秘密密钥)。

    Network part contains the information required to acquire tickets and other services (e.g. it includes the principals secret key).

    youdao

  • 应该收到一个更多PuTTYSSH秘密密钥PPK文件)。

    You should have received one or more PuTTY SSH secret keys (PPK file).

    youdao

  • 如果来自客户端的有效请求,它使用服务器秘密密钥STkt提取会话密钥

    If it is a valid request from client, it extracts the session key from the STkt using server secret key.

    youdao

  • 一旦安全服务器通过秘密密钥确认了用户身份,用户登录DCE过程完成了

    Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.

    youdao

  • 密钥建立协议为了以后的密码学应用而使一个秘密密钥多方都可用的过程。

    A key establishment protocol is a protocol whereby a Shared secret becomes available to two or more parties, for subsequent cryptographic applications.

    youdao

  • 对于新的实例执行的最后一步OpenSSH秘密密钥转换为PuTTY可以使用格式

    The last step to take for your new cloud instance is to convert the OpenSSH secret key to a format that can be used by PuTTY.

    youdao

  • 协议实际上包含一系列消息,其中包含秘密密钥以及有助于客户端服务器安全地相互验证的其他信息

    This protocol actually contains a series of messages containing secret keys and other information that help clients and servers identify each other securely.

    youdao

  • 接收者利用发送者公开密钥他们自己的秘密密钥结合解开该报文秘密编码解密之。

    Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it.

    youdao

  • STkt然后使用目标服务器秘密密钥加密这样目标服务器就能够使用自己秘密密钥解密stkt请求

    The STkt is then encrypted using the target server secret key. So target server can decrypt the STkt request using its secret key.

    youdao

  • 本文利用椭圆曲线离散对数难解问题,提出新的密钥认证方案密钥由用户口令秘密密钥组成

    A new key authentication scheme was proposed. This new scheme is based on the intractability of elliptic discrete logarithms. The key is combination of password and private key.

    youdao

  • 尽管DCE目前基于秘密密钥系统,但本文后面介绍DCE如何利用扩展这些技术,以提供一种更为安全环境

    Although DCE is currently based on secret key system, further in the article we will come to know how DCE exploits these techniques and augments them to provide a much more secured environment.

    youdao

  • 如果网站访问网站的数据他们已经登记我的开发者网站注册,网站消费者关键秘密密钥

    If a website want to access my data from website, they have to register with my developer website, after the registration that website will generate Consumer key and Secret key.

    youdao

  • 论证表明新方案加密变换几乎不可破译,整个系统的工作不会部分秘密密钥的泄露受到任何破坏。

    Even though some secret keys of the system may be known, the security of this system is unlikely to be broken and thus secure communication may continue even in this event.

    youdao

  • 该文研究双秘公开钥密码体制,不同一般只有一个秘密密钥的公开密钥体制,而是使用两个秘密密钥

    This paper is researching the public-key cryptosystem based on two private keys, it's different from the generic PKC which USES only one private key.

    youdao

  • 该文研究双秘公开钥密码体制,不同一般只有一个秘密密钥的公开密钥体制,而是使用两个秘密密钥

    This paper is researching the public-key cryptosystem based on two private keys, it's different from the generic PKC which USES only one private key.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定