这种灵活性使得STDLL 可以支持任何密码设备。
This flexibility allows the STDLLs to support any cryptographic device.
openCryptoki通过将应用程序从密码设备细节的分离来提供应用程序的可移植性。
OpenCryptoki provides application portability by isolating the application from the details of the cryptographic device.
攻击者同时利用正确的和错误的加密结果来发现隐藏在密码设备中的秘密信息(密钥)。
The attacker exploits the correct and incorrect encryption results to disclose the secret information (key) hidden in the cryptographic device.
旁路攻击是一种新的密码分析方法,其利用了密码设备在运算时泄漏的信息破解密码系统。
Side-channel attack is a new cryptanalysis, and it utilizes the run-time leakages to extract the secret.
现在消费者只需在移动设备上的支付宝应用程序中输入一个简短的密码就可以支付商品,而不是用现金支付。
Instead of paying by cash, customers now pay for goods simply by typing a short password into Alipay app on their mobile devices.
举例来说,许多路由器和其它网络设备都有默认的登录用户名和密码。
For instance, many routers and other networking equipment come with a default username and password for logging in.
这方面的政策还可以要求设定复杂的密码以及设置安全功能,如在多次密码输入错误后可自动抹除设备上的数据。
Policies can also force strong passwords and set security features such as the number of times a password attempt can fail before the device wipes its data.
一旦BIS 4.0发布后,当用户想要从他们的设备设置托管电邮地址变更时必须输入他们的BIS帐户密码。
Once BIS 4.0 is released, the user will have to enter their BIS account password when they make changes to their hosted email address from their device.
最严重的攻击来自于移动网络设备,40%的调查对象甚至都没有设置密码。
The worst offenses come on mobile internet devices, which 40 percent of respondents don't even protect with a password.
此前,拥有用户名和密码的BIS用户从他们的设备访问BIS时都被提示输入他们的凭证。
Previously, BIS users who had a username and password were prompted to enter their credentials whenever they accessed their BIS account from their device.
如果设备只执行简单的密码功能,则所有对象必须由软件来管理。
If the device only performs a simple cryptographic function, all of the objects must be managed by the software.
AAA框架允许DataPower设备使用各种方法,从传入的请求提取用户密码、安全令牌和其他标识信息。
The AAA framework allows DataPower devices to use a broad variety of methods for extracting user passwords, security tokens and other identity information from incoming requests.
宝利通VoIP系统(Polycom)屈居次席,其连入网络的585台设备中有29%仍抱着初始密码不放。
Polycom VoIP units came in second, with default passwords lingering on about 29 percent of 585 devices accessible over the internet.
Be ta版火狐4包含火狐同步特性,以致于您浏览的历史记录、书签、标签和密码等信息将在您的移动和桌面设备之间同步。
Features of Firefox 4 Beta include Firefox sync, so that browsing history, bookmarks, tabs, and passwords are synced across your mobile and desktop devices.
斯多夫说:“扫描程序脚本向这些网络设备发送对应厂商的公共密码,如果设备对“命令提示”做出与之对应的响应,那么很明显这台设备是不设防的。”
"The scan script sends the public password for the product, and if the device responds with the 'command prompt' for that product interface, then the machine is obviously open," Stolfo said.
所有这一切都是在密码员和加密设备的保护下进行的。
All this is in the password member under the protection of the equipment and encryption.
这并不会保护数据以防可以监听用户输入密码的根权限入侵,它可以为丢失的没有文件系统加密的设备提供保护。
While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.
如果您当前系统式通过指纹或者其他生物识别设备来登录系统的,请务必在升级前写下您的密码。
If you use a fingerprint reader or other biometric device to log on to your computer, make sure you write down your password before upgrading.
三是使用的电脑、手机电子设备等要使用安全密码,不要使用公共场所开放式的WIFI网络。
Three is the use of computers, mobile phones and other electronic devices to use safe passwords, do not use public places open WIFI network.
这类恶意软件能够对计算机操作系统和嵌入式设备进行隐蔽探测,记录网络内部结构、口令密码等信息。
This kind of malicious software can hide the computer operating system and embedded devices, recording the internal structure of the network, password password and other information.
加密卡可以为个人计算机系统、网络安全设备提供密码服务,以实现数据的安全存储和网络信息的保密通信。
Cipher Card can offer cryptogram service to PC system and network security device to realize safe storage for files and secure communication for information on network.
通过与保安的交谈,这些心怀不轨的年轻人得到了密码,然后偷走了一批价值一百万美元的设备。
Through the conversation with the guards, these evil youngsters obtained the code and stole a heap of facilities whose price was equal to one million dollars.
大多数制造商对其所有的设备使用的都是相同默认名称和密码,使得某些人可以在您不知道的情况下使用此默认名称和密码访问您的路由器或访问点。
Most manufacturers use the same default name and password for all of their equipment, which someone could use to access your router or access point without you knowing it.
该移动设备受密码保护。要想与该移动设备连接,必须输入其密码。
This mobile device is password protected. In order to connect to the device, you must enter its password.
椭圆曲线密码体制因其具有密钥短、开销小的优点,非常适合应用于移动通信设备。
ECC (Elliptical Curve Crypto system) is suit for the mobile communication equipment for its advantage of short key and low cost.
如今我们天天与密码相伴,这么多电子设备手机、笔记本电脑、电脑。那问你一个关于手机的问题好啦。
Today we have passwords for everything. And we have so many devices - like smartphones and laptops and computers -so I'm going to ask you a question about smartphones.
电话接通后,根据语音提示输入密码,便可进入对远地设备进行控制的状态。
Then he can control the remote equipments, after he puts through the call, and inputs the password according to sound prompt.
移动设备一般是设计为单个用户使用的,除了一个简单的密码以外,经常缺少基本的用户配置文件和安全追踪策略。
Mobile devices are usually designed to be single-user devices and normally lack basic user profile and security tracking beyond just a simple password.
移动设备一般是设计为单个用户使用的,除了一个简单的密码以外,经常缺少基本的用户配置文件和安全追踪策略。
Mobile devices are usually designed to be single-user devices and normally lack basic user profile and security tracking beyond just a simple password.
应用推荐