这是一个文本加密与解密的小程序,功能完善。
This is a version of the encryption and decryption procedures small, functional I...
本书全面揭示Windows平台的加密与解密技术!
The book comprehensively revealed the Windows platform encryption and decryption technology!
从性能而言,开销最大的操作通常是数据和返回值的序列化和反序列化以及请求和响应的加密与解密。
The most expensive operations in terms of performance are usually the serialization and deserialization of the data and return values, and the encryption and decryption of the request and response.
对加密文件解密,验证用公钥解密签名与解密文件的MD 5值比较,以判断文件是否被修改。
Encrypted files decryption, authentication using public key to decrypt the signature and decrypt files MD5 value to determine whether a document is modified.
补充并纠正了一些算法证明。本文改进后的算法具有以下特点:多种防御措施,用户拥有加密与解密的自主控制权,易于追踪;
The work of the paper is to perfect and set up a system of encryption and decryption algorithms based on composite nonlinear discrete chaotic dynamical systems.
DB 2恢复命令调用DB2包含在数据库备份映像中的代理,然后DB 2代理通过与安全服务器通信对其进行解密。
The DB2 restore command invokes the DB2 agent contained in the database backup image, and the DB2 agent decrypts it by communicating with the security server.
对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
类似的密钥可用来加密和解密消息,这样双方都可以确保与之交互的另一方是正确无误的。
Similar cryptographic keys can be used to encrypt as well as decrypt messages, therefore, both the sides are guaranteed that they are interacting with the correct one.
因为接收方能够对发送的消息解密,所以接收方不知道它正在与一个伪用户进行交互。
Because the receiver is able to decrypt the sent messages, the receiver does not know that it is interacting with a rogue user.
在LDAP客户机使用证书进行加密之前,它会验证自己正在与之进行交谈的服务器拥有这个证书,这是通过加密一个挑战并验证服务器可以对其进行解密实现的。
Before the LDAP client USES a certificate for encryption, it verifies that the server it is talking with owns the certificate by encrypting a challenge and verifying that the server can decrypt it.
而解密方必须有权使用与用于加密消息的公钥关联的私钥。
The decrypting party must have access to the private key associated with the public key used to encrypt the message.
secfsd保存在线策略,以及与访问控制有关的加密和解密数据。
A secfsd process holds online policies, and encrypts and decrypts data with access control.
WEP 将 40比特或 104 比特密钥与随机的24 比特初始向量组合用以加解密数据。
WEP combines a 40-bit or a 104-bit key with a random 24-bit initialization vector to encrypt/decrypt data.
客户端收到响应消息,解密它,获得PSTkt和与目标服务器一同使用的会话密钥。
The client receives the response, decrypts it and obtains the PSTkt and the session key to be used with the target server.
如果找到与文件保护匹配的密钥,进程就能够解密文件密钥,进而解密文件内容。
If a key matching the file protection is found, then the process is able to decrypt the file key and therefore the file content.
当地警方与黑莓信使生产商动态研究公司合作,解密信息,找出那些在伦敦烧抢商店的罪犯。
Police there are working with BBM maker Research in Motion to decipher the messages and identify those responsible for burning and pillaging London stores.
未来十年,科学界和制药业面临的任务至少与最初解密人类基因的任务一样具有挑战性。
The task facing science and industry in coming decades is as at least as challenging as the original deciphering of the human genome.
公钥与私钥方案非常有趣,因为使用公钥加密的数据只能由相关私钥进行解密。
The public and private key scheme is interesting because data encrypted with a public key can only be decrypted with the associated private key.
请求现在已经进行了解密并验证是否与数字签名匹配,接下来将发送到WebSphereApplicationServerEchoService进行处理。
The request, now decrypted and verified to match the digital signature, is sent to the WebSphere Application Server EchoService for processing.
和文件都可以加密和解密与几个简单的步骤。
And files can be encrypted and decrypted with a few simple steps.
精神病专家、大师级音乐会钢琴演奏家RichardKogan医学博士将在APA(美国精神疾病协会)新奥尔良2010年会上解密Copin的心理与音乐以及他的困厄与艺术之间的联系。
Psychiatrist and master concert pianist Richard Kogan, M.D., will explore the mind and music of Chopin and the connection between his suffering and his art at APA's 2010 annual meeting in New Orleans.
你只可以解密的讯息已被加密与你的公共密钥。
You can only decrypt messages that have been encrypted with your public key.
这些公钥体制与著名的RSA公钥体制相比的最大优点是共加密、解密算法简单,实现速度快。
The encryption and decryption of these new schemes are much easier and much faster than the famous RSA scheme.
UCCA 将开始一个全新的系列讲座“爱品牌”,带领观众与主流广告媒体、职业公关一起解密大品牌的成功和他们不竭的灵感之源。
UCCA has initiated a series of talks with leading advertising or PR professional to decode the secrets of big brands' success and understand what makes them so inspiring.
针对信息与网络安全的重要性及严峻性,提出了一种汉字信息加密、在BMP图像文件中隐藏、恢复及解密的方法。
In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.
给出了一些较常用的加密解密方法及反跟踪技术,内容包括硬盘加密、软盘加密以及磁盘软件加密与保护技术。
The paper gives some practical methods of encryption and decryption as well as preventive trace, including hard disk encryption, floppy disk encryption, disk file encryption and protection.
NTRU公钥密码体制的陷门单向函数与以往的有所不同,其单向性依赖于会话密钥的随机性,且解密不需要知道有关随机会话密钥的任何信息。
The trapdoor one-way function in NTRU is different from previous ones. Its one-wayness depends on the randomness of session keys, and decryption needs not any information about the session key.
NTRU公钥密码体制的陷门单向函数与以往的有所不同,其单向性依赖于会话密钥的随机性,且解密不需要知道有关随机会话密钥的任何信息。
The trapdoor one-way function in NTRU is different from previous ones. Its one-wayness depends on the randomness of session keys, and decryption needs not any information about the session key.
应用推荐