从美国出口这项加密技术在目前是违法的。
It is currently illegal to export this encryption technology from the U.S.
新的ltpa令牌使用以下强加密技术。
The new LTPA token USES the following strong cryptographic techniques.
所以通常,这两个都是,加密技术的例子。
So in general, both of these are examples of what we call secret key crypto.
要更好地利用加密技术,用户还应该再使用ESP。
For the added benefit of encryption, users should additionally use ESP.
需要用某种形式的加密技术保护数据的机密性和完整性。
Some form of encryption is needed to protect confidentiality and integrity of data.
作为希腊的词根资产,加密技术是一种“神秘编写”艺术。
Cryptography is the art of "secret writing," as the word's Greek roots attest.
当然,也没有什么安排时间的秘密技巧能让所有事都顺利进行。
Of course, there's no such secret art of timing that will make everything run smoothly.
把这种技术与直接加密技术结合使用,所有的问题就迎刃而解了。
Combine that with straight out encryption and all of your problems are solved.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
如果有一种理想的加密技术,将会有很多法律障碍来限制它的使用。
If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.
可以利用加密技术来使Web服务请求和响应中交换的信息不可读。
Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.
但此精密技术可以载到卫星上,而不用加在“无线电标签”的重量上。
But that sophistication can be loaded onto the satellite, where it does not contribute to the weight of a tag.
可用各种方式组合这些机制,以便用各种加密技术建立各种安全模型。
These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.
它具有高度定向能力,功耗低,采用加密技术适合秘密全频谱应急行动。
Highly directional, it USES low power and is encrypted for covert full-spectrum contingency operations.
例如,对核心层的加密技术的更改要求对加密控制进行更改,反之亦然。
For instance, changes to cryptography in the core layer require changes to the cryptographic controls, and vice versa.
Harris公司的Sierra II加密技术为信息安全水平奠定了基础。
The Harris Sierra II? encryption technology provides the foundation for this level of information security.
对于隐写式密码解密技术需要记住的一点是,另一个复杂的层可能添加到隐藏数据。
Something to keep in mind with steganalysis techniques is that another layer of complexity may be added to the detection of hidden data.
一个剑桥大学的教授设想和提出一个小装置,利用光学和加密技术,以取代所有的密码。
A University of Cambridge professor has envisioned and presented on the idea of a small device that USES optics and cryptography to replace all passwords.
他目前管理着“安全以及加密技术研究部”,专门负责为英特尔的产品研发新的安全特性。
He manages the security and Cryptography Research group responsible for developing new security capabilities for Intel's products.
作为一个新生,他很快就熟悉了Boneh教授布置的挑战,即解决同态加密技术的难题。
As a new student he quickly picked up on the challenge laid out by Boneh to tackle the problem of homomorphic encryption.
他说,防务企业丢失机密技术信息,更有可能是由于网络犯罪,而非宽松应用出口管制规则。
He said defence companies were more likely to lose secret technical information as a result of cyber crime than the lax application of export control rules.
最后,策略规范可能要求加密订单的某些要素,指示要使用的加密技术、要使用的证书等等。
Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.
在以色列的案例中,安全和加密技术一直是他们的强项,但这不是像它过去一样是个增长行业。
In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.
在EFF这份名叫“如何防止失去位置隐私”的报告中,使用加密技术来保证匿名是非常简单的。
According to the report "on Locational Privacy, and How to Avoid Losing it Forever", it's fairly easy to use cryptographic techniques to ensure your anonymity.
置换密码是一种简单的加密技术,采用这项技术将把字母表中的每个字母替换为字母表中的其他字母。
A substitution cypher is a simple encryption technique where every letter of the alphabet is substituted with another letter from the alphabet.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
“盗版者有无限的时间和资源”Ishikawa说,“你无法建立一个不能被破解的加密技术。”
"Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."
他说服日本电信公司Docomo刚成立不久的PaloAlto研究室接收他为加密技术研究员。
He convinced the newly formed Palo Alto research office of the Japanese telecommunications firm Docomo to take him on as a cryptography researcher.
他说服日本电信公司Docomo刚成立不久的PaloAlto研究室接收他为加密技术研究员。
He convinced the newly formed Palo Alto research office of the Japanese telecommunications firm Docomo to take him on as a cryptography researcher.
应用推荐