• 美国出口这项目前违法的。

    It is currently illegal to export this encryption technology from the U.S.

    《柯林斯英汉双解大词典》

  • 新的ltpa令牌使用以下

    The new LTPA token USES the following strong cryptographic techniques.

    youdao

  • 所以通常这两个都例子

    So in general, both of these are examples of what we call secret key crypto.

    youdao

  • 更好地利用密技用户应该使用ESP

    For the added benefit of encryption, users should additionally use ESP.

    youdao

  • 需要某种形式保护数据的完整性

    Some form of encryption is needed to protect confidentiality and integrity of data.

    youdao

  • 作为希腊的词根资产,密技一种“神秘编写艺术

    Cryptography is the art of "secret writing," as the word's Greek roots attest.

    youdao

  • 当然也没有什么安排时间所有事都顺利进行。

    Of course, there's no such secret art of timing that will make everything run smoothly.

    youdao

  • 这种直接术结合使用,所有问题迎刃而解了

    Combine that with straight out encryption and all of your problems are solved.

    youdao

  • 清单6中的示例使用非对称密技签署所有消息提供图书信息

    The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.

    youdao

  • 如果一种理想的会有很多法律障碍来限制使用

    If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.

    youdao

  • 可以利用来使Web服务请求响应交换信息不可读

    Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.

    youdao

  • 密技可以卫星上,不用加在“无线电标签重量上。

    But that sophistication can be loaded onto the satellite, where it does not contribute to the weight of a tag.

    youdao

  • 可用各种方式组合这些机制,以便各种建立各种安全模型

    These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.

    youdao

  • 具有高度定向能力功耗,采用术适合全频谱应急行动

    Highly directional, it USES low power and is encrypted for covert full-spectrum contingency operations.

    youdao

  • 例如核心层更改要求对加控制进行更改,反之亦然

    For instance, changes to cryptography in the core layer require changes to the cryptographic controls, and vice versa.

    youdao

  • Harris公司的Sierra II信息安全水平奠定了基础

    The Harris Sierra II? encryption technology provides the foundation for this level of information security.

    youdao

  • 对于写式码解需要记住一点另一个复杂可能添加隐藏数据

    Something to keep in mind with steganalysis techniques is that another layer of complexity may be added to the detection of hidden data.

    youdao

  • 剑桥大学教授设想提出一个装置利用光学密技取代所有

    A University of Cambridge professor has envisioned and presented on the idea of a small device that USES optics and cryptography to replace all passwords.

    youdao

  • 目前管理着“安全以及术研究部”,专门负责英特尔产品研发新的安全特性

    He manages the security and Cryptography Research group responsible for developing new security capabilities for Intel's products.

    youdao

  • 作为一个新生很快就熟悉了Boneh教授布置挑战,即解决同态密技难题

    As a new student he quickly picked up on the challenge laid out by Boneh to tackle the problem of homomorphic encryption.

    youdao

  • 防务企业丢失信息有可能由于网络犯罪而非宽松应用出口管制规则

    He said defence companies were more likely to lose secret technical information as a result of cyber crime than the lax application of export control rules.

    youdao

  • 最后策略规范可能要求订单某些要素指示使用、要使用证书等等

    Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.

    youdao

  • 以色列案例中,安全和一直是他们的强项不是过去一样是个增长行业

    In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.

    youdao

  • EFF这份名叫“如何防止失去位置隐私”的报告中使用保证匿名非常简单的。

    According to the report "on Locational Privacy, and How to Avoid Losing it Forever", it's fairly easy to use cryptographic techniques to ensure your anonymity.

    youdao

  • 置换一种简单,采用这项术将把字母表中的每个字母替换字母表中的其他字母。

    A substitution cypher is a simple encryption technique where every letter of the alphabet is substituted with another letter from the alphabet.

    youdao

  • 我们安全性术,甚至公钥介绍了很多,目的是帮助成功开发一个PHP项目

    I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.

    youdao

  • 盗版者无限时间资源Ishikawa,“无法建立一个不能被破解的术。”

    "Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."

    youdao

  • 说服日本电信公司Docomo成立不久PaloAlto研究室接收密技研究员

    He convinced the newly formed Palo Alto research office of the Japanese telecommunications firm Docomo to take him on as a cryptography researcher.

    youdao

  • 说服日本电信公司Docomo成立不久PaloAlto研究室接收密技研究员

    He convinced the newly formed Palo Alto research office of the Japanese telecommunications firm Docomo to take him on as a cryptography researcher.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定