• 并用测试软件所设计密钥系统进行测试。

    And use the test tools to test the chaotic key system we designed.

    youdao

  • 文章对公开密钥系统中的常用用户存储技术进行了比较分析。

    In this paper, we compare some common technologies of private key storage management.

    youdao

  • 如何保证公钥产生不会影响钥的性能水印密钥系统关键问题

    How to generate public keys without weaken the performance of the private key is a key problem.

    youdao

  • 目前密钥系统无论是单钥体制还是公钥体制建立计算安全模型上。

    Both the symmetric key systems and public key systems currently used are based on the model of computational security.

    youdao

  • 算法设计安全生物密钥系统由于泄漏侧信道攻击下任不安全的。

    Even if the biometric cryptosystem is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage.

    youdao

  • 网络系统主要安全技术数据加密RSA算法密钥系统安全的一种体制

    The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.

    youdao

  • 为何其他一些Google产品创建应用密钥系统,借此可以关闭滥用同时“好孩子”继续提供服务

    Why not create an application key system like in some other Google products so that you can shut down the abusers while still providing services for the "good guys"?

    youdao

  • 尽管DCE目前基于秘密密钥系统,但本文后面介绍DCE如何利用扩展这些技术,以提供一种更为安全环境

    Although DCE is currently based on secret key system, further in the article we will come to know how DCE exploits these techniques and augments them to provide a much more secured environment.

    youdao

  • 对称密钥系统较之对称密钥系统具有惊人速度优势但是管理对称密钥系统密钥却是需要解决的一个难题。

    The symmetric key systems compared with asymmetric key systems have astounding speed benefits, but managing their keys has always been difficult problem to be solved.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • 秘密密钥加密分布式系统安全机制中一重要技术

    Secret key cryptography is one of the most important technologies in distributed systems security.

    youdao

  • 虽然起来不是什么了不起事,但分解找到一个离散对数困难形成大部分公用密钥密码学系统基础如果不是全部的话。

    While this doesn't sound like a big deal, the difficulty of factoring and finding a discrete logarithm forms the basis of most if not all public-key cryptography systems.

    youdao

  • 这种方法将帮助确保使用正确加密密钥系统响应关闭命令

    This approach helps ensure that systems will only respond to the shutdown command if the correct encryption key is used.

    youdao

  • 双重密钥安全认证用于验证不同系统访问保护方法之一

    Double key secure authentication is one of the protection methods used to verify access across different systems.

    youdao

  • 按照惯例,出现加密时候,理解整个系统出发点就是思考密钥有关问题多少密钥持有,如何使用

    As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.

    youdao

  • 此前用作电邮加密系统全都仰仗安全存储密钥的招数。

    Past systems designed to encrypt e-mails all relied on ways of storing their keys safely.

    youdao

  • 使用公用安全性系统之一PKI(公用密钥基础),一种用于PDA智能电话安全性的加密技术

    One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

    youdao

  • 直接使用不同操作系统用户ID、不同的加密密钥不同的管理密码运行每个计算单元即可。

    Simply run each cell with a different operating system user ID, different encryption keys, and different administrative passwords.

    youdao

  • 如果系统找到一个匹配文件保护密钥,那么这个进程可以对文件密钥和文件内容进行解密

    If the system finds a key matching the file protection, the process is able to decrypt the file key and file content.

    youdao

  • 由于任何加密密钥密码系统必须位于源代码中,因此同时还会将应用程序数据公开出来

    Since any required encryption keys and cryptosystems have to be in the source code as well, you've also just opened up your source data stream to the world.

    youdao

  • 分钟的时间逻辑上拟定系统这些系统通信指示它们需要哪些密钥这些密钥存储哪些密钥存储中。

    Take a few minutes to draw out logically the systems that will be communicating and indicate what keys they will need and in what key stores those keys will be stored.

    youdao

  • 系统提示提供关于密钥细节包括密码姓名以及位置

    You'll be prompted to provide details about the new key including a password, your name, locality, etc.

    youdao

  • 安全地连接远程系统时,首先打开包含SSH密钥秘密部分PPK文件

    When you want to connect securely to a remote system, first open the PPK file that contains the secret part of the SSH key.

    youdao

  • 如果系统提示输入密码,那么远程主机安装公共密钥再次尝试连接。

    If you are prompted for a password, rectify the problem by installing your public key on the remote host and try again.

    youdao

  • 生成密钥必须密码ID关联,此ID应该不能登录系统

    To generate this key, a password must be associated with this ID; however, this ID should not be able to log onto the system.

    youdao

  • 双重密钥安全表示用户必须通过两个系统认证-应用程序服务器(位于主管服务供应商)金融机构

    Double key secure means the user must authenticate two systems — the application server (at the hosting service provider) and the financial institution.

    youdao

  • 单击消息允许蓝牙连接之后系统要求输入用于蓝牙设备密钥如图5所示。

    After you click the message to allow the Bluetooth connection, you are asked to enter the passkey for the Bluetooth device; see figure 5.

    youdao

  • 另一个流行秘密密钥加密系统国际数据加密算法(IDEA)。

    Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).

    youdao

  • 今后文章中将要讨论安全性断言标记语言(Security Assertion Markup Language,SAML)xml密钥管理系统(XML Key Management System,XKMS)。

    In future articles, I will discuss Security Assertion Markup Language (SAML) and XML Key Management System (XKMS).

    youdao

  • 成功安装ActiveDirectory之后,确保Kerberos密钥分发中心系统服务Services列表上得到正确配置

    After you have successfully installed Active Directory, make sure that the Kerberos key distribution center system services is configured correctly in the services list.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定