肯尼迪博士说,解开密码的关键是来自于希腊音阶的12个音符,他所提到的曾在毕达哥拉斯的追随者之间流行。
Dr Kennedy said the key to unlocking the code came from the 12 notes of the Greek musical scale, which he said was popular among followers of Pythagoras.
这里需要注意的关键内容是用于存放用户名和密码的可能来源的线程本地存储声明和实例变量。
Key things to note here are the thread local storage declarations and the instance variables used to hold the potential source of the username and password.
此特性让这三种关键的安全技术能够利用 ACF提供的硬件密码计算加速设施。
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie,加密状态及认证密码等关键信息。
Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.
关键要记住的一点是如果使用密码,您必须确保注册中心内密码的安全,并对其进行管理,密码是ApplicationServerTAI用于验证用的。
The key points to remember are that by using a password, you must ensure and manage the password in the registry that the Application Server TAI is using for validation.
随着越来越复杂的关键字被匹配到散列上,匹配到已知密码上的可能性增加了。
As more and more complex keys are matched to hashes, the likelihood of coming up with a match for any given password increases.
要么选择一个传统的密码系统,一个“USB作为关键驱动”系统,或为最大的安全性两者的结合。
Either choose a traditional password system, a "USB drive as key" system, or a combination of the two for maximum security.
锁定下来-关键程序设置密码保护。
因为家用无线网络速度取决于同一时间有多少人在用,强密码是关键:这样可以确保只有得到许可的人在使用你的网络。
Because home Wi-Fi speeds are dependent on how many people are using it at one time, a strong password is key: It will ensure that only authorized people are using your network.
其中最关键的行动是其安装包嗅探密码司机。
One of the most critical actions is the password sniffer installation with its packet driver.
您可以把所有的密码在一个数据库,该数据库已被锁定在一个主键或一个关键的文件。
You can put all your passwords in one database, which is locked with one master key or a key file.
我知道所有的公钥密码体制的使用1 - 1关键的关系。所以它不可能与标准算法。
All Public key cryptosystems I know of USES a 1-1 key relationship. So it's not possible with the standard algorithms available.
密码管理安全的关键是,决定什么时候将密码赋给当前页面的算法。
The key to the security of a password manager is the algorithm for deciding when to reveal passwords to the current web page.
配置一个“关键”(密码),每个参加的邻居要有配置相同的密码设置。
Configure a "key" (password); each participating neighbor must have same key configured.
在这两种情况下,把东西和关闭的象征,但在后者,关键是要明确协会是一个以密码保护区,这不是影响我们希望达到的目标。
In both cases, turning something on and off is symbolized, but in the latter, a key is going to be a clear association to a password protected area, which is not the effect we were hoping to achieve.
密码技术作为保密通信的关键技术已成为当代信息高科技的热点。
The cryptology becomes a hotspot of information high tech as the key technology of secure communication.
您的密码将被暂时中止,如果您不正确的关键时期,连续四年密码。
Your password will be temporarily suspended if you incorrectly key in your password for four consecutive times.
数字版权保护问题越来越受到人们的重视,密码技术是解决这一问题的关键技术之一。
The problem of digital copyright protection is taken into account by more and more people. Cryptographical technology is one of the key solutions to this problem.
密码技术是信息平安中的关键技术。
Password technology is the key technology of information security.
但同时也引发了一系列的安全问题,而密码技术是保证信息安全的关键。
However, they caused a series of security questions at the same time. The cryptography is the key technology of guaranteeing the information safety.
智能卡是基于公钥密码体制电子商务的关键部件。
Smart CARDS are a key component of the public-key infrastructure on which E_Commerece is based.
密钥管理和密码同步是一次一密系统应用于实际的两个关键难题。
Key management and key synchronization are two important problem for realizing an one-time pad system.
安全的椭圆曲线构造和基点的选取,是椭圆曲线密码体制实现的的关键。
Point out that the secure elliptic curve is the master key of constructing the elliptic curve cryptosystem.
这些公钥密码算法的关键操作为大整数模幂乘操作与椭圆曲线标量乘法操作,均属于计算密集型运算。
In these public key cryptographic algorithms, the kernel operations are modular exponentiation of multi-precision integer and elliptic curve scalar multiplication, which both are computing intensive.
除子标量乘是超椭圆曲线密码体制中的关键运算。
Divisor scalar multiplication is the key operation in hyperelliptic curve cryptosystem.
实现椭圆曲线密码体制还有一个关键的步骤,就是椭圆曲线有限群基点选取算法的设计与实现。
In the implementation of elliptic curve cryptosystem, one of the key steps is to design and implement the base-point choice algorithm of elliptic curve finite group.
在公钥密码体制中,模运算是直接影响其它运算的关键运算。
Modular operation is a key one that affects other operations directly in the public key cryptosystem.
公钥密码体制是实现信息安全保密的关键技术。
Public key Cryptosystems is key technology of realizing information security.
因此如何在现有的密码体制和数字签名体制的基础上,构建一个更好的方案保护和管理密钥,是决定现实中系统的安全性的关键。
So it becomes a key problem how to build a better security protection scheme and key management system by making use of the cryptography algorithm in practice.
因此如何在现有的密码体制和数字签名体制的基础上,构建一个更好的方案保护和管理密钥,是决定现实中系统的安全性的关键。
So it becomes a key problem how to build a better security protection scheme and key management system by making use of the cryptography algorithm in practice.
应用推荐