加密后的结果类似于清单4。
对数据进行加密之后,清单6中的代码读回加密后的事件文本。
After encrypting the data, the code in Listing 6, below, reads the encrypted event text back in.
话句话说,在FHE中加密后的数据可以像之前未加密时那样被处理。
In other words, in FHE, data can be processed after it is encrypted, as well as before.
说明:易语言机器码注册原码,加密后的~希望大家有用。
Yi language codes of the original registration code encryption ~ hope we useful!
该方法使用数据库存放加密后的动态密码,能起到很好的保护作用。
And the method USES an encrypted dynamic code in the data - base and is very safe and reliable in use.
中文大意就是:加密后的文件只能由加密的人来解密或者用恢复代理。
Encrypted files can only be unencrypted by the user that encrypted the files or by a Recovery Agent.
加密后的产品是可以访问的,当然只有那些具有正确密钥的人才能解密。
The encrypted product is only accessible to those who have the correct key.
将加密后的事件文本写到磁盘,然后运行解密程序,这将创建一个不加密的事件文本文件。
Writing the encrypted event text to disk and running the decrypt process will create a file with the unencrypted event text.
介绍了如何利用信息隐藏技术,对加密后的邮件信息进行隐藏,以确保邮件的安全。
Using steganography technique in encrypted E-mail for hiding information is introduced, which can protect the E-mail.
分发的子密钥通过椭圆曲线密码进行了加密,使得受托人掌握的子密钥是加密后的密文形式,增强了安全性;
The shared key distributed by the dealer is encrypted based on ECC to enhance the security. Meanwhile the length of the key of ECC is much shorter than that of RSA cryptography.
清单5显示了依次使用签名和加密后的请求-消息捕捉,与清单3中以粗体显示的服务器版本有着明显的不同。
Listing 5 shows a request-message capture when signing followed by encryption is used, with the significant differences from the Listing 3 signing-only version in bold.
接着,浏览器生成一个随机的128bit交换密匙,使用服务器的公共匙进行加密,并将加密后的交换密匙传递给服务器。
Next, the browser generates a random exchange 128-bit key, encrypts it using the server public key, and passes the encrypted exchange key to the server.
然而,发送到WAP网关的数据是二进制的编码格式(对wap),所以这些加密后的数据必须用TLS解密和再加密以适用于因特网。
However, the data sent to the WAP gateway is binary encoded (for WAP), so the encrypted data must be decrypted and re-encrypted using TLS for the Internet.
在加密阶段,当前输入的事件文本将存储在磁盘上,然后一个外部程序对它进行加密,加密后的文件将被读入并发送到Google服务器。
In the encryption stage, the currently entered event text will be stored on disk, an external program will encrypt it, and then the encrypted file will be read in and sent to Google's servers.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
数据在离开您的计算机之前就已经被加密,然后只有到达它预定的目标后才被解密。
The data is encrypted before it even leaves your computer, and is decrypted only once it reaches its intended destination.
然后,像所有接下来的加密消息一样,我们要确保解密后的内容没有被篡改。
Then, like all future encrypted messages, we need to make sure the decrypted contents haven't been tampered with.
文件被加密后通过你的浏览器以点对点的方式直接发送。
The files are encrypted and sent directly, peer-to-peer, through your existing web browser.
请确保解密后内容的安全,因为在通常情况下,加密消息中会包含一些敏感数据。
Make sure the contents stay secure after decryption because encrypted messages normally tend to contain sensitive data.
如果您的SOAP消息是加密的,它也能够将消息解密,并验证解密后的消息。
The tool can validate SOAP messages. If your SOAP message is encrypted, it can decrypt it and validate a decrypted message.
密钥片段发送到各节点后,会等待另一套“消失”软件的访问,以读取加密信息。
Once sitting on a node, the pieces of the key wait for another copy of the Vanish software to access them in order to read the encrypted message.
以明文方式传输消息、传输加密的但以明文方式存储的消息、或者由于密钥被窃取或通过密码分析获取后对消息进行解密,在以上几种情况下都可能发生这种攻击。
This can happen to messages being transmitted in the clear, transmitted encrypted but stored in the clear, or decryption of messages due to stolen key or cryptoanalysis.
一切就绪后,就可以修改您的设置来使用加密。
入口点把从环境得到的信息添加到原请求中的同一加密字段中,以修改后的请求作为响应。
This response is the original request to which the Entry Point now added the information deducted from it's environment in the same encrypted field.
实际使用的安全系统中,信息进行加密后,只有借助一段数字密钥才能解密密文。
For a truly secure system, the message will be encrypted in a way that requires a mathematical key to unlock it.
数据经过加密后,只有能提供密码的用户可以解密数据。
Once the data is encrypted, only users who can provide a secret password can decrypt the data.
指纹识别器、板载数据加密,以及其他基于硬件的安全功能,现在在笔记本电脑上很普遍,但智能手机和其他“后pc”设备依然有待支持。
Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.
这些细节都加密后存储在Firefox的配置数据库中。
All these details are encrypted and then stored in Firefox's profile database.
随着该被加密的信息包通过网络后,Villeneuve在一个公开的网络服务器上发现了一个文件目录。
Following this encrypted packet across the Net, Villeneuve uncovered a directory of files on an open Web server.
随着该被加密的信息包通过网络后,Villeneuve在一个公开的网络服务器上发现了一个文件目录。
Following this encrypted packet across the Net, Villeneuve uncovered a directory of files on an open Web server.
应用推荐