从美国出口这项加密技术在目前是违法的。
It is currently illegal to export this encryption technology from the U.S.
新的ltpa令牌使用以下强加密技术。
The new LTPA token USES the following strong cryptographic techniques.
要更好地利用加密技术,用户还应该再使用ESP。
For the added benefit of encryption, users should additionally use ESP.
所以通常,这两个都是,加密技术的例子。
So in general, both of these are examples of what we call secret key crypto.
从美国出口这种加密技术在当前是违法的。
It is currently illegal to export this encryption technology from the US.
需要用某种形式的加密技术保护数据的机密性和完整性。
Some form of encryption is needed to protect confidentiality and integrity of data.
而加密技术则是网络安全技术中的核心技术。
And encryption technology is the core technology of the network security technology.
2009年已有数据库加密技术的专利发明出现。
In 2009, there was a patent invention of database encryption technology.
为了迎接这样的挑战,提出了各种各样的加密技术。
To meet this challenge, a variety of cryptographic techniques have been proposed.
如果有一种理想的加密技术,将会有很多法律障碍来限制它的使用。
If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
作为希腊的词根资产,加密技术是一种“神秘编写”艺术。
Cryptography is the art of "secret writing," as the word's Greek roots attest.
可以利用加密技术来使Web服务请求和响应中交换的信息不可读。
Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.
可用各种方式组合这些机制,以便用各种加密技术建立各种安全模型。
These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.
论述和分析了加密技术及其在电子商务安全方面的应用现状。
The paper discusses and analyses Cryptography technology and its application in e-commerce security.
它具有高度定向能力,功耗低,采用加密技术适合秘密全频谱应急行动。
Highly directional, it USES low power and is encrypted for covert full-spectrum contingency operations.
把这种技术与直接加密技术结合使用,所有的问题就迎刃而解了。
Combine that with straight out encryption and all of your problems are solved.
非对称加密技术是一种新的加密技术,数字签名是其最重要的应用。
A symmetric cryptography is a new cryptography. Digital signature is the most important application of asymmetric cryptography.
Harris公司的Sierra II加密技术为信息安全水平奠定了基础。
The Harris Sierra II? encryption technology provides the foundation for this level of information security.
但在这一阶段,逐渐有国内科研人员开始进行数据库加密技术的研究。
But at this stage, the domestic researchers began to study the database encryption technology.
例如,对核心层的加密技术的更改要求对加密控制进行更改,反之亦然。
For instance, changes to cryptography in the core layer require changes to the cryptographic controls, and vice versa.
本论文结合某财政管理系统,对数据库加密技术及其应用进行了研究探讨。
In this dissertation, we conduct research and probing on database encryption technology and its application according to some Financial Management System.
作为一个新生,他很快就熟悉了Boneh教授布置的挑战,即解决同态加密技术的难题。
As a new student he quickly picked up on the challenge laid out by Boneh to tackle the problem of homomorphic encryption.
最后,策略规范可能要求加密订单的某些要素,指示要使用的加密技术、要使用的证书等等。
Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.
在以色列的案例中,安全和加密技术一直是他们的强项,但这不是像它过去一样是个增长行业。
In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.
一个剑桥大学的教授设想和提出一个小装置,利用光学和加密技术,以取代所有的密码。
A University of Cambridge professor has envisioned and presented on the idea of a small device that USES optics and cryptography to replace all passwords.
在EFF这份名叫“如何防止失去位置隐私”的报告中,使用加密技术来保证匿名是非常简单的。
According to the report "on Locational Privacy, and How to Avoid Losing it Forever", it's fairly easy to use cryptographic techniques to ensure your anonymity.
置换密码是一种简单的加密技术,采用这项技术将把字母表中的每个字母替换为字母表中的其他字母。
A substitution cypher is a simple encryption technique where every letter of the alphabet is substituted with another letter from the alphabet.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
应用推荐