• 指出密钥安全保护重要地位

    This paper points out the importance of protecting the main key.

    youdao

  • 双重密钥安全认证用于验证不同系统访问保护方法之一

    Double key secure authentication is one of the protection methods used to verify access across different systems.

    youdao

  • 密码保护视频输出允许用户利用加密钥安全输出文件

    The password-protected video export allows users to safely export video files with a custom encryption key.

    youdao

  • 门限机制前向安全机制有关密钥安全保护重要思想

    Threshold mechanism and forward safety mechanism is two kinds of important method about key safekeeping of security.

    youdao

  • 提供这种服务基础设施就是公开密钥安全基础设施(PKI)。

    The infrastructure which can provide security services is called Public Key infrastructure (PKI).

    youdao

  • 椭圆曲线密码体制是目前公钥体制比特密钥安全强度最高的一种密码体制。

    Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.

    youdao

  • 基于量子物理原理的量子密码证明保密信中密钥安全分配有效手段

    Quantum cryptography, which is based on fundamental physical principles, has been proved to be an effective technique for secure key distribution.

    youdao

  • 然而基于量子物理原理的量子密码学证明保密通信中密钥安全分配有效手段

    Nevertheless, quantum cryptography, which is based on quantum physics, has been proved to be an effective technique for secure key distribution.

    youdao

  • 双重密钥安全表示用户必须通过两个系统认证-应用程序服务器(位于主管服务供应商)金融机构

    Double key secure means the user must authenticate two systems — the application server (at the hosting service provider) and the financial institution.

    youdao

  • 用户安全服务器提供一个秘密密钥密码证明身份

    The user supplies a secret key (password) to the security server to prove its identity.

    youdao

  • 这些密钥为了安全目的配置成可允许轻易地交替或者它们可能由于某种原因泄露

    These keys are configured to allow for easy rotation for security purposes or if they are compromised for any reason.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • TCS要求控制关键系统资源分配释放包括数据库记录通信套接字安全密钥等等

    The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.

    youdao

  • 秘密密钥只有用户安全服务器知道

    This secret key is known only to the user and the security server.

    youdao

  • 一旦安全服务器通过秘密密钥确认了用户身份,用户登录DCE过程完成了

    Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.

    youdao

  • 秘密密钥加密分布式系统安全机制中一重要技术

    Secret key cryptography is one of the most important technologies in distributed systems security.

    youdao

  • 注意配置密钥自动接受可能具有安全风险

    Be aware that configuring the automatic acceptance of new keys is a potential security risk.

    youdao

  • 另外要求管理员角色传统的方式访问安全信息(密码密钥文件等等)更好保护敏感数据

    In addition, the administrator role is required to access traditionally secure information (passwords, key files, etc.) to provide better protection to sensitive data.

    youdao

  • 此前用作电邮加密系统全都仰仗安全存储密钥的招数。

    Past systems designed to encrypt e-mails all relied on ways of storing their keys safely.

    youdao

  • 密钥存储包含EFS安全信息密钥库。

    Keystore is a key repository that contains EFS security information.

    youdao

  • 数字安全语境中,密钥数据用于其他数据进行加密解密

    In the context of digital security, a key is a piece of data which is used to encrypt or decrypt other pieces of data.

    youdao

  • 因此客户机来生成那种用途的密钥安全的,而且完全可以注册到XKMS服务

    Hence, keys used for such a purpose can very safely be generated by the client, and the private key may never be registered with the XKMS service.

    youdao

  • 取而代之的,驱动器启动自动产生一个新的安全密钥,而驱动器断电终止链接时密钥会被删除

    Instead, the drives automatically generate a new security key when they start up, then wipe that key as soon as they are powered down or disconnected.

    youdao

  • 虽然这些函数对于模拟程序来说帮助的(因此可以重新运行模拟程序),但是如果您使用这些函数创建安全密钥可实在是非常危险

    These functions are helpful for simulations (so you can re-run the simulation), but they are extremely dangerous if you're using them to create secret keys for security.

    youdao

  • 使用双重安全密钥创建了所有经过的交互数据路径时,才能达到安全网络体系结构。

    Secure network architecture is achieved when all interaction points and data paths traveled are created using double secure keys.

    youdao

  • 使用公用安全系统之一PKI(公用密钥基础),一种用于PDA智能电话安全性的加密技术

    One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

    youdao

  • RADIUS服务器安全密钥

    Security key for the RADIUS server.

    youdao

  • STkt请求主要目标获得一个会话密钥客户安全服务器一起使用

    The main objective of STkt request is to get a new session key for the client to use with the security server.

    youdao

  • 用于Web服务安全JCEKS密钥存储库形式安全凭据指定加密操作所需公开证书

    Security credentials for web services security in the form of JCEKS key stores or the private keys or public certificates required for the specified cryptographic operations.

    youdao

  • 导入一个LTPA导出密钥(可以使用WebSphereApplicationServer安全管理面板导出ltpa密钥)。

    Import an LTPA exported key (you can export the LTPA key using a WebSphere Application Server security management panel).

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定