• You have not chosen an encryption key.

    没有选择一个加密密钥

    youdao

  • Lets you provide an encryption of the stored user IDs and passwords.

    使能够存储用户ID密码进行加密

    youdao

  • How to use a random number as an encryption key in XML messages?

    如何XML消息使用随机数作为加密密钥

    youdao

  • Forget to create an encryption key and things are going to get dicey.

    要是忘了创建加密密钥事情危险了。

    youdao

  • Applies an encryption policy to perform standard XML encryption of the incoming message.

    应用加密策略传入消息执行标准xml加密。

    youdao

  • Each INTEGER in the SEQUENCE specifies an encryption algorithm that the client supports.

    SEQUENCE中的每个INTEGER指定客户机支持一种加密算法

    youdao

  • Many websites allow you to protect your personal videos with an encryption or a password.

    或者请人帮忙做一张很煽情的视频录像作为礼物邮寄给她。 贴士,很多网站提供视频制作服务,并且电脑加密形式保障视频的安全。

    youdao

  • If you're looking for an encryption library, Recommended two-way encryption gems for Ruby?

    如果正在寻找一个加密建议双向加密红宝石宝石吗?

    youdao

  • Users can also use the set encryption password statement to set an encryption password for a session.

    用户可以使用SETENCRYPTIONpassword语句会话设置加密密码

    youdao

  • This paper presents an encryption engine composed of a single chip processor and a dual port RAM.

    本文论述一个单片机端口存储器构成加密阐述了加密机的工作原理和操作流程。

    youdao

  • Then an encryption algorithm based on chaos has been proposed and a file-encryption system is developed.

    基于混沌加密算法应用到数字图像加密中。

    youdao

  • Using an encryption scheme will prevent exposing a user's password if the database ever becomes compromised.

    如果数据库暴露了,那么使用加密方案防止暴露用户密码

    youdao

  • So, , if the satellite were to encode an encryption key in that quantum state, any interception would be obvious.

    因此如果颗卫星量子中加密秘的话,任何拦截显而易见无意义的。

    youdao

  • In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan.

    为了增强水印信号安全性采用基于混沌平面的水印加密算法。

    youdao

  • "Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."

    盗版者无限时间资源Ishikawa,“无法建立一个不能被破解的加密技术。”

    youdao

  • Use this page to create an encryption key. It is recommended that you back up the encryption key after you create it.

    使用页面创建加密建议在创建加密键对其进行备份

    youdao

  • On the following three panels, you are prompted to choose an encryption key, operating system support, and operating system.

    接下来三个面板中需要选择一个加密密操作系统支持以及操作系统。

    youdao

  • If an encryption key is created with this option, the encryption key is stored on the agent disk with password protection.

    如果密密创建时带有这个选项,那么它存储密码保护代理磁盘上

    youdao

  • This algorithm applies to document kind document encryption not only, can carry out an encryption on image kind document.

    这个算法不仅适用文档文件加密,还可以图像类文件进行加密。

    youdao

  • Once you generate the key, you can use the AbderaSecurity class to get an Encryption object and feed it the key you just created.

    生成密钥之后,便可以使用AbderaSecurity获得一个Encryption对象创建密钥提供

    youdao

  • After backing out of the menu, an encryption key can be selected by moving the trackball and typing characters on the keyboard.

    退回菜单通过移动轨迹球或输入键盘上字母选择一个密钥

    youdao

  • Unless you are using an encryption device (hardware or software), you should assume that email over the Internet is not secure.

    除非加密软件硬件不然所有的电子邮件不是安全的。

    youdao

  • One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

    使用公用安全性系统之一PKI(公用密钥基础),一种用于PDA智能电话安全性的加密技术

    youdao

  • And who wants to run off to a third party website and run a dozen email addresses through an encryption algorithm one at a time? Not me.

    而且谁会希望一个第三网站上通过加密算法同时运行12email帐号,可不想那样。

    youdao

  • This paper discusses and curry out an encryption algorithm based on one-dimensional chaotic map, which have good security and practicability.

    本文设计了基于混沌理论单表置换加密方法的一维混沌表加密算法

    youdao

  • Using the technologies of DNA synthesis, DNA clone, PCR and DNA chip and the theory of computational complexity, an encryption scheme is formed.

    利用DNA合成技术、DNA克隆技术、PCR扩增技术以及DNA芯片技术,结合密码学计算复杂度理论,提出了一种基于DNA技术的加密方法。

    youdao

  • If you build an encryption algorithm around a function's easy direction, anyone wanting to break your encryption needs to work at it from the hard side.

    如果围绕某个函数简单方向构造加密算法,那么破解加密的任何人需要从相反的方向来解密。

    youdao

  • If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.

    如果加密解密操作成功地使用密钥,那么必定在操作某个部分使用了密钥中的

    youdao

  • They don't cover secure server communication explicitly but give some hints about it and provide an encryption library to simplify any encryption tasks.

    他们包括安全服务器通信明确一些提示提供了一个加密简化任何加密任务

    youdao

  • They don't cover secure server communication explicitly but give some hints about it and provide an encryption library to simplify any encryption tasks.

    他们包括安全服务器通信明确一些提示提供了一个加密简化任何加密任务

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定