The key ring is a common key ring.
钥匙环为普通钥匙环。
The tables are joined over a common key column (ID).
这两个表通过一个共同的键列(ID)进行联结。
This key is the same as the common key generated by the client.
这个密钥与由客户端所生成的通用密钥相同。
In addition, a receiver "s public key encrypts the common key."
另外,接收方的公钥加密共同密钥。
The visualization of complex terrain is a common key issue among these applications.
这些应用中一个共同的核心问题就是复杂地形的地形地貌可视化的问题。
The conversation key is encrypted using the common key, which has been generated above.
对话密钥使用前面已经生成的通用密钥来进行加密。
After generating a common key, the keyserver program randomly generates a conversation key.
在生成通用密钥之后,keyserver程序将随机生成一个对话密钥。
The processes for key creating and managing in radar network are given based on common key encryption method.
用户控制权管理方面,本文根据项目实践经验,给出一种高效的用户控制权管理结构及方式。
With extended indicator support, a single program can be used for all incoming update transactions against a single table based on a common key.
使用扩展指示符支持,单个程序可以基于一个公共键用于单个表的所有更新事务。
Then the server generates a common key using its secret key and client public key by following the same procedure as was followed by the client.
然后,服务器使用它的机密密钥和客户端公钥,通过执行与客户端相同的过程,生成一个通用密钥。
However, in many cases, an entity of importance is a subset of a record, or spans several tables and requires data to be joined through a common key.
但是,在很多情况下,重要的实体是一个记录的一个子集,或者跨多个表,需要通过公共键链接数据。
In the papar, it changes its"buckle"structurt on the basis of common key switch, achieves automatic locking function and does not increase the cost.
多位组合式按键开关被广泛应用于各种家用电器,本课题在普通按键开关的基础上,改变其“扣板”的结构,实现了自动锁定功能,且不需增加成本。
Before delving further into the database roles and the related XML needs, let's pause to first describe a few of the common key XML responsibilities that surface when XML data is part of the database.
在更深入挖掘数据库角色及相关XML需求之前,我们首先停下来,描述一些当XML数据成为数据库一部分的时候,所浮现出的常见的关键xml职责。
The key word in the Common Application prompts is "you".
通用申请表提示中的关键词是“你”。
It is also the key to understanding the thoughts and feelings that common people have, which may be hard to express.
它也是理解普通人难以表达的想法和感受的关键。
For this purpose, I recommend using a common private key and the corresponding public key certificate for SOAP-DSIG and SSL.
为实现这一目的,我建议在SOAP -DSIG和SSL中使用一个公共专用密钥和相应的公用密钥证书。
To make such decisions, you must identify the common workloads and key processes that take place in your business environment, and collect best practices.
要做出这类决策,您必须确定会在您的业务环境中发生的常见工作负载和关键流程,并收集最佳实践。
Much of what scientists know about dopamine's role in habit formation comes from the study of alcohol and drug addiction, but it is a key player in more common habits, too, like overeating.
许多科学家是研究酒瘾和毒瘾后,才了解多巴胺在形成习惯过程中的作用,但多巴胺在其他较普通行为中,也是关键因素,象暴饮暴食。
For all the reasons that have already been discussed, having a centralized, common, well-understood process is key to realizing economies of scale and eliminating waste.
基于上面所讨论到的所有原因,拥有一个集中的、共同的、理解良好的处理过程,是实现经济实惠和消除浪费的关键。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
Entities that share some attributes, including an identifier (primary key), but not others may be modelled as having a common supertype.
一些实体具有某些共同的属性,比如标识符(主键),而其他属性不同,这些实体可能具有共同的超类型。
One common technique for authentication is to use physical tokens, such as a key, a credit card, or a smart card.
认证的一种常用技术是使用物理标记,例如钥匙、信用卡或智能卡。
The most common RPG method for performing a random read using a key is the CHAIN operation.
使用键执行随机读操作的最常见rpg方法是CHAIN操作。
However, 50 percent of people choose a common word or simple key combination for their password. The most used passwords are 123456, password, 12345678, qwerty and abc123.
然而,目前还是有一半的人只用一个普通字母或者简单的字母组合作为密码,而最常用的密码便是123456,password(密码),12345678,qwerty(键盘)以及abc123。
The OpenUP family of processes aims at addressing a broad variety of project types while sharing a set of common characteristics. These are the key principles behind OpenUP
OpenUP过程产品家族的目标定位于具有一套共同特点的各种各样的项目类型。
As you move toward implementing data as a service, effective information metadata management and use of Common information Model (CIM) is a key critical success factor.
随着你将数据实现为服务,有效的信息元数据管理与公用信息模型(Common Information Model,CIM)的运用是成功的一个关键因素。
A common practice is to use the private key of the sender's X.509 certificate to digitally sign the SOAP body of a web service request.
一个常用的实践方法是使用发送方的X . 509证书的私钥对Web服务请求的SOAPBody进行数字签名。
A common practice is to use the private key of the sender's X.509 certificate to digitally sign the SOAP body of a web service request.
一个常用的实践方法是使用发送方的X . 509证书的私钥对Web服务请求的SOAPBody进行数字签名。
应用推荐