• Design principles, such as code auditing, extensive use of encryption, and careful configuration choices, combine to ensure that OpenBSD's secure-by-default philosophy holds true.

    代码审计加密广泛应用谨慎配置选择设计原则共同确保了OpenBSD“默认即安全”原则仍然有效。

    youdao

  • This version of SQL Server has built-in encryption/decryption so you do not need to modify your application code.

    这个SQLServer版本建有加密/解密这样不用修改应用代码

    youdao

  • Design principles, such as code auditing, extensive use of encryption, and careful configuration choices, combine to ensure OpenBSD's secure by default philosophy holds true.

    其中一些设计原则代码审核加密处理广泛使用以及仔细配置选择它们组合在一起可以确保实现OpenBSD缺省安全思想

    youdao

  • The implementation of XML encryption used in the sample code accompanying this article only recognizes the Triple-DES algorithm for content encryption.

    本文所附示例代码中的xml加密实现内容加密只能识别Triple - des算法

    youdao

  • The fundamental principles and methods of data encryption based on Complex-Rotary Code are presented.

    本文提出了利用复数旋转进行数据加密基本原理方法

    youdao

  • AES is a safety code for the use of information encryption standards.

    AES一种使用安全进行信息加密标准

    youdao

  • Not changing the Video Conference protocols in existence, we embed a good encryption algorithm (Permutation Code) in the system to safeguard the information of Multimedia.

    改变现有协议前提下嵌入性能良好加密解密算法排列算法)保障信息安全

    youdao

  • Optimized after some VC++ encryption and decryption algorithm to generate encryption types of documents, and then can call the code a couple of years ago, but still very useful.

    一些经过优化VC++加密解密算法生成加密文件然后可以调用代码现在仍然有用

    youdao

  • "Encryption" is the process of scrambling data using a kind of code known only to the software doing the coding, so that anyone accessing the private data is unable to read it.

    加密采用加扰数据类型代码知道软件编码任何人访问私人数据是无法读取如此过程

    youdao

  • Then supplies realization of Encryption Chip based on Permutation Code by EDA, and integrates the modular of signal gathering so the chip can be used in voice communication encryption.

    通过EDA设计技术实现排列加密算法,加密芯片中集成信号采集模块可以使芯片应用语音通讯加密当中。

    youdao

  • Also, this paper describes the main control unit and the whole design of the system, and analyzes the encryption principle of the code hopping encoder adopted by this system.

    描述了系统主控单元选择系统整体设计分析了系统所采用滚动编码加密原理对滚动编码与固定编码的安全性作了比较。

    youdao

  • Simply 'cut and paste' the lines of code from the sample application provided and you can have the most powerful PGP encryption working in your applications in just a few minutes.

    简单'剪切粘贴'代码采样应用提供了可以拥有强大的pgp加密工作应用程序在短短分钟的时间。

    youdao

  • The encryption and digital signature solve the problem in integrity and confidentiality of active code. The application of decode-binding realizes the scalability in systematic encryption methods.

    加密数字签名解决主动代码完整性机密问题这里使用解码绑定方式实现了系统加密方法可扩展

    youdao

  • Yi language codes of the original registration code encryption ~ hope we useful!

    说明:语言机器码注册码,加密后的~希望大家有用

    youdao

  • Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it.

    接收者利用发送者公开密钥他们自己的秘密密钥结合解开该报文秘密编码解密之。

    youdao

  • A code for encryption, AES, BLUEFISH a very wide variety of encryption algorithms.

    一个加密代码有aes,BLUEFISH多种加密算法

    youdao

  • The hopping code technology is an encryption and decryption technique that data transfer is of high security, and the hopping code mechanism makes each transmission unique.

    滚动技术一种使数据传输具有极高保密性解密技术每次传输代码都是唯一的。

    youdao

  • It is shown that a multiple encryption system consisting of encrypted instructions, encrypted locations and encrypted labels can be implemented by such a code without difficulty.

    研究表明这种码字可以方便地实现密令、密位或密组成多层保密系统

    youdao

  • The easiest way here is to encrypt on the device and then decrypted, the origin of the code is a related example of the U disk data encryption to protect information hiding, to prevent privacy leaks.

    这里简单方法就是设备加密然后再解密源代码就是一个与此相关例子对U数据加密保护信息隐蔽防止隐私泄露。

    youdao

  • ASCII code for a total of 256 is 2 to the 8th power, accounting for 8-bit binary, this binary consists of two eight parts, each accounting for 4-bit encryption.

    因为ASCII共有256个也就是28次方8二进制,把位二进制分为部分部分占4位进行加密

    youdao

  • ASCII code for a total of 256 is 2 to the 8th power, accounting for 8-bit binary, this binary consists of two eight parts, each accounting for 4-bit encryption.

    因为ASCII共有256个也就是28次方8二进制,把位二进制分为部分部分占4位进行加密

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定