Encryptor is the main object in the encryption process.
Encryptor是加密过程中的主要对象。
Each step in the encryption process is explained after the listing.
在这个清单之后,我解释了加密过程中的每一个步骤。
In cloud computing, VMM allows users to monitor and thus manage aspects of the process such as data access, data storage, encryption, addressing, topology, and workload movement.
在云计算中,VMM允许监视用户,因此可以管理数据访问、数据存储、加密、寻址、拓扑和工作负载转移等方面。
Code sections in Listing 5 demonstrated writing the text event to a file and running the encryption process.
清单5的代码表示将文本事件写到一个文件中并运行加密程序。
A mismatch in either the encryption key or key version number causes the decryption process to fail.
加密密匙或密匙版本号的不匹配会导致解密过程失败。
The encryption network interface card in this paper has surmounted two above-mentioned problems. It simplifies the information process of handling and raises the performance of entire network.
本论文的加密网卡克服了上述两个问题,它简化了信息处理过程,提高了整个网络的性能,起到了端到端的数据通信的保护。
In order to advance the security of Aeronautical Communication System, a simple and effective identity verification scheme was proposed, and the encryption was introduced in logging-on process.
为了提高航空通信系统的安全性,论文提出了一个简洁有效的身份认证方案,并在注册过程中引入加密技术。
These problems major included problems of the encryption techniques in the process of data transmission, numerical underwrite and safety in the partially component J2EE.
这些安全问题主要包括数据加密传输问题、数字签名问题和部分J2EE组件的安全问题。
Moreover, due to lack of encryption measures, IGMP messages cannot ensure their confidentiality in the communication process.
此外,IGMP报文在传输时没有加密措施,无法保证其安全性。
In the design process, system security and data integrity are ensured by user authentication and encryption respectively.
在设计过程中,通过对用户的认证与数据加密机制来确保系统的安全性与数据的完整性。
Although the encryption is, in essence, what protects your documents, it can be quickly rendered useless if the chosen password is weak, since it is used in the decryption process.
虽然加密是,在本质上,保护文档,它可以快速地变得无用,如果选择的密码是薄弱的,因为它是用在解密处理。
Although the encryption is, in essence, what protects your documents, it can be quickly rendered useless if the chosen password is weak, since it is used in the decryption process.
虽然加密是,在本质上,保护文档,它可以快速地变得无用,如果选择的密码是薄弱的,因为它是用在解密处理。
应用推荐