• A novel public key encryption scheme with multiple private keys is presented.

    提出一种新的具有多个私钥的加密方法

    youdao

  • The RSA algorithm based on the number theory is one of the public key encryption.

    RSA算法基于数论公开密钥密码体制

    youdao

  • Therefore, in essence, it is like being encrypted with the equivalent of a 168-key encryption.

    这样,本质就相当于个长168位密钥进行加密。

    youdao

  • However, its weak key encryption caused some hacker software easily to get the database password.

    但是由于数据库加密机制非常简单,很容易破解数据库密码,安全性

    youdao

  • To create the public or private key, you need to use ssh-keygen, specifying the type of key encryption.

    创建公钥需要使用ssh-keygen指定密钥加密类型

    youdao

  • In the grown-up world, you solve these problems through the use of public key-private key encryption.

    成年人世界里可以通过使用公钥—私钥加密来解决此类问题

    youdao

  • See Resources for links to more information on digital certificates and public-key encryption in general.

    参见参考资料 获得有关数字证书公开密匙加密的更多信息链接

    youdao

  • As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.

    作为现在流行采用密钥加密解密算法,无非分为对称密钥和非对称密钥两种类型。

    youdao

  • Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.

    公钥加密密钥分布问题钥系统中一直是一个薄弱环节

    youdao

  • Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest.

    使用名称对程序进行签名包含程序集清单文件添加公钥加密

    youdao

  • With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.

    对于PGP其他公钥加密方法存在公钥推断某人方法

    youdao

  • A public key tracing and revocation scheme can combine the public key encryption with the traitor tracing algorithm.

    公钥加密算法追踪算法结合在一起,构成个公钥广播加密方案

    youdao

  • Default_tkt_enctypes: This field identifies the list of session key encryption types that will be requested by the client.

    default_tkt_enctypes:这个字段指定客户机请求会话密匙加密类型列表

    youdao

  • To evaluate the IND-CCA2 security of public key encryption schemes, proposed the gray-box analysis of IND-CCA2 security.

    为了更简单准确地判断公钥加密方案IND-CCA2安全性提出了IND-CCA2安全性的灰盒分析法

    youdao

  • Public-key encryption solves the problem of managing several keys, but encryption is slow compared to conventional encryption.

    公开钥匙加密法解决管理几个钥匙问题但是与常规加密相比,公开钥匙加密慢些

    youdao

  • Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.

    很多基本上系统加密软件包采用加密,传送秘密会话密钥

    youdao

  • Most corporations do not need the level of email security provided by PGP or built-in public key encryption in most email systems.

    大多数企业大多数电子邮件系统需要PGP内置加密提供的电子邮件安全级别

    youdao

  • If you are using more advanced techniques (like public key encryption) you'll probably need to brush up on your math a little more.

    如果使用的是先进技术(公共密钥加密)可能需要温习数学一点。

    youdao

  • Like urban public transport as IC CARDS, these CARDS to the public transport system, each card key encryption to have control of the factory.

    就象城市公共交通IC一样,这些卡在交给公交系统使用前,每张密钥进行出厂加密控制

    youdao

  • The problem was a famous one in the fieldit had been proposed in the late 1970s by developers of the famous RSA public key encryption scheme.

    密码学领域一个有名难题--20世纪70年代著名RSA公钥加密方案开发人员提出的。

    youdao

  • This scheme used of symmetry encryption and public key encryption which provided secured storage for sensitive data and effective key management.

    综合运用对称加密算法公钥算法,既保证敏感信息存储安全又密钥提供安全高效的管理。

    youdao

  • After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.

    身份验证之后SSL真正使用保密密钥加密保护通道细节讨论无关。

    youdao

  • This paper introduces the routine encryption of computer information and the publicity key encryption mainly, and compares the both and their environment.

    本文主要介绍计算机信息常规加密技术公开密钥加密技术,对两者的优缺点和应用环境作了比较

    youdao

  • BOINC protects against several types of attacks. For example, digital signatures based on public-key encryption protect against the distribution of viruses.

    BOINC能防止各种类型攻击例如,使用基于公共钥匙加密技术数字签名来防范病毒传播。

    youdao

  • Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.

    步骤4:利用数据加密密钥个密钥加密密钥、与这两个密钥相关联算法以及将来包含输出信息中的密钥信息,根据它们创建一个Encryptor对象

    youdao

  • EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.

    EKE协议基于口令密钥交换协议通过使用对称密钥加密体制公钥加密体制,能够很好地抵抗离线字典攻击

    youdao

  • This paper puts forward a new random key encryption algorithm and a new compression algorithm, and gives the strict mathematical certification for this encryption algorithm.

    提出随机公开密钥加密算法一个压缩算法,给出这个加密算法严格数学证明

    youdao

  • This paper puts forward a new random key encryption algorithm and a new compression algorithm, and gives the strict mathematical certification for this encryption algorithm.

    提出随机公开密钥加密算法一个压缩算法,给出这个加密算法严格数学证明

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定