Security key for the RADIUS server.
RADIUS服务器的安全密钥。
You must type your security key to access this resource.
必须键入“安全密钥”才能访问该资源。
ECC is easy in security key distribution and management, but the encryption is slow.
ECC密钥分配和管理简单,却有加密速度慢的特点。
They should also consider two-part authentication, which can combine passwords with a security key with a changing code.
他们还应该考虑双重认证,用不断变化的代码将口令与安全键码结合起来。
Retrieves a security token that matches one of the security key identifier clauses contained within the specified key identifier.
检索与指定的密钥标识符中包含的安全密钥标识符子句之一相匹配的安全令牌。
To study the cryptosystem suitable to encrypt data, to implement digital signature and identify authentication on the USB Security key.
主要研究内容如下:(1)研究适于usb安全钥上实现数据加密、数字签名和身份认证功能的密码体制。
Instead, the drives automatically generate a new security key when they start up, then wipe that key as soon as they are powered down or disconnected.
取而代之的,在驱动器启动时自动产生一个新的安全密钥,而驱动器断电或终止链接时密钥就会被删除。
Gets a security key identifier clause that references this security token when this security token is included in the SOAP message in which it is referenced.
获取当此安全令牌包含在引用它的SOAP消息内时引用此安全令牌的安全密钥标识符子句。
To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.
为了便于使用,无线承载网络还支持“第二密钥”,也称作“用户安全密钥”,使用起来更加友好,但是安全性稍差。
Gets a security key identifier clause that references this security token when this security token is not included in the SOAP message in which it is referenced.
获取当此安全令牌未包含在引用它的SOAP消息内时引用此安全令牌的安全密钥标识符子句。
This paper discussed the basic technique of setting security key and produced group security key to anti-copy and dynamic reading security key to anti digital simulation.
对软件加密解密基本技术和方法分析的基础上 ,提出组合加密防拷贝 ,动态密钥读取防仿真两种方法。
In downtown Vancouver, some roads are already closed, and rings of security fencing surround some key venues.
在温哥华市中心,一些道路已经关闭,一些主要场所周围设置了安全围栏。
Contain all the key security relationships between objects.
包含对象间所有的关键安全关系。
The user supplies a secret key (password) to the security server to prove its identity.
用户向安全服务器提供一个秘密密钥(密码)来证明其身份。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
此特性让这三种关键的安全技术能够利用 ACF提供的硬件密码计算加速设施。
Miliband says delivering security is the key for the region.
米利班德说,提供安全是这个地区稳定的关键所在。
Security is key to success in regional cooperation.
安全形势好坏是区域合作成败的关键。
An application security posture questionnaire, a detailed worksheet that helps extract key information about the security posture of off-the-shelf software.
一个应用软件安全情况的调查问卷表,是一个详细的工作表,可以帮助解析出架下的安全性情况的关键信息。
Keystore is a key repository that contains EFS security information.
密钥存储库是包含EFS安全信息的密钥库。
Understanding the implications of transparent data flow is key to the security of XML-based applications.
理解透明数据流的牵涉对于基于XML的应用程序的安全性来说至关重要。
In the context of digital security, a key is a piece of data which is used to encrypt or decrypt other pieces of data.
在数字安全语境中,密钥是一段数据,用于对其他数据进行加密或解密。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One key aspect is security, which includes digital information security.
法规遵从性的一个关键方面是安全性,包括数字信息安全。
Hopefully, most readers realize that security is a key aspect of enterprise systems.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
Hopefully, you already realize that security is a key aspect of enterprise systems.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
Hopefully, you already realize that security is a key aspect of enterprise systems.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
应用推荐