• For example, the IP address specified in a trusted context object might be incorrect, or your network encryption attributes may not be strong enough to be accepted by the trusted context.

    例如可信上下文对象指定IP地址可能不正确或者可信上下文不能接受网络加密属性级别。

    youdao

  • Though symmetric keys have their disadvantages (primary among them being how to pass them among the trusted parties), the major advantage they offer is speed of encryption and decryption.

    尽管对称密钥自身缺陷主要如何互信双方之间传递),它们最大的优点加密解密速度快

    youdao

  • Using a Digital certificate (Digital id) from a trusted certificate authority in conjunction with SSL encryption provides a very high grade of security for all parties involved in a transaction.

    使用发自可信证书授权中心数字证书(数字id),连同ssl加密,可交易中的各方提供高等级安全保障

    youdao

  • When an SSL-protected page is requested, the browser identifies the server as a trusted entity and initiates a handshake to pass encryption key information back and forth.

    请求SSL 保护的页面时,浏览器认为服务器可信任实体,并且启用一个连接来回传递加密信息

    youdao

  • Some players cannot be trusted, and worse, they have complete access to the encryption algorithm and all communications via the client executable.

    有些玩家不可信的,糟的是,他们能够通过客户端执行文件获取加密算法所有通信的了解。

    youdao

  • A new fair exchange protocol with semi-trusted third party is proposed on the basis of a new convertible authenticated encryption scheme.

    基于可转换认证加密方法,设计出一种新的包含半可信第三公平交换协议

    youdao

  • A new fair exchange protocol with semi-trusted third party is proposed on the basis of a new convertible authenticated encryption scheme.

    基于可转换认证加密方法,设计出一种新的包含半可信第三公平交换协议

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定