• The user supplies a secret key (password) to the security server to prove its identity.

    用户安全服务器提供一个秘密密钥密码证明身份

    youdao

  • Same secret key is used to encrypt and decrypt the messages exchanged among them.

    使用同一个秘密密钥加密解密它们之间交换消息

    youdao

  • For secret keys, some reasonable factors are key version number and the time the key was added to the key table.

    对于密钥一些合理因素密钥版本密钥添加密钥中的时间

    youdao

  • This secret key is known only to the user and the security server.

    秘密密钥只有用户安全服务器知道

    youdao

  • Although DCE is currently based on secret key system, further in the article we will come to know how DCE exploits these techniques and augments them to provide a much more secured environment.

    尽管DCE目前基于秘密密钥系统,但本文后面介绍DCE如何利用扩展这些技术,以提供一种更为安全环境

    youdao

  • The keylogin command then passes on the decrypted secret key to the local keyserver daemon, which stores the decrypted secret key with itself until the user runs a Secure RPC transaction.

    keylogin命令然后将经过解密机密密钥传递给本地keyserver守护进程,守护进程将这个解密的机密密钥存储在其中,直到用户运行安全RPC事务

    youdao

  • Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.

    Kerberos定义了用户密码进行处理生成一个密钥算法

    youdao

  • The sample code generates a new secret key and uses it to encrypt and decrypt data.

    这个样本代码将生成一个新的使用数据进行加密解密

    youdao

  • The context acceptor, on the other hand, requires its secret key to decrypt the service ticket received from the initiator, thus authenticating the initiator.

    一方面,上下文接受者需要密钥解密来自发起者服务票证通过这种方式认证发起者。

    youdao

  • The eighth step during our secret key generation process is to check whether the byte array after parity fixing turns out to be a weak key.

    我们密钥生成过程第八检查奇偶修正字节数组是否是一个的密钥。

    youdao

  • There's no need for the server to send the secret key back to the client, because the client already has it available.

    服务器需要保密密钥发送客户因为客户端已经拥有这个保密密钥。

    youdao

  • The alternative is symmetric encryption, but with symmetric encryption you must have a secret key known only to the parties involved in a message exchange.

    另外一种方法对称加密但是使用对称加密时,必须拥有只有参与消息交换各方知道密钥。

    youdao

  • To reach the intended client, this response message is encrypted using the client secret key.

    为了传送期望客户响应消息使用客户端秘密密钥进行加密。

    youdao

  • A service principal, on the other hand, requires just its secret key to accept GSSAPI contexts.

    一方面,一个服务主体要求接受GSSAPI上下文密钥

    youdao

  • I will now use the temporary secret key to encrypt the original padded byte array from Step 3 using the DES-CBC algorithm.

    现在使用这个临时密钥des -cbc算法加密第3中得到附加后的字节数组

    youdao

  • This element's content gives a secret key in encrypted form, using the server's public key to do the encryption.

    这个元素内容提供了一个加密了的秘密密匙,使用服务器公开执行加密

    youdao

  • In this case, a sender might encrypt the message using the receiver's public key, but only the receiver has the secret key that is used to decrypt the message.

    这种情况下发送方可能会使用接收公钥消息加密但是只有接收方拥有用于对消息解密

    youdao

  • One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).

    演示安全已授权应用一种方式,添加采用相关联密钥来自占有证据令牌)的数字签名

    youdao

  • An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.

    对称密钥(公钥)算法用于交换对称算法中使用加密密钥以及用于数字签名

    youdao

  • When you want to connect securely to a remote system, first open the PPK file that contains the secret part of the SSH key.

    安全地连接远程系统时,首先打开包含SSH密钥秘密部分PPK文件

    youdao

  • After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.

    身份验证之后SSL真正使用保密密钥加密保护通道细节讨论无关。

    youdao

  • The accounts department will need to decrypt the payment information in the purchase order using a pre-exchanged secret key.

    会计部门使用一个预先交换的钥对采购订单中的支付信息解密

    youdao

  • In case the secret link ever gets into the wrong hands, you can simply change the key phrase in order to restore privacy.

    安全链接到了错误人手上情况下,简单地改变密钥恢复隐私。

    youdao

  • When you use super encryption, you can encrypt just the payment information with the accounts department's secret key to produce an element-encrypted XML file.

    使用超级加密可以会计部门加密支付信息产生元素加密的XML文件。

    youdao

  • A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.

    对称算法要求消息发送方接收方使用同一个通常被称作秘钥密码术

    youdao

  • The second party USES this public key to encrypt its secret key.

    一方使用这个公钥加密

    youdao

  • Network part contains the information required to acquire tickets and other services (e.g. it includes the principals secret key).

    网络部分包含获取票证其他服务所需信息(比如包含主体秘密密钥)。

    youdao

  • The public key is known to everyone while the private key is kept secret.

    所有人都知道公钥秘密的。

    youdao

  • Create a public and secret key for userone and add it to the publickey database.

    userone创建公钥机密密钥,并将添加publickey数据库中。

    youdao

  • Create a public and secret key for userone and add it to the publickey database.

    userone创建公钥机密密钥,并将添加publickey数据库中。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定