The readers are protected by a lock, but the lock is a standard one, and keys can be bought on the Internet: besides, the keys circulate among election officials.
识读卡由一个锁保护,但问题是这个锁是一把标准锁,钥匙能在网上得到;除此以外,这些钥匙还在这些选举官员间串换。
Properties files are flat - they don't offer any sort of nesting or grouping of keys - but you can pseudo-nest your keys by creating dotted names with identical prefixes.
属性文件是平面文件—它们并未提供任何形式的键嵌套和分组—但是您可以通过创建具有相同前缀的带点名称来对您的键实现虚假嵌套。
Check the column keys in the tag to make sure that the column keys are realigned to match the data fields returned by the SQL query.
检查标签中的列关键字,来确认列关键字已经被重新排序,并且与SQL查询返回的数据字段相符。
No application should ever use any of the keys provided by Windows Azure as keys to encrypt data.
任何应用程序都不要使用由WindowsAzure所提供的任何密钥来加密数据。
Query performance can be improved by leveraging like data types (i.e. INT32 to INT32) when joining foreign keys in a fact table to primary keys in a dimension table.
通过在将fact表中的外键与dimension 表中的主键进行连接时采用like数据类型(例如 INT32 to INT32),可提高查询性能。
By default, Streamlined excludes special Rails fields such as foreign keys, primary keys, and timestamps, and includes the rest.
默认情况下,Streamlined排除了特殊的Rails字段,例如外键、主键、时间戳,而包含了其余字段。
The tool makes creating these keys easy by automatically providing a lookup on the valid candidate keys defined in the columns view.
该工具通过自动提供查找Columns视图中定义的有效备选键,从而很容易地创建这些键。
By asking where the location of a key is, you can differentiate between keypad and standard keys as well as left and right shift keys.
通过询问键的位置,您可以区分小键盘键、标准键以及左和右shift键。
The symmetric key itself is encrypted by one or more asymmetric keys (public keys).
这个对称密匙本身又由一个或多个非对称密匙(公共密匙)加密。
One popular post shows how you can never lose your keys again by attaching thin Lego bricks to a keyring for each set of keys.
在一张很受欢迎的贴子中,网友向大家展示了如何才能不丢钥匙:在薄的乐高积木上挂上钥匙圈,每套钥匙一个。
All API keys are authorised to register listeners for any feed, and API keys are authorised to publish updates to feeds by the feed owner.
所有的API密钥都被授权,以注册用于任何Feed的监听器,其中一些API密钥都被授权是为了让Feed的所有者发布Feed更新。
Note: String keys will be maintained, but numeric keys will be re-indexed, starting at 0 and increase by 1.
注意:默认使用字符串键,如果要使用数值键则需要重新指定,且从“0”开始以基数“1”递增。
The krsort() function sorts an array by the keys in reverse order. The values keep their original keys.
函数的作用是:对数组按照键名逆向排序,元素的键名保持不变。
The keys of the cabinets in meeting rooms and teahouse are kept by the cleaner who cleans the meeting room. The spare keys are kept by the Security Department.
会议室和茶水间橱柜的钥匙由管理会议室的阿姨保管,备用钥匙由保安部保管。
High security keys are often generated by hardware that usually helps prevent export of the keys for security reasons.
安全性高的密钥通常由硬件生成,出于安全考虑,硬件通常禁止导出这些密钥。
You can enhance the usability and readability of your menus by adding access keys, shortcut keys, check marks, images, and separator bars.
您可以通过添加访问键、快捷键、选中标记、图像和分隔条,来增强菜单的可用性和可读性。
In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.
换言之,可以同时使用多个证书、密码、对称密钥以及非对称密钥对单个对称密钥进行加密。
Developers using DES can improve security by changing the keys frequently, using temporary session keys, or using triple encryption DES.
使用DES的开发人员可以通过频繁更改钥匙、使用临时的会话钥匙或使用三重加密des来提高安全性。
Method Samples of manipulated keys and keys that used as guide in a duplication process are made. Marks and striations on the keys are photographed and analyzed by light microscopy.
方法制作内凹齿钥匙正常开锁和被钥匙机复制后的样本,用光学显微镜拍照固定痕迹特征。
Note: If the keys are numeric, all elements will get new keys, starting from 0 and increases by 1. (See example 2).
注意:如果每个元素对应的键是数值型,那么剩下的元素将重新获得新的数值键,且从0开始以基数1递增(见案例2)。
But the validity of the sub-signatures generated by sub private keys in threshold signature environment can't be verified in this way because there are not public keys for the sub private keys.
但在门限签名环境中,因为私钥片段没有对应的公钥,所以由这些私钥片段所产生的部分签名无法通过相应公钥进行验证以判断其真实性。
But the validity of the sub-signatures generated by sub private keys in threshold signature environment can't be verified in this way because there are not public keys for the sub private keys.
但在门限签名环境中,因为私钥片段没有对应的公钥,所以由这些私钥片段所产生的部分签名无法通过相应公钥进行验证以判断其真实性。
应用推荐