• To safely persist a private key, use a secure key container.

    安全地保存请使用安全密钥容器

    youdao

  • The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.

    数据使用对称密钥算法进行加密,它使用一个密钥来实现对数据的加密解密

    youdao

  • The backed-up files were encrypted with a cryptographically-secure key, the only copy of which was on the machine that was lost.

    我们使用加密安全密钥备份文件进行了加密,而密钥位于丢失数据的计算机

    youdao

  • You have a problem of how to avoid initially sending the single secure key from the LDAP server to the LDAP client in plain text.

    我们还有一个问题如何防止出现正文文本格式将密钥LDAP服务器发送 LDAP客户机上的情况。

    youdao

  • Nevertheless, quantum cryptography, which is based on quantum physics, has been proved to be an effective technique for secure key distribution.

    然而基于量子物理原理的量子密码学证明保密通信中密钥安全分配有效手段

    youdao

  • Quantum cryptography, which is based on fundamental physical principles, has been proved to be an effective technique for secure key distribution.

    基于量子物理原理的量子密码证明保密信中密钥安全分配有效手段

    youdao

  • Encrypted key exchange protocol's goal is to establish a high secure key used for further encryption and authentication through a low secure password.

    密钥加密协议目的利用安全性口令协商安全性密钥进而利用密钥以后的通信进行加密身份认证,从而实现安全通信。

    youdao

  • How to protect the initiator identifier during the secure key negotiation based on the analysis of IKE is discussed, and the concrete implementation is given.

    IKE进行分析基础讨论了怎样安全密钥协商过程中发起者身份进行保护给出具体实施步骤。

    youdao

  • In this paper, we propose a perfectly-secure key distribution scheme for multicasting and prove a lower bound on the size of the user's piece of information in such a scheme.

    本文提出个多站点传送密钥分发方案,给出了在一个完全保密方案中用户信息集合大小下界并且构造了一个达到该下界的应用方案。

    youdao

  • The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers.

    这个量子密钥传输协议通信节点控制中心之间通过多个GHZ构建安全的密码分配系统

    youdao

  • It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key.

    现代密码学认为任何加密体系加密解密算法可以公开安全性在于密钥的保密性。

    youdao

  • Double key secure authentication is one of the protection methods used to verify access across different systems.

    双重密钥安全认证用于验证不同系统访问保护方法之一

    youdao

  • Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.

    使用强大的算法密钥所有数据都进行单向加密意味着的数据非常安全但是使用时很方便

    youdao

  • These replacement operators are the key to secure database access.

    这些替换操作符安全数据库访问关键

    youdao

  • Normally, you have to enter this passphrase every time you want to connect to any remote cloud instance that USES the key, but there is a secure way to avoid this annoyance: Employ an SSH agent.

    通常每次连接使用密钥任何程云实例时,都必须输入这个密码但是一种安全方法可以避免这种麻烦使用SSH代理

    youdao

  • Thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.

    因此必须建立健壮身份管理过程实现身份验证授权,这成功实现安全的软件解决方案的关键因素之一

    youdao

  • You need to make sure people are using it and that the key stores are secure.

    需要确保人们准备使用并且关键存储安全的。

    youdao

  • For a truly secure system, the message will be encrypted in a way that requires a mathematical key to unlock it.

    实际使用的安全系统中,信息进行加密后,只有借助一段数字密钥才能解密密文。

    youdao

  • In addition, the administrator role is required to access traditionally secure information (passwords, key files, etc.) to provide better protection to sensitive data.

    另外要求管理员角色传统的方式访问安全信息(密码密钥文件等等)更好保护敏感数据

    youdao

  • To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.

    为了便于使用无线承载网络支持第二密钥”,称作“用户安全密钥”,使用起来更加友好,但是安全性稍

    youdao

  • After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.

    身份验证之后SSL真正使用保密密钥加密保护通道细节讨论无关。

    youdao

  • A secure connection is now established, and communication for the rest of the session is encrypted using the secret key.

    现在建立了一个安全连接会话其余部分通信加密的。

    youdao

  • This article covers the basics of working with images, starting and stopping instances of those images, and the key pairs and security groups that let you secure the instances.

    本文介绍关于使用映像启动停止映像实例保护映像实例密匙对和安全基础知识。

    youdao

  • For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.

    数字签署大型文件首先使用这些算法一种安全的方式压缩(计算固定长度的哈希码)文件,然后私钥签署

    youdao

  • Double key secure means the user must authenticate two systems — the application server (at the hosting service provider) and the financial institution.

    双重密钥安全表示用户必须通过两个系统认证-应用程序服务器(位于主管服务供应商)金融机构。

    youdao

  • Each Digital Realty Trust Turn-Key Datacentre facility is physically secure and features a state-of-the-art power and cooling architecture that has been optimized for green operation.

    每个数字房地产信托交钥匙数据中心的设施物理上安全的,装备为绿色节能优化最先进的电源散热架构

    youdao

  • Keylogin then prompts the user for the Secure RPC password and then decrypts the secret key of that user.

    然后keylogin提示用户输入安全RPC密码然后解密用户机密密钥

    youdao

  • The server must accept the client's Secure Shell (SSH) public key.

    服务器必须接受客户SecureShell (SSH)的公共密钥。

    youdao

  • The server must accept the client's Secure Shell (SSH) public key.

    服务器必须接受客户SecureShell (SSH)的公共密钥。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定