肯尼迪博士说,解开密码的关键是来自于希腊音阶的12个音符,他所提到的曾在毕达哥拉斯的追随者之间流行。
Dr Kennedy said the key to unlocking the code came from the 12 notes of the Greek musical scale, which he said was popular among followers of Pythagoras.
这里需要注意的关键内容是用于存放用户名和密码的可能来源的线程本地存储声明和实例变量。
Key things to note here are the thread local storage declarations and the instance variables used to hold the potential source of the username and password.
此特性让这三种关键的安全技术能够利用 ACF提供的硬件密码计算加速设施。
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie,加密状态及认证密码等关键信息。
Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.
关键要记住的一点是如果使用密码,您必须确保注册中心内密码的安全,并对其进行管理,密码是ApplicationServerTAI用于验证用的。
The key points to remember are that by using a password, you must ensure and manage the password in the registry that the Application Server TAI is using for validation.
随着越来越复杂的关键字被匹配到散列上,匹配到已知密码上的可能性增加了。
As more and more complex keys are matched to hashes, the likelihood of coming up with a match for any given password increases.
要么选择一个传统的密码系统,一个“USB作为关键驱动”系统,或为最大的安全性两者的结合。
Either choose a traditional password system, a "USB drive as key" system, or a combination of the two for maximum security.
因为家用无线网络速度取决于同一时间有多少人在用,强密码是关键:这样可以确保只有得到许可的人在使用你的网络。
Because home Wi-Fi speeds are dependent on how many people are using it at one time, a strong password is key: It will ensure that only authorized people are using your network.
其中最关键的行动是其安装包嗅探密码司机。
One of the most critical actions is the password sniffer installation with its packet driver.
您可以把所有的密码在一个数据库,该数据库已被锁定在一个主键或一个关键的文件。
You can put all your passwords in one database, which is locked with one master key or a key file.
我知道所有的公钥密码体制的使用1 - 1关键的关系。所以它不可能与标准算法。
All Public key cryptosystems I know of USES a 1-1 key relationship. So it's not possible with the standard algorithms available.
密码管理安全的关键是,决定什么时候将密码赋给当前页面的算法。
The key to the security of a password manager is the algorithm for deciding when to reveal passwords to the current web page.
在这两种情况下,把东西和关闭的象征,但在后者,关键是要明确协会是一个以密码保护区,这不是影响我们希望达到的目标。
In both cases, turning something on and off is symbolized, but in the latter, a key is going to be a clear association to a password protected area, which is not the effect we were hoping to achieve.
密码技术作为保密通信的关键技术已成为当代信息高科技的热点。
The cryptology becomes a hotspot of information high tech as the key technology of secure communication.
您的密码将被暂时中止,如果您不正确的关键时期,连续四年密码。
Your password will be temporarily suspended if you incorrectly key in your password for four consecutive times.
数字版权保护问题越来越受到人们的重视,密码技术是解决这一问题的关键技术之一。
The problem of digital copyright protection is taken into account by more and more people. Cryptographical technology is one of the key solutions to this problem.
但同时也引发了一系列的安全问题,而密码技术是保证信息安全的关键。
However, they caused a series of security questions at the same time. The cryptography is the key technology of guaranteeing the information safety.
智能卡是基于公钥密码体制电子商务的关键部件。
Smart CARDS are a key component of the public-key infrastructure on which E_Commerece is based.
安全的椭圆曲线构造和基点的选取,是椭圆曲线密码体制实现的的关键。
Point out that the secure elliptic curve is the master key of constructing the elliptic curve cryptosystem.
这些公钥密码算法的关键操作为大整数模幂乘操作与椭圆曲线标量乘法操作,均属于计算密集型运算。
In these public key cryptographic algorithms, the kernel operations are modular exponentiation of multi-precision integer and elliptic curve scalar multiplication, which both are computing intensive.
除子标量乘是超椭圆曲线密码体制中的关键运算。
Divisor scalar multiplication is the key operation in hyperelliptic curve cryptosystem.
实现椭圆曲线密码体制还有一个关键的步骤,就是椭圆曲线有限群基点选取算法的设计与实现。
In the implementation of elliptic curve cryptosystem, one of the key steps is to design and implement the base-point choice algorithm of elliptic curve finite group.
在公钥密码体制中,模运算是直接影响其它运算的关键运算。
Modular operation is a key one that affects other operations directly in the public key cryptosystem.
因此如何在现有的密码体制和数字签名体制的基础上,构建一个更好的方案保护和管理密钥,是决定现实中系统的安全性的关键。
So it becomes a key problem how to build a better security protection scheme and key management system by making use of the cryptography algorithm in practice.
密码技术是解决信息网络安全的关键技术,信息网络安全中的身份认证,传输和存储信息的加密保护、信息完整性和不可否认性等,都需要运用密码技术来解决。
It is the identification? The encryption protection of transmission and storage? Integrality and undeniability in information network security that need to use password technology to be solved.
本文主要以椭圆曲线上的双线性对技术为基本贯穿线索,对分布式密码系统及相关问题做了系统研究,重点探讨几类分布式密码系统的关键技术和协议。
The thread followed in this paper is to discuss the bilinear paring on the elliptic curve and it usages for the study on distributed cryptosystem and its related problems systematically.
椭圆曲线密码体制高速实现的关键是点的数乘与加法。
The center to the implementation of elliptic curve cryptosystems efficiently lies in the arithmetic of scalar multiplication and addition.
因此倍点运算的快速计算是椭圆曲线密码快速实现的关键。
Therefore, the key of the efficient executing elliptic curve cryptogram is the efficient computing of multiple point.
密码技术作为保密通信的关键技术已成为当代信息高科技的热点。
The cryptology becomes a hotspot of information high tech as the key technology of secure communication. Using artificial neural network to solve the questions about computer…
密码技术作为保密通信的关键技术已成为当代信息高科技的热点。
The cryptology becomes a hotspot of information high tech as the key technology of secure communication. Using artificial neural network to solve the questions about computer…
应用推荐