新的ltpa令牌使用以下强加密技术。
The new LTPA token USES the following strong cryptographic techniques.
要更好地利用加密技术,用户还应该再使用ESP。
For the added benefit of encryption, users should additionally use ESP.
为了迎接这样的挑战,提出了各种各样的加密技术。
To meet this challenge, a variety of cryptographic techniques have been proposed.
包含加密技术和密码分析(学)两部分的学科领域。
The field that encompasses both cryptography and cryptanalysis.
如果有一种理想的加密技术,将会有很多法律障碍来限制它的使用。
If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
作为希腊的词根资产,加密技术是一种“神秘编写”艺术。
Cryptography is the art of "secret writing," as the word's Greek roots attest.
可以利用加密技术来使Web服务请求和响应中交换的信息不可读。
Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.
可用各种方式组合这些机制,以便用各种加密技术建立各种安全模型。
These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.
论述和分析了加密技术及其在电子商务安全方面的应用现状。
The paper discusses and analyses Cryptography technology and its application in e-commerce security.
它具有高度定向能力,功耗低,采用加密技术适合秘密全频谱应急行动。
Highly directional, it USES low power and is encrypted for covert full-spectrum contingency operations.
把这种技术与直接加密技术结合使用,所有的问题就迎刃而解了。
Combine that with straight out encryption and all of your problems are solved.
非对称加密技术是一种新的加密技术,数字签名是其最重要的应用。
A symmetric cryptography is a new cryptography. Digital signature is the most important application of asymmetric cryptography.
例如,对核心层的加密技术的更改要求对加密控制进行更改,反之亦然。
For instance, changes to cryptography in the core layer require changes to the cryptographic controls, and vice versa.
本论文结合某财政管理系统,对数据库加密技术及其应用进行了研究探讨。
In this dissertation, we conduct research and probing on database encryption technology and its application according to some Financial Management System.
最后,提出了基于混沌加密技术的RFID系统的新的控制机制和工作流程。
Finally, the new controlling mechanism and working process of the new RFID system applied with chaotic encryption are proposed.
作为一个新生,他很快就熟悉了Boneh教授布置的挑战,即解决同态加密技术的难题。
As a new student he quickly picked up on the challenge laid out by Boneh to tackle the problem of homomorphic encryption.
最后,策略规范可能要求加密订单的某些要素,指示要使用的加密技术、要使用的证书等等。
Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.
在以色列的案例中,安全和加密技术一直是他们的强项,但这不是像它过去一样是个增长行业。
In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.
一个剑桥大学的教授设想和提出一个小装置,利用光学和加密技术,以取代所有的密码。
A University of Cambridge professor has envisioned and presented on the idea of a small device that USES optics and cryptography to replace all passwords.
在EFF这份名叫“如何防止失去位置隐私”的报告中,使用加密技术来保证匿名是非常简单的。
According to the report "on Locational Privacy, and How to Avoid Losing it Forever", it's fairly easy to use cryptographic techniques to ensure your anonymity.
置换密码是一种简单的加密技术,采用这项技术将把字母表中的每个字母替换为字母表中的其他字母。
A substitution cypher is a simple encryption technique where every letter of the alphabet is substituted with another letter from the alphabet.
我们对安全性、加密技术,甚至公钥加密技术介绍了很多,目的是帮助您成功开发下一个PHP项目。
I've explained enough about security, encryption techniques, and even public-key cryptography to help make your next PHP project a success.
“盗版者有无限的时间和资源”Ishikawa说,“你无法建立一个不能被破解的加密技术。”
"Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."
阿联酋的监管官员称,黑莓的专用网络,和先进的加密技术使该手机经因特网发送的信息安全得过了头。
The UAE's regulators say the BlackBerry's proprietary network and tight encryption make messages the devices send over the Internet too secure.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
SSL使用加密技术、数字签名和数字证书,在客户端和服务器之间提供消息隐私、消息完整性和相互验证。
SSL USES encryption techniques, digital signatures and digital certificates to provide message privacy, message integrity and mutual authentication between clients and servers.
可以借助加密技术和云计算厂商的技能优势,确保信息安全。同时,可以设计一些新的方法,解决这个问题。
There may be cryptographic techniques, skill level of vendors' staff to ensure the security and some new methods may be devised to solve this issue.
可以借助加密技术和云计算厂商的技能优势,确保信息安全。同时,可以设计一些新的方法,解决这个问题。
There may be cryptographic techniques, skill level of vendors' staff to ensure the security and some new methods may be devised to solve this issue.
应用推荐