• Lets you provide an encryption of the stored user IDs and passwords.

    使能够存储用户ID密码进行加密

    youdao

  • As it was pointed out in other answers, MD5 is not an encryption algorithm.

    指出其他答案MD 5不是一个加密算法

    youdao

  • Each INTEGER in the SEQUENCE specifies an encryption algorithm that the client supports.

    SEQUENCE中的每个INTEGER指定客户机支持一种加密算法

    youdao

  • If you're looking for an encryption library, Recommended two-way encryption gems for Ruby?

    如果正在寻找一个加密建议双向加密红宝石宝石吗?

    youdao

  • Users can also use the set encryption password statement to set an encryption password for a session.

    用户可以使用SETENCRYPTIONpassword语句会话设置加密密码

    youdao

  • This paper presents an encryption engine composed of a single chip processor and a dual port RAM.

    本文论述一个单片机端口存储器构成加密阐述了加密机的工作原理和操作流程。

    youdao

  • Data stored on removable tape cartridges may be encrypted by an encryption engine to protect the data.

    可更换的盒式带存储数据加密引擎加密保护数据。

    youdao

  • Then an encryption algorithm based on chaos has been proposed and a file-encryption system is developed.

    基于混沌加密算法应用到数字图像加密中。

    youdao

  • Using an encryption scheme will prevent exposing a user's password if the database ever becomes compromised.

    如果数据库暴露了,那么使用加密方案防止暴露用户密码

    youdao

  • So, , if the satellite were to encode an encryption key in that quantum state, any interception would be obvious.

    因此如果颗卫星量子中加密秘的话,任何拦截显而易见无意义的。

    youdao

  • In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan.

    为了增强水印信号安全性采用基于混沌平面的水印加密算法。

    youdao

  • "Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."

    盗版者无限时间资源Ishikawa,“无法建立一个不能被破解的加密技术。”

    youdao

  • Use this page to create an encryption key. It is recommended that you back up the encryption key after you create it.

    使用页面创建加密建议在创建加密键对其进行备份

    youdao

  • On the following three panels, you are prompted to choose an encryption key, operating system support, and operating system.

    接下来三个面板中需要选择一个加密密操作系统支持以及操作系统。

    youdao

  • If an encryption key is created with this option, the encryption key is stored on the agent disk with password protection.

    如果密密创建时带有这个选项,那么它存储密码保护代理磁盘上

    youdao

  • This algorithm applies to document kind document encryption not only, can carry out an encryption on image kind document.

    这个算法不仅适用文档文件加密,还可以图像类文件进行加密。

    youdao

  • Once you generate the key, you can use the AbderaSecurity class to get an Encryption object and feed it the key you just created.

    生成密钥之后,便可以使用AbderaSecurity获得一个Encryption对象创建密钥提供

    youdao

  • After backing out of the menu, an encryption key can be selected by moving the trackball and typing characters on the keyboard.

    退回菜单通过移动轨迹球或输入键盘上字母选择一个密钥

    youdao

  • Unless you are using an encryption device (hardware or software), you should assume that email over the Internet is not secure.

    除非加密软件硬件不然所有的电子邮件不是安全的。

    youdao

  • One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

    使用公用安全性系统之一PKI(公用密钥基础),一种用于PDA智能电话安全性的加密技术

    youdao

  • And who wants to run off to a third party website and run a dozen email addresses through an encryption algorithm one at a time? Not me.

    而且谁会希望一个第三网站上通过加密算法同时运行12email帐号,可不想那样。

    youdao

  • TACACS is an encryption protocol and therefore less secure than the later TACACS + and Remote Authentication Dial-In User Service protocols.

    TACACS一个安全加密协议因此低于后来TACACS +远程认证拨号用户服务协议

    youdao

  • This paper discusses and curry out an encryption algorithm based on one-dimensional chaotic map, which have good security and practicability.

    本文设计了基于混沌理论单表置换加密方法的一维混沌表加密算法

    youdao

  • Using the technologies of DNA synthesis, DNA clone, PCR and DNA chip and the theory of computational complexity, an encryption scheme is formed.

    利用DNA合成技术、DNA克隆技术、PCR扩增技术以及DNA芯片技术,结合密码学计算复杂度理论,提出了一种基于DNA技术的加密方法。

    youdao

  • If you build an encryption algorithm around a function's easy direction, anyone wanting to break your encryption needs to work at it from the hard side.

    如果围绕某个函数简单方向构造加密算法,那么破解加密的任何人需要从相反的方向来解密。

    youdao

  • If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.

    如果加密解密操作成功地使用密钥,那么必定在操作某个部分使用了密钥中的

    youdao

  • They don't cover secure server communication explicitly but give some hints about it and provide an encryption library to simplify any encryption tasks.

    他们包括安全服务器通信明确一些提示提供了一个加密简化任何加密任务

    youdao

  • For example, if a service provider's security policy declaration requires encrypted messages, the ESB can configure an encryption mediation automatically.

    例如如果服务提供者安全策略声明要求使用加密消息ESB可以自动配置一个encryption中介

    youdao

  • An encryption algorithm based on data-scrambling is presented. Firstly, we extract odd number bits of the important information to form a new information.

    提出基于数位置乱的加密体制,该方案中首先采用置乱算法将明文信息奇数提取出来组成新的信息;

    youdao

  • An encryption algorithm based on data-scrambling is presented. Firstly, we extract odd number bits of the important information to form a new information.

    提出基于数位置乱的加密体制,该方案中首先采用置乱算法将明文信息奇数提取出来组成新的信息;

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定