• Firstly, what are crypto-currencies?

    首先什么加密货币

    youdao

  • It does not use any keystrokes and has near-crypto-key strength.

    使用任何按键接近加密的关键力量

    youdao

  • Given this, we shall likely not know for a prolonged period of time how successful the crypto-currency experiment will be.

    鉴于我们可能一段时间内无法了解加密货币是否会成功。

    youdao

  • To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.

    进一步提高密码芯片安全性,密码芯片必须防止简单能量分析差分能量分析的攻击

    youdao

  • The Qiyugou crypto-explosive-Collapse breccia type gold deposits belong to a new type discovered in recent years in our country.

    祁雨沟隐蔽爆发—坍塌角砾岩金矿床,是我国近年发现类型矿床。

    youdao

  • RSA algorithm is considered as one of the relatively safe crypto-system, and the multiplication of large integer is the key operation in fact.

    RSA算法目前被认为可以实现安全通信的理想公钥密码体制之一,其主要操作实际上是一系列基本的数模运算。

    youdao

  • Tongshi is a new type of ore field discovered recently with multi-mineralization types recognized. Crypto-explosion breccia Au mineralization is the major one.

    金矿发现类型金矿田,该矿田金矿类型较多,隐爆角砾岩型金矿化是主要的类型。

    youdao

  • A digital signature scheme is designed based on ECDH protocol. It has some excellences about elliptic curve crypto-protocol and it improves speed of signature and validate.

    设计一种基于ECDH协议数字签名方案,使其不仅具有基于椭圆曲线密码协议的优点,而且提高了签名验证速度

    youdao

  • These MIDS-LVT terminals provide real-time data communications, situational awareness, navigation and digital voice capability, all in a jam-resistant, crypto-secured package.

    MIDS - LVT终端提供了实时数据通信动态感知导航数字语音功能所有这些都一个抗拥塞、加密保护的程序包中完成。

    youdao

  • It's even more common to find crucial flaws in crypto-graphic algorithm implementations, which can turn strong encryption into weak encryption (or sometimes no encryption at all).

    更为普遍情况是,加密算法实现发现具有关键缺陷可以原本的强加密退化加密(有时甚至相当于完全不加密)。

    youdao

  • This prevents the crypto material from having to be stored on the appliance's file system, as the material will be cached in memory upon retrieval.

    阻止必须将加密材料储存设备文件系统中,因为加密材料可以获取时缓存在内存中。

    youdao

  • Each message is transported in its own crypto envelope, which includes both the payload and the identity of the sender.

    条消息自己加密信封传输,加密信封包含发送者负载身份

    youdao

  • The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.

    使用加密算法的保密性这样一个事实保证,生成哈希匹配明文在计算上不可行的

    youdao

  • They're not hard to use but getting crypto right (meaning without huge flaws) is something that takes years and a lot of peer reviews from other crypto experts.

    它们不难使用要获取加密权限(意味着没有大的缺陷)需要花费几年时间,有大量来自其他加密专家相关评论

    youdao

  • The ordered crypto products will be delivered by summer 2010.

    这份加密产品定单在2010年夏天交付

    youdao

  • There is no cure for crypto, but antiretroviral therapy to restore immunity can effectively clear up the infection.

    没有治疗孢子虫病的方法,抗逆转录病毒疗法可以恢复免疫功能从而有效地清除感染

    youdao

  • Using the best available crypto on the weakest platform on the planet won't buy you much security!

    世界上脆弱的平台使用最好加密不会带来多少安全性。

    youdao

  • What should alarm you is that crypto still isn't there - in the millions of medical records, credit-card databases.

    但是必须警告成百上千万病历卡、信用卡数据库没有设置密码。

    youdao

  • As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.

    按照惯例,出现加密时候,理解整个系统出发点就是思考密钥有关问题多少密钥,持有,如何使用。

    youdao

  • The TETRA crypto provides users with the freedom to choose a terminal based on their own specific needs while safeguarding the ability to communicate securely with all other users.

    TETRA加密功能用户提供自由选择具体需要的终端同时保障所有其他用户安全通信能力

    youdao

  • Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.

    验证选择刚刚上载公钥配置加密认证文件名称

    youdao

  • There really are no more details on what procedures Dropbox has in place or how they implement the crypto to prevent unauthorized access to your files.

    关于Dropbox业已到位的安全程序或者他们如何实施加密阻止的文件的未授权访问,根本没有更多细节

    youdao

  • DRBD USES the Linux crypto application programming interface and is therefore flexible on the integrity algorithm used.

    DRBD使用Linux加密应用程序编程接口因此完整性算法使用方面比较灵活的。

    youdao

  • Replacing all the closed code with open source one: libc_i18n, NFS lock manager, portions of crypto framework, many critical drivers.

    使用源代码替换所有源代码包括libc _ i18n、NFS管理器加密框架部分以及大量关键驱动程序

    youdao

  • Wiggs suggests keeping crypto keys or other sensitive data in byte arrays which should be overwritten with zero as soon as they are no longer used.

    Wiggs建议把加密密钥其他敏感数据保存字节数组中,那样能够在不需要的时候重写零。

    youdao

  • The WebSphere DataPower SOA Appliance allows the crypto objects to be created individually and then selected in the configuration needed.

    WebSphereDataPowerSOAAppliance允许逐个创建crypto对象然后在所需配置进行选择

    youdao

  • Enter name for private crypto key to be used for signing, ws-dsig-receiver-private.

    输入用于进行签名私有加密密钥名称WS - dsig - receiver - private。

    youdao

  • Enter name for public crypto certificate, ws-dsig-receiver-public.

    输入公共加密证书名称WS - dsig - receiver - public。

    youdao

  • Cryptosporidiosis (crypto) and isosporiasis are both caused by protozoan parasites.

    隐孢子虫病crypto等孢球虫病都是原生动物寄生虫引起的。

    youdao

  • Cryptosporidiosis (crypto) and isosporiasis are both caused by protozoan parasites.

    隐孢子虫病crypto等孢球虫病都是原生动物寄生虫引起的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定