• A symmetric key is dynamically created and used for encrypting a database backup image.

    数据库备份映像加密时,将动态创建应用一个对称密匙。

    youdao

  • The process involves the sender generating the message digest, then encrypting the digest using its private key to create the digital signature.

    这个过程包括发送生成消息摘要然后摘要加密创建数字签名。

    youdao

  • Begins by indexing it and encrypting it with a symmetric encryption scheme (e.g., AES) under a unique key.

    首先为其建立索引使用对称加密模式(例如aes)唯一的密钥对其进行加密

    youdao

  • Using private key-certificate pairs for signing and encrypting messages is more complex to configure than the simple UsernameToken example.

    简单UsernameToken示例相比使用私有密钥-证书进行消息签名加密配置比较复杂

    youdao

  • An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.

    对称算法使用不同密钥消息进行加密解密;其中个秘必须秘密的,一个密钥通常是公开的。

    youdao

  • Instead of encrypting everything with the same key strength regardless of needs, rich clients can establish a comprehensive differentiating security policy based on the content.

    客户机可以根据内容建立全面分级安全性策略而不是无论是否需要相同密钥强度加密所有内容。

    youdao

  • In practice, more is involved in signing messages than just encrypting with your private key.

    实际中消息签名过程不仅仅使用私有密匙加密消息

    youdao

  • GnuPG allows encrypting and signing your data and communication, and features a versatile key-management system and access modules for all kinds of public key directories.

    GnuPG支持数据通信加密签名一个多功能密钥管理系统各种公钥目录访问模块特色

    youdao

  • To encrypt file data, an encryption key password must be selected, which Tivoli Storage Manager uses to generate the encryption key for encrypting and decrypting the file data.

    加密文件数据必须选择一个加密密钥口令TivoliStorageManager使用它生成加密密钥,加密解密文件数据。

    youdao

  • Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).

    使用不对称加密public/private密钥对进行消息签名加密简单的(至少概念上很简单)。

    youdao

  • But first, I'll give you a quick rundown of the principles of public-key cryptography - the basis for most of WS-Security's encrypting and signing features.

    但是我们首先扼要概述一下公开密加密原理WS - Security加密签名特性主要基础

    youdao

  • Encrypting the message with the public key of the receiver's X.509 certificate to ensure that only they can access the message content.

    使用接收方X . 509证书公钥加密消息,以便确保只有它们才能访问消息内容

    youdao

  • Unlesss you know exactly what you are encrypting, it is never a good idea to encrypt something with your private key and then send it to somebody else.

    加密某些信息,然后发送给其他人不是一个主意除非清楚知道这个信息的含义。

    youdao

  • By database encrypting, and key management and users access control, we can protect the database from destroying.

    通过数据加密密钥管理用户拜访控制等一系列的手腕维护数据库内部数据的安全。

    youdao

  • For more information on this process of encrypting and transferring the key and IV, see Creating a Cryptographic Scheme.

    有关加密传输密钥IV过程更多信息请参见创建加密方案

    youdao

  • Still, encrypting the mobile a-gent's result by means of secret key associated with the host on which the agent runs can prevent the result from spying and tampering attack.

    而且利用运行移动代理主机相关密钥运行结果加密有效地防止对移动代理运行结果的窥探篡改攻击

    youdao

  • Still, encrypting the mobile a-gent's result by means of secret key associated with the host on which the agent runs can prevent the result from spying and tampering attack.

    而且利用运行移动代理主机相关密钥运行结果加密有效地防止对移动代理运行结果的窥探篡改攻击

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定