cryptographic

美 [ˌkrɪptə'græfɪk]英 ['krɪptəʊ'græfɪk]
  • adj.关于暗号的
  • n.隐晶文象状
  • 网络密码;密码的;用密码写的

cryptographiccryptographic

cryptographic

密码

电子商务相关词汇 ... 19.C programming language C 编程语言 20.cryptographic 密码 21.Digital signature 数字签名 ...

密码的

石油英语词汇(C8)--石油百科 ... cryptographer 密码员 cryptographic 密码的 cryptography 密码术 ...

用密码写的

英语词汇新译 C_翻译家... ... cryptographic smart cards 密码智能卡 cryptographic 用密码写的 cryptographical 密码的 ...

加密

计算机常用英文缩写说明(A-K)_攀登者_新浪博客 ... cross-certification( 交叉认证) cryptographic( 加密) cryptography( 密码术) ...

密码学

教育学词汇 - 探索者365的日志 - 网易博客... ... climatology 气候学,风土学 cryptographic 密码学 dentistry 牙医学 ...

密码编译

利用此方法,伺服器可以用交换密码编译 (cryptographic) 而不传送真正密码的方式,来检查使用者的帐户资讯。之前称为 NTL…

加密的

Chapter 13 ... crude 原始的 cryptographic 加密的 current 电流 ...

加解密

C++各大有名库的介绍 - 少即是多 - 专注 -... ... 持久存储 |Persistence & Storage 加解密 |Cryptographic 日志 |Logging ...

1
When in "record" mode, these dwell times are expanded into a string and used to generate a cryptographic hash of the signature. 当处于“record”模式时,这些停顿时间将被扩展为字符串并用于生成签名的密码散列。
2
The developed signature will then be transformed into a cryptographic hash and stored on disk to be compared later during the monitor phase. 然后,开发的签名将被转换为密码散列并存储到磁盘中,以供稍后在监视阶段中进行比较。
3
After setting up the cryptographic library, the next step is to exchange certificates between the systems. 设置CryptographicLibrary之后,下一步是在系统之间交换证书。
4
An implementation of the Java Cryptography Extension A list of cryptographic service providers can be found at the Sun Web site. Java密码扩展系统的一个实现在Sun的网站中可以找到密码服务提供者的目录。
5
They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one. 他们可以寻找密码算法中的缺陷,然后恶意修改它们,让强的加密算法变弱。
6
Again , let us remind you that using proprietary cryptographic algorithms , including hash functions, is usually a bad idea . 再次提醒您,使用专用密码演算法,包括杂凑函数,通常是一个坏主意。
7
The specified cryptographic service provider cannot be used for the selected Certificate Template. 不能为所选的证书模板使用指定的加密服务提供程序。
8
A popular idea is to have email servers provide cryptographic keys so that messages can be verified as they arrive in an inbox. 其中呼声很高的一个方案就是要求邮件服务器提供密匙,以便当邮件抵达时,判断其有效性。
9
You can use the method to determine whether the selected cryptographic algorithms and strengths are sufficient for your application. 可以使用此方法确定选定的加密算法和强度是否满足您的应用程序的要求。
10
BLS short signature is one of the cryptographic primitives most widely used in pairing-based cryptography. BLS短签名是双线性密码学中应用最为广泛的密码元件之一。
11
Unable to store the public cryptographic key of this computer. This computer cannot send or receive encrypted messages. 无法存储这台计算机的公用加密密钥。这台计算机无法发送或接收经过加密的消息。
12
Gets or sets the name of the cryptographic provider used to generate the digital signature of the message. 获取或设置用于生成消息数字签名的加密提供程序的名称。
13
The public cryptographic key of this computer cannot be stored. This computer cannot send or receive encrypted messages. 无法存储此计算机的公用密钥。此计算机无法发送或接收加密消息。
14
When overridden in a derived class, creates an instance of the specified implementation of a cryptographic random number generator. 在派生类中重写时,创建加密随机数生成器的指定实现的实例。
15
The root of trust within a cryptographic system starts with a key, which needs to be accessed and stored securely . 加密系统中的信任根从需要安全访问和存储的密钥开始。
16
Class defines the algorithm used for a cryptographic operation. 类定义用于加密操作的算法。
17
A ticket is provided by an authentication server to the client using a cryptographic key of the intended server. 身份验证服务器使用目标服务器的一个密码密钥将票据提供给客户端。
18
On top of it are the middle layer of access, audit, and cryptographic controls and then the outermost layer of technologies. 其上部是包含访问、审核和加密控制的中间层,然后是技术所在的最外层。
19
Specify the location of a key container from the system's cryptographic service provider (CSP) to use to name the assemblies. 指定用于命名组件的系统中,密码编译服务提供者(CSP)的金钥容器位置。
20
Principals share their cryptographic key with the authentication server of the realm to which they belong. 主体与它们所属领域的身份验证服务器共享密钥。
21
Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash. 先尝试在普通使用场景下键入数千个单词,然后再输出密码散列。
22
Specifies the name of the cryptographic provider on the system. 指定系统上的加密提供程序的名称。
23
You do not have to generate a new cryptographic key pair for every assembly you want to give a strong name. 您不必为您希望赋予强名称的每个程序集生成新的加密密钥对。
24
This firmware is available on a limited basis from IBM, and essentially turns the 4758 Coprocessor into a cryptographic processor. 这个固件在来自IBM的受限基础上可用,并在本质上将4758Coprocessor变成了密码处理器。
25
The previous step generates cryptographic keys and a password used in LTPA token generation. 之前的步骤生成用于生成LTPA令牌的密钥和密码。
26
It prevents saving configuration in IBM Cognos Configuration by guarding the establishing of cryptographic information with a password. 它用密码保护密码学信息的建立,从而阻止在IBMCognosConfiguration中保存配置。
27
Provided the session key has not been compromised , the value of the cryptographic function will be the same at each of the correspondents . 该值与生成会话密钥所需的信息一起在对应方之间进行传输。
28
The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP). Windows密码API(cryptoAPI)密码服务提供程序(CSP)的名称。
29
These entities are usually stored in a file or disk or in a key container owned by a Crypto API Cryptographic Service Provider (CSP). 这些实体通常存储在文件或磁盘中,或者存储在加密API加密服务提供程序(CSP)所拥有的密钥容器中。
30
Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure. 黑客可以利用密码分析技术或恶意的实例资源破解密码算法。