decryption

美 [di'krɪpʃn]英 [di:'krɪpʃn]
  • n.解释编码的数据
  • 网络解密;译码;解密模块

decryptiondecryption

decryption

解密

电脑常用英语单词 ... DLC 数据链路控制 decryption 解密 database 数据库 ...

译码

石油英语词汇(D1)_专业词汇_专业英语_食品伙伴网 ... decrepitation 爆裂 decryption 译码 decuple 十倍;使增加到十倍 ...

解密模块

...Expand)、加密模块(Encryption)、解密模块Decryption)。

解密函数

密码算法(Algorithm)就是指加密函数(Encryption)和解密函数(Decryption)。有加密函数,那么必然有一套与它对应的解密函数。

解密技术

解密技术Decryption)密钥管理技术 使用者与设备身份认证技术 永久在线 支持美国节点服务器 支持日韩节点服务器 支持港 …

解密变换

解密变换Decryption): 解密变换( ) 另一个变换应用于密文,变换后的结果为明文。 另一个变换应用于密文,变换后的结 …

解密处理

技术标准_网罗_数码_西祠胡同 ... 3.3.23 解密 decipherment 3.3.24 解密处理 decryption 3.3.25 服务拒绝 denial of service ...

解码

质量效应银河大百科 修订版 - 质量效应 -... ... Damping 阻尼 Decryption 解码 Hacking 入侵 ...

1
Note that decryption uses the corresponding private key of the public key used for encrypting the XML. 请注意,解密过程使用的是加密XML时使用的公钥所对应的私钥。
2
The CSP generates the public and private key pair used for the encryption and decryption of messages. CSP生成用于信息加密和解密的公钥和私钥对。
3
On decryption, each event is written to disk, unencrypted, and the plain text read back in to be displayed to the user. 在解密阶段,每个事件都被写到磁盘上,然后进行解密,最后读回纯文本并显示给用户。
4
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations. 该系统能有效的防止网络内部的重要数据通过网络泄露出去,无需用户进行手动的加密解密操作。
5
The recipient's unique information is then used in a decryption operation performed against the encrypted message . 然后,使用收件人的唯一信息对加密邮件执行解密操作。
6
This book reveals the Windows platform for a comprehensive encryption and decryption technology! 本书全面揭示Windows平台的加密与解密技术!
7
Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption. 公钥加密湜使苚弌对非对称菂密钥加密或解密菂技术。
8
The public-key system uses a pair of mathematically related sequences, one each for encryption and decryption [1]. 公钥系统采用一对数学上相关的序列,一个用于加密,另一个用于解密。
9
If the private key is encrypted with a password in the database, the decryption password must be specified. 如果在数据库中使用密码对私钥进行加密,则必须指定解密密码。
10
The result of simulation shows that the algorithm can give satisfactory result of encryption and decryption. 仿真结果表明,该算法具有很好的加密、解密结果。
11
The DECRYPTION BY PASSWORD clause can be omitted if the password in the file is protected with a null password. 如果文件中的密码受空密码保护,则可省略DECRYPTIONBYPASSWORD子句。
12
It was mainly introduced the design solution by the digital watermark technology solving keys security of dynamic encryption and decryption. 介绍一种结合数字水印技术解决动态加解密密钥安全性的设计方案。
13
Symmetric algorithms are very efficient and work with a single key for both encryption and decryption calculations. 对称算法非常有效,并且可以与用于加密和解密计算的单一密钥一起使用。
14
In public-key or two-key encryption, a key pair is used for encryption and decryption. 公钥加密是使用一对非对称的密钥加密或解密的技术。
15
It is capable of message digests, encryption and decryption of files, digital certificates, digital signatures, and random numbers. 它可以实现消息摘要、文件的加密和解密、数字证书、数字签名和随机数字。
16
Instead, the other key in the pair must be used for the decryption. 相反,这对密匙值的另外一个密匙必须用于解密。
17
A protector is a program that controls the encryption and decryption of rights-managed files of a specific file format. 保护程序是一种可以控制对特定文件格式的权限管理文件进行加密和解密的程序。
18
Sets the key being used for Passport encryption and decryption. 设置用于Passport加密和解密的密钥。
19
This process of changing information into a code is encryption and the process of changing code back is decryption . 将信息更改为代码的这一过程称为加密,而将代码重新更改为信息的过程则称为解密。
20
In the third section, I'll show how you can generate a cryptographic key used for encryption and decryption in Kerberos messaging. 在第三节中,我将展示如何生成一个用于在Kerveros通信中进行加密和解密的密钥。
21
The process of encryption or decryption is generally known as cryptography, and relies on mathematical algorithms. 加密过程或解密过程一般被称作密码术,且依赖于数学算法。
22
Keys are used for digitally signing documents and verifying signatures , and they help with the encryption and decryption processes . 密钥用于数字签署文档和验证签名,也用于加密和解密过程。
23
The string manipulation functions in Listing 13 replace the lost formatting before the decryption command is called. 在调用解密命令之前,清单13中的字符串操作函数将替换丢失的格式。
24
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography. 此安全策略使用非对称加密执行数字签名与验证、加密和解密。
25
Its encryption and decryption operations are in the system drive layer and the whole process is completely transparent. 加解密操作均在系统的驱动层实现,整个过程对用户完全透明的特点。
26
Such asymmetric transformations are very costly compared to encryption and decryption using a symmetric key . 此类非对称转换较比使用对称密钥进行加密和解密的方法,其开销更大。
27
Encryption and decryption of a cookie are performed by the same Client Access server. Cookie的加密和解密由同一台客户端访问服务器执行。
28
Security -- authorization of the request, encryption and decryption as required, validation, etc. 安全性——请求的授权、加密和解密(在需要时)、确认等等
29
The performance of RSA decryption has direct relationship with the efficiency of modular exponentiation implementation. RSA算法的解密性能与大数模幂运算的实现效率有着直接的关系。
30
Decryption: The decryption ability reveals all enemy movements within a sector. Orders are represented by red arrows. 解密:解密才干可揭露指定分区中友好部队的意向,并以红色箭头表示。