解密匙 的英文怎麼說

中文拼音 [jiěchí]
解密匙 英文
decryption key
  • : 解動詞(解送) send under guard
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 匙Ⅰ名詞1. (匙子) spoon 2. (姓氏) a surname Ⅱ量詞(一匙的量) spoonful; [拉丁語] cochleare
  • 解密 : deciphering
  1. It is as important as the other eight planets in our understanding of the origin of the solar system because pluto and its family members carry some unique information that the eight planets cannot provide

    冥王星對於我們研究太陽系的起源的貢獻,跟八大行星根本無分軒輊,冥王星及其他矮行星類的成員隱藏著獨特的,這是八大行星不能提供和替代的。
  2. You may use the archived private keys to decrypt the emails encrypted with your expired e - certs

    你可使用存檔私人將舊有已過期電子證書加的電子郵件
  3. In sending the saved copy to his her client, the auditor should not encrypt the supplementary form with the e - form core program. this is because the e - form core program uses the ird s public key in performing the encryption. without the necessary key, the auditor or the auditor s client cannot decrypt the encrypted copy

    核數師提交報稅表附表儲存本給其客戶時,無須以電子表格應用程式把報稅表附表加,因為該電子表格應用程式是使用稅務局的公開的,如果沒有所須的解密匙,核數師或其客戶將無法把已加的報稅表附表
  4. Public - key algorithms, on the other hand, are asymmetrical, using different keys, a public key, and a secret key, for encryption and decryption

    公開鑰演算法則是不對稱的,採用不同的鑰,一個公開的鑰和一個秘的鑰,用於加
  5. For the positive real function image encoded by double random - phase, the first random - phase mask placed in the blank can not serve as the key when the decrypted image is detected by intensity detector in the decrypting process

    摘要正的實函數圖像通過雙隨機相位編碼加以後,在過程中,用光強探測器接收圖像時,位於空域的第1塊相位掩模不起作用。
  6. Betty : he needs to decrypt the e - mail using his private key. since decryption requires private key, which is carefully maintained by the key holder alone, and uncle ray is the holder of the private key, only he can decrypt the e - mail

    由於需要用配對的私人,而私人是由持有人小心保管的,叔叔是該私人的唯一持有人,因此,只有他才可把訊息
  7. Through the use of digital certificates and the public private keys mechanism, security and integrity of transactions conducted over the internet can be ensured

    透過應用數碼證書及公開私人機制,在網際網路進行交易時的保安及資訊內容保持完整的問題便可迎刃而
  8. While public key cryptography addresses issues of data integrity and transaction privacy, certificates address concerns in authentication and access control

    技術是決數據完整及交易保的問題,而數碼證書則能處理認證及接達控制的問題。
  9. The same key can then be used to decrypt the message to its original form

    之後,再使用同一個將該訊息,恢復至其初始形式。
  10. Xml elemnet encryption and decryption through the public key encryption algorithm used by rsa. opensoap independent implementation

    通過公開鑰法演算法rsa實現xml的加
  11. A dedicated processor is responsible for the encryption and decryption process. as such, the risk of exposure of private key carried by a smart card is low

    卡內的一個專用處理器會負責這個加的程序,以減低外泄卡內私人的風險。
  12. These chargeback issues - where people acknowledge that they had an agreement or some contact with the merchant but claim that the merchant did not performed in some or all aspects as promised like nothing delivered, or the order was cancelled, or some other reason - are part of the credit card issuer s business model and beyond the scope of an xml signature specification

    首先,碼術中鑰的概念直接來自其硬體對等物的比喻- -沒有鑰就無法加鎖或鎖特定數據。在汽車示例中,攻擊者有50分之一的機會使給定的鑰工作,而在碼術中,通常有上十億個可能的鑰(對于大多數碼演算法類型,該數字通常是2
  13. The signing of the memorandum of understanding today signifies a close but non - exclusive cooperation between hongkong post and utimaco safeware in providing pki technical training to the it professionals who are interested in internet security or pki technology

    今日香港郵政與奧迪馬歌簽訂諒備忘錄;雖然我們不排除或會與其他機構磋商,但雙方一定會緊合作,為有意從事網際網路保安或研究公基建技術的資訊科技專材,提供公基建技術培訓。
  14. The reverse process of converting cipher text back into plain text is called decryption. a cryptographic algorithm frequently referred to as a cipher is a mathematical function to perform encryption, and vice versa, using keys

    技術范指透過特定程序演算法及,將訊息從初始普通文本轉換為另一種不易理的形式碼文本。
分享友人