key recovery 中文意思是什麼

key recovery 解釋
密鑰恢復
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • recovery : n. 1. 重獲;復得;恢復,收回,回收。2. 還原,復原;痊癒;蘇生;矯正。3. 回縮。4. 填地。5. 【法律】勝訴。
  1. Allow a key to be exported for archival or recovery

    允許導出密鑰以便存檔或恢復。
  2. Paper on the risks of key recovery, escrow, etc

    有關密鑰恢復、契約等風險的文章。
  3. It hugely reduces pain suffered by patients, and enables faster recovery at lower cost. key - hole surgery has been widely applied to operations of the abdomen, chest, head and neck, brain and vascular system

    現時微創外科技術已被廣泛應用於腹部、胸部、頭頸、腦部及血管的外科手術上。可是微創手術的訓練對傳統的外科學徒制訓練方式帶來極大的沖擊。
  4. In this paper, the design of a specific chip for circuit emulation based on ip is put forward and realized and the main functional modules and the key algorithms including an all - digital adaptive clock recovery method and a dynamic depth buffer algorithm are described in detail

    文章根據相關標準提出並實現了一種電路模擬專用晶元的設計方案,並對其中主要功能模塊和關鍵演算法作出了詳細說明,包括一種全數字的自適應時鐘恢復方法、動態深度緩沖演算法等。
  5. Because of the unique issues in the networks, including mobility - induced disconnection, network partition, high out - of - order delivery ratios and channel errors, the congestion control and the error recovery in the network is challenging. in this environment, the interaction between tcp and mac layer protocols, the affection of route protocols on the performance of tcp and the particular congestion control and error recovery mechanism are first discussed. then a particular transport layer protocol scheme based on the non - feedback mechanism is presented, with emphasis on the analysis and simulation of the key parameter

    文中主要討論了兩種不同網路結構中的無線tcp協議改進方案,其一在最後一跳為無線鏈路的網路環境中,針對基本tcp擁塞控制機制存在的缺陷,文中在現有解決方案的基礎上提出一綜合性的方案,其中包括無線鏈路的高誤碼率和連接斷開問題的解決,並重點對方案中出現的交叉層問題進行分析和模擬;其二,考慮的是分散式網路( adhoc ) ,在文中較為詳細的分析了tcp和mac層機制間的相互作用、路由協議中造成tcp性能降低的因素、 adhoc網路中應採取的特殊擁塞控制和差錯恢復機制,在此基礎上提出了一種採用非反饋機制的解決方案,重點對方案中的關鍵參數進行分析和模擬,分析和模擬結果表明此機制可在很大程度上提高adhoc網路中tcp的性能。
  6. This paper is at introduction foundation of cryptography, analyzes x. 509 certificate, has explained the principle of pki and function of each part, and combines the author ' s project development, explains the running environment and systematic characteristic of jy _ ca, it is to divide jy _ ca into ca initial module, certificate requisition module, certificate signature module, certificate revocation module, certificate inquiry module, privat key recovery module and management module. the realization of each module has been explained briefly at the same time

    本文在介紹密碼學知識的基礎上,剖析了x . 509證書的證書結構,詳盡闡述了pki的原理和各個組成部分的功能,並結合作者的項目開發,對jyca的運行環境和系統特點作了整體說明,把jyca劃分為ca初始化模塊、證書申請模塊、證書簽發模塊、證書吊銷模塊、證書查詢模塊、密鑰恢復模塊及管理模塊,同時對各個模塊的實現要點作了扼要說明。
  7. One of the key subjects reported at the symposium is the early triassic chronostratigraphy, esp. the gssp for the induan - olenekian boundary ; the second is the expression and process of biotic and environmental events during the permian - triassic transition ; the third is the calcimicrobialite and the specific ecosystems at the permian - triassic boundary and in the early triassic the fourth is the evolution and lineages of some key taxonomic groups in the early triassic ; the fifth is the recovery process and pattern of the ecosystems at the beginning of the mesozoic ; and the sixth is the causes of the delayed biotic recovery in the early triassic

    學術主題之一是早三疊世年代地層格架,尤其是印度階奧倫尼克階界線層型;第二是二疊紀三疊紀之交滅絕和環境事件的表現形式和過程;第三是二疊紀三疊紀之交及早三疊世微生物巖及其代表的特殊生態系;第四是滅絕事件后三疊紀初一些關鍵生物類別的演變歷程;第五是中生代初生態系復甦過程和型式;第六是早三疊世生物遲滯復甦的原因。
  8. High - efficiency heat recovery is the key benefit of mechanical ventilation over conventional natural ventilation

    有效地抵禦熱量是機械通風相對于傳統的自然通風最重要的優勢。
  9. In this regard adequate shale modeling must be part of a good reservoir description : providing the knowledge of the spatial distribution of heterogeneities in the internal architecture of the reservoir, it becomes a key factor in the production planning and optimized oil recovery

    在這方面,適當的頁巖模型必定是良好油藏描述的一部分:這種模型能夠提供油藏內部非均質性的空間分佈信息,非均質性是開發生產規劃設計中一個關鍵的考慮因素
  10. The key to the english recovery following the wars of the roses had been henry vii's concentration upon domestic stability and financial prudence.

    玫瑰戰爭以後英國的元氣恢復的關鍵在於亨利七世著力于國內穩定和緊縮財政開支。
  11. Verify a sound, robust key recovery policy

    驗證一個良好的、健壯的密鑰恢復策略:
  12. Make sure that the xkms service provider has a sound and robust key recovery policy as it has a direct impact on signed document repudiation and encrypted document authenticity

    確保xkms服務提供程序具有一個良好的、健壯的密鑰恢復策略,因為這直接影響著簽名文檔的否認和加密文檔的可靠性。
  13. Key about control movement keys gold mining release paw, paw on the key recovery

    左右鍵控制移動,下鍵釋放爪子採金礦,上鍵收回爪子。
  14. Key pair in asymmetric cryptography, the public and private keys together. key recovery

    在非對稱密碼術中,公鑰和私鑰組合在一起成為密鑰對。
  15. Introduction : key about control movement keys gold mining release paw, paw on the key recovery

    左右鍵控制移動,下鍵釋放爪子採金礦,上鍵收回爪子。
  16. Kmc management control desk is responsible for the checkup of key recovery, the checkup of key destruct and the checkup of key trusteeship

    Kmc管理控制臺負責密鑰恢復審核、密鑰銷毀審核、密鑰託管審核。
  17. It is used for the management of the key recovery. kmc control desk can be divided into two parts, that is, kmc management control desk and judicial key recovery

    Kmc控制臺是kmc的一部分,用於密鑰恢復的管理, kmc控制臺分為kmc管理控制臺和司法密鑰恢復兩部分。
  18. The extended trusted computing and forensic services are used in collecting and analysis activity, including forensic sealing, forensic authentication, key recovery and distributed forensic services

    利用可信計算取證服務和改進的分析流程能夠有效解決可信計算環境中的數字取證調查問題。
  19. After ra operator receives the recovery request, he is able to see it through the kmc control desk. kmc operator should startup the kmc control desk regularly and browse the requests for the key recovery, and determine whether approve them or not

    Ra操作員錄入用戶的證書恢復請求后, kmc操作員就可以在kmc控制臺看到。 kmc操作員應當定期啟動kmc控制臺,瀏覽密鑰恢復申請,決定批準還是拒絕用戶的證書恢復申請。
  20. At present, pki which used in enterprise environment is still rare. jy _ ca is the pki product that we developed on the basis of openssl " s function library, it is formed of ca and ra. it realizes main function of typical pki / ca, which has certificate requisition, certificate signature, certificate revocation, certificate inquiry, private key recovery etc., it can meet the needs of different application occasions

    目前,企業使用的pki還不多見, jyca是我們基於openssl函數庫開發的pki產品,它由ca和ra構成,實現了一個典型的pki ca的主要功能,有證書申請、證書簽發、證書吊銷、證書查詢、密鑰恢復等,可以滿足各種應用場合的需要。
分享友人