鑰本 的英文怎麼說

中文拼音 [yàoběn]
鑰本 英文
kagimoto
  • : 鑰名詞(鑰匙) key
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  1. Then he arranged all his beautiful turkish arms, his fine english guns, his japanese china, his cups mounted in silver, his artistic bronzes by feucheres and barye ; examined the cupboards, and placed the key in each ; threw into a drawer of his secretary, which he left open, all the pocket - money he had about him, and with it the thousand fancy jewels from his vases and his jewel - boxes ; then he made an exact inventory of everything, and placed it in the most conspicuous part of the table, after putting aside the books and papers which had collected there

    然後,他整理一下他的那些漂亮的土耳其武器,那些精緻的英國槍,那些日瓷器,那些銀蓋的玻璃杯,以及那些刻有「費乞里斯」或「巴埃」費乞里斯一八七一八五二,法國雕塑家。譯注等名字的銅器藝術品他仔細看了一下衣櫃,把匙都插在框門里打開一隻書桌抽屜,把他身上所有的零用錢,把珠寶箱里的千百種珍奇的古玩品都仍到裏面,然後他到了一張詳細的財產目錄放在最引人注目的地方。
  2. Bohemia : the groom gives the bride a rosary, a prayer book, a girdle with three keys ( to guard her virtue ), a fur cap, and a silver wedding ring

    波黑人:新郎向新娘贈送一串念珠,一祈禱文,一根上面串著三把匙的腰帶(用以保護她的貞潔) ,一頂毛皮帽,一個銀的結婚戒指。
  3. For strongly named assemblies, equivalency requires the assembly name, version, public key token, and culture to be identical

    對于具有強名稱的程序集,等效性要求程序集名稱、版、公標記和區域性均應相同。
  4. In this dissertation we make a study of subliminal channels that conclude the progress, the application, the model, the construction, the stego - key, the capacity, the security, the way to realize subliminal - freeness, and so on

    文對閾下通道技術進行了比較全面的總結和研究,包括閾下通道的發展狀況,應用前景,閾下通道的模型,構造方法,隱匿密,容量,安全性以及封閉方法等。
  5. Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on

    研究了公加密系統中的橢圓曲線加密理論,詳細闡述了有限域上橢圓曲線的結構及其基運算; 3
  6. Then, one day in school, at the end of april, a friend of mine gave me a little green book. it said " the key of immediate enlightenment " on the cover, and it mentioned the quan yin method of meditation, and also that it was the best method of all

    接著,四月底某天在學校的時候,一位同學給了我一綠色小書,封面上寫著:即刻開悟之,裏面提到觀音法門的打坐方法,而且說那是最好的方法。
  7. The robber took away her purse with two thousand five hundred nt, some keys and a handbook inside.

    強盜奪去她的包,裏面有兩千五百元臺幣,一些匙和一銀行存摺。
  8. No, but the robber took away her purse with two thousand five hundred nt, some keys and a handbook inside.

    沒有,但強盜奪去她的包,裏面有兩千五百元臺幣,一些匙和一銀行存摺。
  9. The large table, on which lay books and plans, the high bookcases with keys in the glass - covered doors, the high table for the prince to write at, standing up, with an open manuscript - book upon it, the carpenters lathe, with tools ranged about it and shavings scattered around, all suggested continual, varied, and orderly activity

    一張大桌子桌子上擺著書和圖表,幾個高大的玻璃書櫃匙插在櫃門上,一張專供站著寫字用的高臺子臺子上擺著一打開的練習,一張車床上面放著幾件工具,四周撒滿了刨屑,這一切表明這里在進行經常性的多種多樣的富有成效的活動。
  10. Our factory produces led flashlight mainly, key light, tests such serial electronic gifts products as the paper money device, etc.

    廠主要生產led手電筒,匙燈,驗鈔器等系列電子禮品產品。
  11. . . lassie would have brought me a key

    . . .萊絲該帶把匙給我的
  12. Lassie would have brought me a key

    .萊絲該帶把匙給我的
  13. The dissertation aims to study a fingerprint key algorithm suitable for fingerprint minutiae

    文主要研究適用於指紋細節點信息的指紋密演算法。
  14. This article describes how to configure openssh for host - based and public key - based authentication for the aix, linux, solaris, and hp - ux operating systems

    文描述如何為aix 、 linux 、 solaris和hp - ux操作系統上基於主機和基於公的認證配置openssh 。
  15. This went on until one day, a sister initiate gave me a copy of " the key of immediate enlightenment ". in the book was a chapter entitled " the buddha is not the anuttara samyak sambodi " the ultimate truth. upon reading it, i was awestruck

    直到有一天一位師姊拿了一即刻開悟之給我,其中有一篇是佛非無上正等正覺,看完之後心中震撼不已,沒想到竟然有人能將如此抽象的概念用淺顯的文字解釋。
  16. Passing the shared secret around can become a potential liability : the shared secret can be exchanged out of band, or the shared secret itself may be encrypted using another key

    傳遞共享密可能成為潛在的缺陷:共享密可以通過不同的方式交換,或者共享密鑰本身使用其他密加密。
  17. The shared secret key itself is encrypted using the public key you created in the previous step, and is embedded in the xml content

    共享密鑰本身使用上一步生成的公加密並嵌入xml內容中。
  18. Since the shared secret key is usually smaller than the content, a public key is used to encrypt only the shared secret key, which itself is embedded in the content

    因為共享密通常比內容小,公只用於加密共享密,而把共享密鑰本身嵌到內容中。
  19. An attacker who obtains the file containing the working keys will not be able to use them to decrypt the ciphertext, as the keys are themselves encrypted by the master key

    攻擊者即使獲得包含工作密的文件,也不能使用工作密來解密密文,因為這些密鑰本身是由主密加密過的。
  20. In this way, we can manage private keys securely and effectively. having deeply studied the private key management, the author designs a private key management system in this paper. the, author also analyses the risks of the process of private key management from the point of view of system and puts forward the method of decreasing the risk to the extreme extent

    文從用戶使用私的角度分析了kea對用戶私管理的不足和現有的純粹地化管理私的不足,並由此出發,借鑒密託管的思想,同時考慮到私鑰本地化存儲的要求,提出了一種新的私管理技術,它不僅能融入到現有的pki體系中,且能安全、有效地對用戶的私進行管理。
分享友人