encryption key 中文意思是什麼

encryption key 解釋
加密密鑰
  • encryption : 編成密碼
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. The frontpage backdoor became somewhat famous due to a hidden encryption key that read, " netscape engineers are weenies !

    Frontpage后門變得有點出名,由於隱藏的加密密鑰是「 netscape工程師是蠢貨! 」
  2. The encryption key itself is the most vulnerable component of any code ; enigma stymied the efforts of the greatest code breakers of europe and america, including alan turing, and was never actually broken

    相反,大多數以這種方法保護的系統無法執行一次足夠的安全性審查;有一些事情是公開的,它允許您從用戶那裡獲得免費的安全性忠告。
  3. Finally, the system ? implementation and the process of the assignment of the encryption key is discussed in detail, the core of which is how to design a safe, credible encryption key assignment and deliver procedure0

    最後針對系統的實現,詳細討論了密鑰分配的實現過程,核心的內容是如何設計安全可靠的密鑰分配及密鑰傳遞流程。
  4. Another problem that eliminates many encryption systems is fundamental to their design : they utilize a secret encryption key, a unique mathematical value used to encode text, which must be known to both parties client and server in any transaction

    (這太容易做到了,所以我們說: 「我們不用鉛筆和紙來做這件事。我們的許多筆記都用鋼筆寫。我們不需要擦除更多東西。 」
  5. Here you can specify the length of the encryption key

    這里您可以指定密鑰長度。
  6. Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it

    接收者利用發送者的公開密鑰和他們自己的秘密密鑰的結合,解開該報文的秘密編碼,並解密之。
  7. Publicly revealing an encryption key does not thereby reveal the correspongding decryption decryption

    即使獲取了公開的加密鑰,也不能反推出解密鑰。
  8. Troubleshooting initialization and encryption key errors

    初始化和加密密鑰錯誤故障排除
  9. And the associated encryption key for each registered user

    項,並且每個注冊用戶有一個相關的加密密鑰。
  10. Note that changing an encryption key may require a significant maintenance window ; all existing encrypted data will require decryption with the old key and encryption with the new key

    注意,更改加密密鑰時可能需要一個有效的維護窗口。所有已經被加密的數據需要用舊的密鑰進行解密,然後用新的密鑰加密。
  11. Utility is an encryption key management tool

    實用工具是一個加密密鑰管理工具。
  12. The presented scheme could efficiently update the traffic encryption key ( tek ) in the environment of lack of trusted centre and mobility of nodes

    方案在缺少可信中心和網路拓撲結構動態變化的環境中能有效地更新組通信密鑰。
  13. Name of the encryption key ; this becomes the value of the child text node of the

    :加密密鑰的名稱;在如本專欄文章第1部分解釋的xml加密期間,它是
  14. Corresponding encryption key next move around the ladder at the local, key can climb the ladder, tackling key link will allow wildlife to the direction quickly

    方向鍵對應流氓兔上下左右移動,在梯子的地方按「上」鍵可以爬上梯子,按著方向鍵不放,可以讓流氓兔向該方向迅速移動。
  15. The encryption key will be computed

    加密密鑰將基於passphrase計算
  16. Tkip is a rapid rekeying protocol that changes the encryption key about every 10, 000 packets and according to dennis eaton, weca chairman, it will be available in the second quarter of this year

    Tkip是一種快速重新加密協議,它大約每隔10 , 000個包就更改加密密鑰,而且據weca主席dennis eaton所說,今年第二季度就可使用它。
  17. Option when exporting the encryption key information ; otherwise the exported key will be from the machine key store

    選項;否則,導出的密鑰將來自計算機密鑰存儲區。
  18. Option when importing the encryption key information ; otherwise the exported key will be imported to the machine key store

    選項;否則,導出的密鑰將導入到計算機密鑰存儲區中。
  19. Granting read access to an rsa encryption key

    授予對rsa加密密鑰的讀取權限
  20. Propose three key hierarchy, private key session key temporal key, and achieve separation of encryption key and authentication key

    3提出了三級密鑰體系機制,即私鑰、會話密鑰和臨時密鑰,實現了認證密鑰和加密密鑰的分離。
分享友人