查询词典 Encryption
- 与 Encryption 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
I'm listening to the cypherpunks not because I think that anarchy is a solution to anything but because it seems to me that encryption technology civilizes the grid-locking avalanche of knowledge and data that networked systems generate.
我之所以能听得进去密码浪子们的观点,并不是因为我觉得无政府主义是解决所有问题的万灵丹,而是因为在我看来,加密技术能够让因为网络系统而产生的那种知识和数据的雪崩,那种会将所有空隙填满堵牢的雪崩(grid-locking avalanche)平息下来或者至少变得&文明&一些。
-
This paper concentrates on the theory and technique of identity-based encryption and its application on Eamil system.
本文的主要工作是研究基于身份的加密体制及其在电子邮件系统中的应用。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
当人们尽力迎合数字交流,电子商务成为经济中的一支力量时,对于密码近乎魔术的译码和确认功能的需求日益迫切。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
当人们享受数字通讯,而且电子商贸在经济中变得很重要,对编码和认证近乎神奇的加密作用会很火热。
-
As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.
谁能够抵制像移动电话和联网计算机这样的革新?它们使任何人在任何地方都能被听到。
-
After the folder encryption to exist independently EXE file, the software can be installed without an independent declassified.
加密后的文件夹,以EXE文件独立存在,不需安装本软件即可独立解密。
-
In structure, in order to offer the agility of scheme implementation, it adopts hierarchical design, combining the virtue of hybrid Identity-Based public key schemes, which makes signature and encryption arithmetics configured and decouples them.
在结构上,采用了层次式的设计,结合混合的基于身份公钥方案的优点,使得基于身份的签名和加密的功能可配置,并且解决了加密、签名算法的紧耦合问题,为方案的实现提供了灵活性。
-
The data cannot be decrypted because the key encryption algorithm it used does not match that of your certificate.
由于它所使用的密钥加密算法与您证书中的算法不匹配,无法对这些数据进行解密。
-
Therefore, it may happen that files encrypted by Encryption Workshop will not be decrypted by other software or vice versa.
因此,它可能发生的文件进行加密的加密讲习班将不会解密其他软件或反之亦然。
-
With link encryption, the data must be decrypted and re-encrypted at each of these points.
用链路加密时,数据必须在每一场点上进行解密和再加密。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。