查询词典 encrypted
- 与 encrypted 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This message cannot be encrypted or signed because you do not\nyet have an email certificate.
由于您还没有电子邮件证书,此消息无法\n被加密或签名。
-
Now you can create a white-list of applications, and only these programs will be allowed to access the contents of the encrypted drive.
现在,您可以创建一个白名单的申请,只有这些程序将被允许进入的内容加密的驱动器。
-
The service provider performs the following steps: receiving a request from a customer to establish communication with another customer; confirming the identity of each customer; transmitting to each customer executable code enabling encrypted communication therewith; obtaining from each customer information regarding the customer's computing environment; preparing a set of applications for use by each customer, in accordance with the customer information and the customer's request; transmitting the set of applications as executable code to each customer; establishing a communication path to each customer; and specifying the communication path to the customers, thereby permitting the customers to communicate over the path using those applications.
服务提供商执行以下步骤:接收从一个客户发出的与另一个客户建立通信的请求;确认各个客户的身份;向各个客户发送能实现加密通信的可执行代码;从各个客户处获得关于客户计算环境的信息;按照客户信息和客户请求,准备一组应用程序供各客户使用;把这组应用程序作为可执行代码发送给各客户;建立与各客户的通信通道;向客户说明通信通道,从而允许客户使用那些应用程序在该通道上进行通信。
-
Armor Tools also features tools for making additional safety related adjustments including Encrypted Disk, The Eraser, Invisible Man, and File Shredder...
装甲用工具加工也以为做另外的安全有关的调整的工具为特色包括被加密的盘、橡皮擦、无形的人和文件切菜机
-
RIE is polynomially secure, and is very efficient in that its message expansion is 1+(k-1)/1 (where k is the security parameter and 1 the length of the encrypted message).
RIE是多项式安全的,并且效率较高,其信息膨胀率为1+(k-1)/1(k是安全参数,1是被加密数据的长度)。
-
This is the password that the person receiving your encrypted picture will need to know in order to extract the hidden message.
这是密码,该人接受您的加密图片将需要知道,为了提取隐藏的讯息。
-
D k E k (P=P 计算机专业英语 10-17 Chapter 10 Computer and Network Security 10.2 Modern Cryptography- Data Encryption DES has been studied by many of the world's leading cryptographers, but no weaknesses have been uncovered. To crack a DES-encrypted message a hacker or commercial spy would need to try 255 possible keys.
前略为了打开一个DES加密的报文,黑客或商业间谍需要试验前略为了打开一个DES加密的报文, DES加密的报文种可能的密钥, 255种可能的密钥,这种搜索在世界上最快的巨型机上也需好几天的计算机时间。
-
Bits also can be inserted in the encrypted payload to make it even difficult for eavesdroppers to discern any pattern in packet characteristics.
而且在加密的有效传输负载中可以加入干扰位,使之更难被窃听者识别出包特性的任何模式。
-
If the Web browser's SSL software simply sent a secret key to the Web site, then eavesdroppers could intercept it and use it to decrypt your encrypted messages.
如果这个网业的SSL如件系统简单的向网业发送了一个密码,黑客偷窃者就能中断它和转换成你的加密文件。
-
Under WEP, all encrypted packets use the first 24 bits for initialisation, the rest for data.
下的WEP ,所有加密的数据包使用的头24位的初始化,其余的为数据。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。