cryptographic造句
- 1. One of the museum exhibits is this underground magnet antenna from the Bita cryptographic hardware.
- 博物馆的展馆之一是来自于 Bita 加密硬件的地下磁铁天线。
youdao
- 2. I first discovered the Napoleonic cryptographic battle a few years ago when I was reading Sir Charles Oman's epic History of the Peninsular War.
- 几年前,我在阅读查尔斯·奥曼爵士的恢弘巨著《半岛战争史》时,第一次发现了拿破仑时期的密码战。
youdao
- 3. Create and exchange cryptographic keys for saml.
- 创建并交换用于SAML的加密密钥。
youdao
- 4. We need to implement cryptographic functionality as well.
- 我们还需要实现密码功能。
youdao
- 5. We will now try to form a strategy for cryptographic support.
- 现在我们将尝试形成一个用于密码支持的策略。
youdao
- 6. In fact, even MIDP 2.0 will not include generic cryptographic APIs.
- 实际上,甚至MIDP 2.0也将不包含通用密码api。
youdao
- 7. This handshake produces the cryptographic parameters of the session.
- 此次握手将生成会话的加密参数。
youdao
- 8. As with any cryptographic keys, these should be changed periodically.
- 与任何密码术密钥一样,应该定期改变这些密钥。
youdao
- 9. There is no 100-percent uncrackable, full-proof cryptographic method.
- 不存在 100% 不受攻击的绝对完整的加密方法。
youdao
- 10. The new LTPA token USES the following strong cryptographic techniques.
- 新的ltpa令牌使用以下强加密技术。
youdao
- 11. This flexibility allows the STDLLs to support any cryptographic device.
- 这种灵活性使得STDLL 可以支持任何密码设备。
youdao
- 12. Most importantly, cryptographic authentication information can be stolen.
- 最重要的是,密码认证信息可能被盗。
youdao
- 13. The cryptographic information is kept in the extended attributes for each file.
- 加密信息保存在每个文件的扩展属性中。
youdao
- 14. A credential can be anything from simple password to a complex cryptographic key.
- 凭证可以是从简单的密码到复杂的加密密钥的任何东西。
youdao
- 15. For this traffic to be best protected, strong cryptographic ciphers should be used.
- 为了更好地保护通信流,应该使用强密码。
youdao
- 16. Ciphers are cryptographic algorithms that can reversibly transform data using a key.
- 加密是使用密钥对数据进行可逆转换的加密算法。
youdao
- 17. There are a variety of cryptographic algorithms to choose from when performing encryption.
- 在执行加密时,有多种密码学算法可供选择。
youdao
- 18. I first instantiate the DESEngine class, which implements the DES cryptographic algorithm.
- 我首先实例化了DESEngine类,这个类实现了DES加密算法。
youdao
- 19. The previous step generates cryptographic keys and a password used in LTPA token generation.
- 之前的步骤生成用于生成ltpa令牌的密钥和密码。
youdao
- 20. Cryptographic authentication USES mathematics and a digital secret in order to authenticate users.
- 密码认证使用数学和数字秘密来认证用户。
youdao
- 21. Importantly, these cryptographic requests consume more resources per call than other request types.
- 这点很重要,因为这些加密请求比其他类型的请求消耗更多的资源。
youdao
- 22. User data is stored on a different partition and it is encrypted using cryptographic random Numbers.
- 用户数据存储在不同的分区上并通过随机数字进行加密。
youdao
- 23. As mentioned earlier, messages and certificates make use of cryptographic hashes to verify integrity.
- 正如前面所提到的那样,消息和证书使用加密哈希来验证完整性。
youdao
- 24. One of the museum exhibits is this underground magnet antennae from the 'Bita' cryptographic hardware.
- 博物馆的展馆之一,是来自于“碧塔海”加密硬件的地下磁铁天线。
youdao
- 25. The Engineering Design Models are used to demonstrate a subset of cryptographic functions and features.
- 工程设计模块用于演示加密功能和特性。
youdao
- 26. Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash.
- 先尝试在普通使用场景下键入数千个单词,然后再输出密码散列。
youdao
- 27. The user can add FM to the system, that is the complete saving and establishing of cryptographic information.
- 这个用户可以在系统中添加fm,这会完整地保存并建立密码学信息。
youdao
- 28. If the device only performs a simple cryptographic function, all of the objects must be managed by the software.
- 如果设备只执行简单的密码功能,则所有对象必须由软件来管理。
youdao
- 29. The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.
- 签发机构在证书上“签名”,用的是通过一种密码算法产生的散列值。
youdao
- 30. The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.
- NFSRPC请求可以使用密码认证的能力提供了端到端的NFS安全支持。
youdao