2. It does not use any keystrokes and has near-crypto-key strength.
它不使用任何按键,并已接近加密的关键力量。
来自互联网
3. Given this, we shall likely not know for a prolonged period of time how successful the crypto-currency experiment will be.
鉴于此,我们有可能在很长一段时间内无法了解加密货币是否会成功。
来自互联网
4. To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.
为进一步提高密码芯片的安全性,密码芯片必须防止简单能量分析和差分能量分析的攻击。
来自互联网
5. These MIDS-LVT terminals provide real-time data communications, situational awareness, navigation and digital voice capability, all in a jam-resistant, crypto-secured package.
6. It's even more common to find crucial flaws in crypto-graphic algorithm implementations, which can turn strong encryption into weak encryption (or sometimes no encryption at all).
7. This prevents the crypto material from having to be stored on the appliance's file system, as the material will be cached in memory upon retrieval.
这阻止必须将加密材料储存在设备的文件系统中,因为加密材料可以在获取时缓存在内存中。
来自互联网
8. Each message is transported in its own crypto envelope, which includes both the payload and the identity of the sender.
每条消息都在自己的加密信封中传输,加密信封包含发送者的负载和身份。
来自互联网
9. The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.
使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。
来自互联网
10. You could use the same approach to help solve Crypto problems.
您可以使用同一种方法来帮助解决密码问题。
来自互联网
11. They're not hard to use but getting crypto right (meaning without huge flaws) is something that takes years and a lot of peer reviews from other crypto experts.
12. The ordered crypto products will be delivered by summer 2010.
这份加密产品定单将在2010年夏天交付。
来自互联网
13. There is no cure for crypto, but antiretroviral therapy to restore immunity can effectively clear up the infection.
没有治疗隐孢子虫病的方法,但抗逆转录病毒疗法可以恢复免疫功能从而有效地清除感染。
来自互联网
14. Using the best available crypto on the weakest platform on the planet won't buy you much security!
在世界上最脆弱的平台上使用最好的加密也不会给您带来多少安全性。
来自互联网
15. What should alarm you is that crypto still isn't there - in the millions of medical records, credit-card databases.
但是必须警告你在成百上千万的病历卡、信用卡数据库中还没有设置密码。
来自互联网
16. As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.
17. The TETRA crypto provides users with the freedom to choose a terminal based on their own specific needs while safeguarding the ability to communicate securely with all other users.
TETRA的加密功能为用户提供自由选择具体需要的终端,同时保障与所有其他用户的安全通信能力。
来自互联网
18. So in general, both of these are examples of what we call secret key crypto.
所以通常,这两个都是,加密技术的例子。
来自互联网
19. Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.
验证选择了刚刚上载的公钥的配置加密认证的文件名称。
来自互联网
20. There really are no more details on what procedures Dropbox has in place or how they implement the crypto to prevent unauthorized access to your files.
23. Wiggs suggests keeping crypto keys or other sensitive data in byte arrays which should be overwritten with zero as soon as they are no longer used.
Wiggs建议把加密密钥或其他敏感数据保存在字节数组中,那样能够在不需要的时候就会被重写为零。
来自互联网
24. The WebSphere DataPower SOA Appliance allows the crypto objects to be created individually and then selected in the configuration needed.