crypto

crypto

1. ecc: elliptic curve crypto

(椭圆曲线加密)

2. tradittional crypto in C source code integrity, and can be used directly.

(译):tradittional加密的C源代码的完整性,并可以直接使用。

3. Crypto code for the Elliptic Curce Cryptography complete source code, has been tested.

(译):加密代码的完整的椭圆Curce加密源代码,已经过测试。

4. * SDS uses the best practices of crypto security.

*特别职务队使用的最佳做法加密的安全。

5. - Above is an example, this could also be twofish, blowfish or anything other crypto module that you would like to use.

+ 上面只是个范例,它有可能会是 twofish(一种加密演算法名称)、blowfish(一种加密演算法名称)或其他任何可能的加密模组,依照你的喜好去使用。

6. Your SMTP server claims to support TLS, but negotiation was unsuccessful. You can disable TLS in KDE using the crypto settings module.

01您的SMTP伺服器并不支援TLS。如果您希望在没有加密的情况下进行连线,请停用TLS。

7. Your POP3 server claims to support TLS but negotiation was unsuccessful. You can disable TLS in KDE using the crypto settings module.

05您的POP3服务器声明支持TLS,但是协商失败了。您可以在KDE的加密设置模块中禁用TLS。

8. Crypto plug-in "%1" cannot verify signatures.

11加密算法插件“%1”无法校验签名。

9. crypto crystalline

adj. 隐晶质的

10. -source code for EJB business logic handling , just want to find some crypto program.

EJB,business logic 处理程序。主要想找一点关于加密方面的程序。

11. The crypto checkpoint files for the resource identified by the GUID.

GUID标识的资源的加密检查点文件。

12. can disable TLS in KDE using the crypto settings module.

KDE 的加密设置模块中禁用 TLS。

13. Mad. Exe (the system attendant process) does not have access to (permission for) the Crypto container.

Mad.exe(系统助理进程)不具有访问Crypto容器的权限。

14. crypto depression

n. 潜洼

15. crypto crystal

n. 隐晶

16. Attack on RSA Public-key Crypto system Using Unresolution into Factors

RSA公钥密码体制的非因子分解攻击

17. unified RSA/SHA crypto function unit

RSA/SHA复用加密单元

18. The name of the Windows cryptography API (crypto API) cryptographic service provider (CSP).

Windows密码API(crypto API)密码服务提供程序(CSP)的名称。

19. facsimile data crypto unit

传真数据密码机

20. Crypto Equipment for Low Speed Telegraphy

低速电报隐蔽设备

21. You might not see the crypto, but it's there, going into action every time your computer tells you it's going into the secret “secure mode.

你看不到密码,但它是存在的。每次你的电脑告诉你它将进入秘密的“安全模式”中时,密码就起作用了。

22. The encryption using crypto algorithms is ensured by the fact that it is computationally infeasible to generate plaintext that matches the hash value.

使用加密算法的保密性由这样一个事实保证,即生成与哈希值匹配的明文在计算上是不可行的。

23. how to translate "Crypto Transponder"?

保密异频雷达收发机?

24. crypto radio teletype

保密无线电传

25. Secure scheme of completely-varied binary quantum crypto algorithm implemented on e-government

全变异二进制位量子加密算法对电子政务实施的安全方案

26. public key crypto standard

公钥加密标准

27. public key crypto system

公钥加密系统

28. Public Key Crypto Scheme

公钥密码方案

29. The Application of Number Theory in Public Key Crypto System

关于数论在公开密钥加密体制中的应用

30. Study on the Realization of Crypto Arithmetic Function Using Applicable Specific Programmable Logic

利用特定应用可编程逻辑实现密码算法功能的研究

31. Crypto API

加解密接口

32. The Crypto container that contains the private key is corrupted.

包含私钥的Crypto容器已损坏。

33. Crypto map cisco client configuration address respond!

响应客户端地址请求!

34. Crypto map clientmap client configuration address respond

响应客户端的之请求

35. Crypto Equipment Functional Inoperative for Parts

因缺零件密码设备不能使用

36. On Windows, OpenVPN can read certificates and private keys from smart cards which support the Windows Crypto API.

在Windows环境下, openvpn可以阅读证书及私人密码匙从智能卡,其中支持Windows加密的空气污染指数。

37. That it used to be illegal under US law to export crypto to any country, which has been relaxed though, but does not include Cuba.

在以往,根据美国的法律,输出编码方式到其它国家是违法的。虽然这项禁令已放宽不少,但古巴并不在放宽对象之列。

38. Crypto map shiju interface outside

在外网口应用加密图

39. Wireless Web Services Application Security Based on Bouncy Castle Crypto APIs

基于Bouncy Castle Crypto API的无线Web Services应用安全

40. Programmable processor architecture for crypto information based on EPIC

基于EPIC技术的密码处理器体系结构研究与设计

41. In this paper, through DBMS CRYPTO, the authers introduce a general database encryption package CIPHER, based on an application example.

基于具体应用实例,介绍了利用DBMS_CRYPTO设计的一个数据库加密程序包CIPHER。

42. Basic Crypto Analysis Course

基本密码分析课程

43. Base Smart Card Crypto Provider?

基本智能卡加密供应商?

44. The other end of the security negotiation is requires strong crypto but it is not supported on the local machine.

安全协商的另一端要求较强的加密,但本地计算机不支持。

45. wide-band voice crypto module

宽带话音密码模块

46. Director of the Crypto and Communication Security

密码与通信保密处处长

47. Crypto Center

密码中心

48. Crypto Center Watch Officer

密码中心值班军官

49. Cascade characters and applications of Bent function in crypto system

密码体制中Bent函数的级联的性质与应用

50. crypto analysis

密码分析, 密码分析学

51. crypto graphical protocol

密码协议

52. Research on formalized method of crypto protocol analysis

密码协议分析的形式化方法研究

53. crypto room

密码室

54. What should alarm you is that crypto still isnt there s active opposition.

密码将真能发送数字现金代替纸币,使我们能在商店里使用它吗?

55. crypto microprocessor

密码微处理器

56. crypto information

密码情报

57. Crypto Access Authorization

密码接触批准

58. crypto control unit

密码控制装置

59. Crypto Adapter Unit

密码改编部件

60. Crypto Radio Service

密码无线电勤务

61. crypto period

密码时限

62. Crypto service provider

密码服务提供程序

63. crypto machine

密码机

64. crypto module

密码模块

65. crypto management recorder

密码管理记录器

66. crypto system

密码系统

67. crypto terminal

密码终端

68. crypto chip

密码芯片

69. crypto unit

密码装置

70. Crypto Auxiliary Unit

密码辅助部件

71. Crypto Communication Network

密码通信网

72. Crypto Remote Control Unit

密码遥控装置

73. crypto key memory

密钥存储器

74. Supply crypto chips with independent intellectual property rights so as to provide the foundation for development of independent information security techniques and industry.

将两种入侵检测技术相结合,研发基于高速网络的高性能入侵检测系统。

75. Levchin: Initially, I wanted to do crypto libraries, since I was a freshly mintedacademic.

开始由于我才从纯理论化的“造币厂”出来,所以我想做一个加密库程序。

76. asynchronous crypto unit

异步密码装置

77. As people cozied up to digital communications, and e-commerce became a force in the economy, the need for crypto's near-magical power of encryption and authentication became red hot.

当人们尽力迎合数字交流,电子商务成为经济中的一支力量时,对于密码近乎魔术的译码和确认功能的需求日益迫切。

78. When you do so using Office Access 2007 and a file that uses the new file format, Access uses the Windows Crypto API to encrypt the data.

当使用Office Access 2007和采用新型文件格式的文件进行此操作时,Access会使用Windows Crypto API对数据进行加密。

79. English: Your POP3 server claims to support TLS but negotiation was unsuccessful. You can disable TLS in KDE using the crypto settings module.

您的POP3服务器声明支持TLS,但是协商失败了。您可以在KDE的加密设置模块中禁用TLS。

80. Our flagship product, Security Builder Crypto, initially released in 1997, was the first commercial product based on ECC.

我们的旗舰产品Security Builder Crypto于1997年首次发布,是基于ECC的第一个商业产品。

英语宝典
考试词汇表