单词 | Encrypt |
例句 | (1) Account details are encrypted to protect privacy. (2) Your financial information is fully encrypted and cannot be accessed. (3) Messages encrypted using the public key can be decrypted only by someone with the private key. (4) Do you need to encrypt - if so, how? (5) The private key, used to encrypt transmitted information by the user, is kept secret. (6) Could not encrypt export server password! (7) Hash method used encryption technology to encrypt user password. (8) A and fast tool to encrypt and decrypt files. (9) CMS is used to sign or encrypt arbitrary messages. (10) Encrypt and Decrypt with different algorithm. (11) Can use blowfish algorithm to securely encrypt files. (12) They can encrypt communications, randomize behaviour[/encrypt.html], and so on. (13) Encrypt exported data using the destination key management service. (14) Please enter the password that was used to encrypt this certificate backup. (15) An easy and fast tool to encrypt and decrypt files. (16) Password - allows you to encrypt and decrypt files using a password. (17) So the MPI-based pseudo-random sequence parallel encrypt algorithm will provide relevant application and research with new methods and directions. (18) Before we can encrypt, we need to know the size of the buffer required for the cipher text . (19) Wireless hardware developers could use the software to encrypt their products. (20) Using password, data encrypt , fire wall, digital signature, network security management technology , etc are mainly introduced. (21) Users just have to click an on-screen button to encrypt an outgoing message. (22) Its other function is to take over your hard disc and encrypt all the file directories, rendering the disc unusable. (23) The radio transceivers had to be set up to receive, encrypt and relay their reports to Earth. (24) The secret - key system uses a single, wholly secret sequence both to encrypt and to decrypt messages. (25) The chaos is very sensitive to initial conditions and high-blooded randomicity, so it can be used in encrypt information. (26) If a cryptanalyst thinks that a user has used the same key to encrypt two different files, he can XOR the two files together and cancel out the output from the PRNG. (27) A more secure protocol is HTTPS (HTTP over SSL), which uses SSL to encrypt HTTP messages. (28) Each host within the virtual network is provided with a unique host key and the public version is used to encrypt the communication channel. (29) With nothing to do, and stranded on Coruscant during an Imperial siege, Ghent went to work with the New Republic crypt staff to slice through the Imperial battle encrypt code. (30) Software and data's safeguard measure should strengthen cryptogram verify, purview control, graphics technique and data encrypt technique. (31) They are best used to encrypt files on a hard disk. (32) A new block cipher is designed where the diffusion of matrix multiplication is combined with the confusion of specially designed matrix operation to encrypt information. (33) Voiceprint recognition technology can be used on the fields of thee-commerce, identity check, administration of justice, public security, encrypt passwords, household appliances, etc. (34) If we use exponentiation to encrypt or decrypt, the adversary can use logarithm to attack. (35) In order to ensure information transmission security, encrypt and decrypt was used in channel coding and decoding of data communication. (36) Demonstrates how to encrypt and decrypt strings using the Data Encryption Standard algorithm. (37) Describes how to use the managed data protection API ( DPAPI ) to encrypt and decrypt data. (38) The paper describes an implementing method and way of adding the power to encrypt the file for on-screen editing command in XENIX system. (39) The algorithm employs the baker transformation to encrypt binary watermark,[http:///encrypt.html] simple and timesaving in implementation. (40) Ideally, I would love to use TrueCryptto encrypt my USB drives in their entirety, but since having adminprivileges is always hit or miss when traveling, it's a risk I can'tafford to take. (41) Permutation code broke through the traditional concept of block algorithm, and improved the encrypt intensity greatly. (42) You can encrypt network data on specific ports to prevent network eavesdropping with a network protocol analyzer. (43) It has strongpoint of symmetry encryption scheme such as encryption speed and encrypt intensity, but also has advantage of public key encryption scheme on key distribution and key management. (44) In the history of cryptography, the Enigma was a portable cipher machine used to encrypt and decrypt secret messages. (45) The functions of WTLS protocol include user authentication, encrypt data and protect data integrity. (46) Zooey then uses Franny's public key to encrypt a message to her. (47) In his month-long stay on Coruscant, Ghent even sliced through the pulse transmitter encrypt code used by the mysterious Delta Source. (48) For example you can encrypt a PDF without allowing to print it. (49) XtraTools: Fast File Encryptor Pro - encrypt or decrypt files, contents of folders and contains a lot of additional tools. (50) Now pseudo-random sequence parallel encrypt algorithm is a very important issue of science and engineering, and has broad application domain. (51) Write your own program using the Google Calendar SOAP API's to extract, encrypt(), and store every calendar event in the past and future. (52) For privacy purposes using Encrypt Easy wipe-out utility you can also remove all traces of your Internet and system activities. (53) Encrypted file: This program can encrypt files, control permissions to access files. (54) DES cryptographic algorithm used to encrypt important data, files, safe. (55) This directory holds the certificates needed to encrypt messages to a recipient. (56) Public-key cryptography is one of the most important research direction of encryption, using mathematical function to construct public-key encrypt arithmetic is the nucleus of it. (57) The include.encrypt and exclude.encrypt options are used to select files for encryption processing. (58) Use any form of authentication required including clear text. Do not encrypt data. (59) There are some difficulties in the research and implement of pseudo-random sequence parallel encrypt algorithm, that is caused by lack of an effective tool to support it. (60) Use the ID file handle in the NSFNoteCopyAndEncryptExt2 method to encrypt the document. (61) CSP layer provides briefness and wieldy function library for trader doing encrypt integration. (62) This paper in introduces the frame of merit system online, including how to use digital digest and digital encrypt method for secure communication. (63) "Homomorphic" is a mathematical term meaning that if you do two things to a bit of data – say, encrypt it and process it – the order in which you do them won't matter. (64) Classification DNS, VPN, and firewall technology have been applied on net framework, inosculate encrypt, transaction process, query optimize into software. (65) Symmetric Key algorithm uses the same key to encrypt and decrypt the data. (66) A single key is used to encrypt all of the cookies. (66) (67) Encryption module commonly uses pseudo-random sequence encryption method of communication system for reference, and them sequence is produced by Matlab software to encrypt the image in disorder. (68) WEP therefore uses the RC4 stream to encrypt data which is transmitted over the air, using usually a single secret key (called the root key or WEP key) of a length of 40 or 104 bit. (69) This scheme adapts service group to classify group members and uses complete binary tree scheme to update the key that encrypt single data stream in service group. (70) It can encrypt or decrypt files, contents of folders and contains a lot of additional tools. (71) In order to protect the security of VoIP transmission, it is necessary to encrypt the voice data and voice compression at low bit rate is chosen for decreasing the large computation of encryption. (72) Management center to encrypt card manufacturing company offers encryption card function and quantity demand, encryption card subscription agreement signed. (73) Before uploading data to the cloud, Alice uses the data processor to encrypt and encode the documents along with their metadata (tags, time, size, etc.), then she sends them into the cloud. (74) Similarly, you can encrypt any format by providing IANA values (refer to the IANA Web site, see Resources). (75) An Asymmetric Key key to encrypt the data and another key to decrypt the data. (76) For the system encrypt a small program to share their code! (77) The face encryption system mainly include face detection, identity authentication, key producing, Encrypt and Decrypt process. (78) Public-key cryptography is one of the most important research field of encryption, using mathematical function to construct public-key encrypt arithmetic is the nucleus of it. (79) I then extract the initialization vector (IV) into a byte array, block encrypt the clear data, and prefix the IV bytes to the encrypted data bytes. (80) This sample uses the private key corresponding to the public key used to encrypt the data, and assumes you already have the cipher text created in the preceding example. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。