1. One of the museum exhibits is this underground magnet antenna from the Bita cryptographic hardware.
博物馆的展馆之一是来自于 Bita 加密硬件的地下磁铁天线。

youdao

2. I first discovered the Napoleonic cryptographic battle a few years ago when I was reading Sir Charles Oman's epic History of the Peninsular War.
几年前,我在阅读查尔斯·奥曼爵士的恢弘巨著《半岛战争史》时,第一次发现了拿破仑时期的密码战。

youdao

3. Create and exchange cryptographic keys for saml.
创建并交换用于SAML的加密密钥。

youdao

4. We need to implement cryptographic functionality as well.
我们还需要实现密码功能。

youdao

5. We will now try to form a strategy for cryptographic support.
现在我们将尝试形成一个用于密码支持的策略。

youdao

6. In fact, even MIDP 2.0 will not include generic cryptographic APIs.
实际上,甚至MIDP 2.0也将不包含通用密码api。

youdao

7. This handshake produces the cryptographic parameters of the session.
此次握手将生成会话的加密参数。

youdao

8. As with any cryptographic keys, these should be changed periodically.
与任何密码术密钥一样,应该定期改变这些密钥。

youdao

9. There is no 100-percent uncrackable, full-proof cryptographic method.
不存在 100% 不受攻击的绝对完整的加密方法。

youdao

10. The new LTPA token USES the following strong cryptographic techniques.
新的ltpa令牌使用以下强加密技术。

youdao

11. This flexibility allows the STDLLs to support any cryptographic device.
这种灵活性使得STDLL 可以支持任何密码设备。

youdao

12. Most importantly, cryptographic authentication information can be stolen.
最重要的是,密码认证信息可能被盗。

youdao

13. The cryptographic information is kept in the extended attributes for each file.
加密信息保存在每个文件的扩展属性中。

youdao

14. A credential can be anything from simple password to a complex cryptographic key.
凭证可以是从简单的密码到复杂的加密密钥的任何东西。

youdao

15. For this traffic to be best protected, strong cryptographic ciphers should be used.
为了更好地保护通信流,应该使用强密码。

youdao

16. Ciphers are cryptographic algorithms that can reversibly transform data using a key.
加密是使用密钥对数据进行可逆转换的加密算法。

youdao

17. There are a variety of cryptographic algorithms to choose from when performing encryption.
在执行加密时,有多种密码学算法可供选择。

youdao

18. I first instantiate the DESEngine class, which implements the DES cryptographic algorithm.
我首先实例化了DESEngine类,这个类实现了DES加密算法。

youdao

19. The previous step generates cryptographic keys and a password used in LTPA token generation.
之前的步骤生成用于生成ltpa令牌的密钥和密码。

youdao

20. Cryptographic authentication USES mathematics and a digital secret in order to authenticate users.
密码认证使用数学和数字秘密来认证用户。

youdao

21. Importantly, these cryptographic requests consume more resources per call than other request types.
这点很重要,因为这些加密请求比其他类型的请求消耗更多的资源。

youdao

22. User data is stored on a different partition and it is encrypted using cryptographic random Numbers.
用户数据存储在不同的分区上并通过随机数字进行加密。

youdao

23. As mentioned earlier, messages and certificates make use of cryptographic hashes to verify integrity.
正如前面所提到的那样,消息和证书使用加密哈希来验证完整性。

youdao

24. One of the museum exhibits is this underground magnet antennae from the 'Bita' cryptographic hardware.
博物馆的展馆之一,是来自于“碧塔海”加密硬件的地下磁铁天线。

youdao

25. The Engineering Design Models are used to demonstrate a subset of cryptographic functions and features.
工程设计模块用于演示加密功能和特性。

youdao

26. Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash.
先尝试在普通使用场景下键入数千个单词,然后再输出密码散列。

youdao

27. The user can add FM to the system, that is the complete saving and establishing of cryptographic information.
这个用户可以在系统中添加fm,这会完整地保存并建立密码学信息。

youdao

28. If the device only performs a simple cryptographic function, all of the objects must be managed by the software.
如果设备只执行简单的密码功能,则所有对象必须由软件来管理。

youdao

29. The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash.
签发机构在证书上“签名”,用的是通过一种密码算法产生的散列值。

youdao

30. The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.
NFSRPC请求可以使用密码认证的能力提供了端到端的NFS安全支持。

youdao