According to SpiderOak,the software uses encrypted cloud storage and client-side encryption key creation, so SpiderOak employees cannot access users' information.
一旦一个文件被删除,那它的加密密钥就会被删除,并且绝对没有办法再解密该文件。
Once a file is deleted, its encryption keys are being wiped, and there is absolutely no way to decrypt that file.
有了数字资产,交易就是结算,它们控制的加密密钥和数字所有权可以降低交易后的延迟和交易对手风险。
With a digital asset, trade is settlement, and the cryptographic keys and digital ownership they control can lower post-trade latency and counterparty risk.
互联网名称与数字地址分配机构(ICANN)计划更新有助于保护域名系统(DNS)的加密密钥。
The Internet Corporation of Assigned Names and Numbers(ICANN)is planning to update the cryptographic key that helps protect the Domain Name System(DNS).
IT组织在控制和管理他们的加密密钥时遇到的挑战是:复杂性:管理大量加密密钥。
Several challenges IT organizations face when trying to control andmanage their encryption keys are: Scalability: Managing a large number of encryption keys.
任何人都可以使用比特币的加密密钥,任何人都可以成为一个节点并加入网络,任….
Anyone can use bitcoin's cryptographic keys, anyone can be a node and join the network, and anyone can become….
程序在安装时自动生成此数据库的加密密钥,而无需与用户进行任何交互。
The encryption key for this database is automatically generated by the program when it is installed without any interaction by the user.
SpiderOak uses encrypted cloud storage and client-side encryption key creation, so even employees of SpiderOak cannot access any user information.
鉴于不断增加的安全攻击和违规行为,ICANN决定更新DNS地址的加密密钥。
Keeping in mind the ever increasing and changing security threats on the internet,ICANN needs to update the encryption keys for the DNS addresses.
AzureKeyVault可帮助保护云应用程序和服务使用的加密密钥和机密。
Azure Key Vault helps safeguard cryptographic keys and secrets used by cloud applications and services.
年4月30日,一个名为“Rudd-0”的博客发布了HDDVD的加密密钥,并请读者传播此密钥。
On April 30, 2007, a blogger named"Rudd-O" published the encryption key for HD DVDs and asked readers to share it widely.
对于所有写入云的数据而言,在上传之前,都要使用由客户创建和管理的加密密钥进行加密。
All data written to the cloud isencrypted prior to being uploaded using encryption keys that are created and managed by the customer.
DM技术人员称该技术涉及“64位加密”,每个已安装的系统的特定硬件都需要唯一的加密密钥。
The group claimed that the technologyinvolves a"64-bit encryption machine" that requires cryptographic keys unique to the specific hardware of each installed system.
KDF使用密码作为起点,然后从中生成实际的安全加密密钥。
That KDF uses the password as a starting point from which itwill then generate the actual secure encryption key itself.
Microsoft, for example,recently identified two apps that unintentionally revealed their private encryption keys to the public, rendering their communications insecure.
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt