What is the translation of " CRYPTOGRAPHIC KEYS " in Chinese?

Examples of using Cryptographic keys in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
Windows does not transmit cryptographic keys outside of your computer.
Windows不会将加密密钥传输到您的电脑之外。
LoT devices are fully able of establishing, maintaining,and employing long cryptographic keys.
物联网设备完全可以建立、维护以及使用长密钥
IKE automatically generates cryptographic keys and IPsec security associations.
IKE自动生成加密密钥和IPsec安全关联。
When cryptographic keys are combined with the distributed network, a useful form of interaction emerges.
密码密钥与这个网络结合时,一种非常有用的数字交互形式就出现了。
Given sufficient time and data, cryptographic keys can eventually be compromised.
如果有足够的时间和数据,加密密钥最终都会被破解。
When cryptographic keys are combined with this network, a super useful form of digital interaction emerges.
密码密钥与这个网络结合时,一种非常有用的数字交互形式就出现了。
In a nutshell, such equipment holds cryptographic keys that are protected by hardware.
简而言之,此类设备拥有受硬件保护的加密密钥
In addition, cryptographic keys will have to be managed by users who will likely view this as an unnecessary burden.
此外,加密密钥必须由用户管理,用户可能会认为这是不必要的负担。
Over 100,000 Github code repositories leak API and cryptographic keys every day.
超过10万个githubrepos泄露了api或加密密钥.
In addition, the cryptographic keys also maintain the anonymity of users during data exchange.
此外,加密密钥还会在数据交换过程中维护用户的匿名性。
You need to be able to execute code on the same CPU as the target process in order tosteal cryptographic keys this way.
你需要能够在与目标进程相同的CPU上执行代码,以此方式窃取加密密钥
These measurements can then be used to derive cryptographic keys and other sensitive information from chips.
然后使用这些数据,从芯片中导出加密密钥和其他敏感信息。
The change of cryptographic keys is expected on October 11, and this will happen worldwide for the first time.
密码密钥的更改预计将于10月11日发布,这将首次在全球范围内发生。
Thereafter, your web server will generate 2 cryptographic keys: the private key and the public key..
然后,您的Web服务器将创建两个加密密钥:私有密钥和公共密钥。
When cryptographic keys are combined with a distributed network, an immensely useful form of digital interactions emerges.
密码密钥与这个网络结合时,一种非常有用的数字交互形式就出现了。
This is just one of the instances where blockchain technologycan come in handy to verify the transactions and cryptographic keys.
这只是区块链技术能够用于验证交易和加密密钥的实例之一。
To individual users, managing cryptographic keys and transacting with different cryptographic assets can be a challenge.
对于个人用户而言,管理加密密钥并与其他加密资产进行交易可能是一个挑战。
With consent, Microsoft Authenticator will be able to act as yourUser Agent to manage identity data and cryptographic keys.
如果用户同意,微软的身份验证器将充当用户代理来管理可识别的数据和加密密钥
On computers that incorporate a TPM can create cryptographic keys and encrypt them so that they can be decrypted only by the TPM.
合并了TPM的计算机能够创建加密密钥并对其进行加密,以便只可以由TPM解密。
Secure hash algorithms are primarily used in distributed ledger technologies to mine andcreate cryptographic keys(or‘addresses').
安全哈希算法主要用于分布式账本技术,用于挖掘和创建加密密钥(或“地址”)。
They acknowledged that the cryptographic keys are not currently sufficiently secure, and said they would be upgraded to 1,024 bits soon.
他们承认加密密钥目前还不够安全,并表示它们很快就会升级到1,024位。
Such an isolation break would allow unauthorized processes to read, modify,or delete sensitive data such as passwords, cryptographic keys or private files.
这样的隔离中断将允许未经授权的进程读取,修改或删除敏感数据,如密码,加密密钥或私有文件。
But 16 cryptographic keys, other codebooks and laptops, and a large computer for processing signals intelligence remained on board.
但是,16个加密密钥以及其他密码本和笔记本电脑,以及用于处理信号情报的大型计算机仍然在飞机上。
Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM.
合并了TPM的计算机能够创建加密密钥并对其进行加密,以便只可以由TPM解密。
As the patent filing reads:“the signature authorityprovides a key-distribution service that distributes blocks of cryptographic keys to authorized signing delegates.
正如这份专利申请中所写到的:“签名的授权机构将提供密钥分发服务,从而向授权签名的代表分发加密密钥区块。
The patent read“To individual users, managing cryptographic keys and transacting with different cryptographic assets can be a challenge.
对于个人用户而言,管理加密密钥并与其他加密资产进行交易可能是一个挑战。
Since a blockchain system is protected with the help of ledgers and cryptographic keys, attacking and manipulating it becomes extremely difficult.
因为区块链系统是通过分类账和密码密钥来保护的,因此攻击和操纵它变得极其困难。
One patent reads:“To individual users, managing cryptographic keys and transacting with different cryptographic assets can be a challenge.
一项专利写道:“对于个人用户而言,管理密码密钥并与其他密码资产进行交易可能是一个挑战。
However,“Storage solutions that do not store private cryptographic keys(often referred to as non-custodial wallets) are not covered by the regulations.”.
然而,“不存储私有密码密钥(通常称为非托管钱包)的存储解决方案不受该监管规则的约束。
Results: 29, Time: 0.1473

Word-for-word translation

Top dictionary queries

English - Chinese