What is the translation of " CRYPTOGRAPHIC PROTOCOLS " in Chinese?

Examples of using Cryptographic protocols in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
You just have to know how to use cryptographic protocols.
你只需要知道如何使用加密协议
IPSec contains a set of cryptographic protocols for ensuring secure data communication and key exchange.
IPSec包含一组加密协议,用于确保安全的数据通信和密钥交换。
Students should learn enough number theory to study andimplement common cryptographic protocols.
学生应该学习足够的数论来研究和实现常见的加密协议
Graduates also understand the structure of cryptographic protocols and are aware of the basic legal aspects of data security.
毕业生也明白密码协议的结构,都意识到数据安全的基本法律问题。
Hash functions like SHA-1are an important building block of almost all cryptographic protocols.
诸如SHA-1的哈希函数是几乎所有加密协议的重要组成部分。
Cryptographic protocols like these give us the basic tools necessary to build reliable, secure systems like Bitcoin.
像这样的加密协议为我们提供了构建像比特币这样可靠的、安全系统所必需的基本工具。
Students should learn enough number theory to study andimplement common cryptographic protocols.
学生们应该学习足够的数字理论来研究和实现常见的密码协议
Properly evaluating cryptographic protocols requires the same sort of specialized knowledge as with other cryptographic code.
正确的评估加密协议需要相同类型的专业知识和其他的加密代码。
DigiCash transactions wereunique in that they were anonymous due to a number of cryptographic protocols.
DigiCash事务的独特之处在于,由于许多加密协议,它们是匿名的。
Schneier also outlines cryptographic protocols--the steps required for secure encryption--with the precision of a chess master.
Schneier还概述了密码协议--安全加密步骤所必需的--以棋师的的精密性。
Microsoft's"PFX" has received heavycriticism of being one of the most complex cryptographic protocols.[7].
微软的"PFX"因作为最复杂的密码学协议之一而受到大量批评。[7].
Other cryptographic protocols exist in the library and were historically supported, but this list covers the primary uses in Google Cloud Platform.
库中还存在其他曾经受支持的加密协议,但此列表已涵盖了GoogleCloudPlatform中的主要用途。
In the last two decades, we as a society have learneda lot about how to write secure cryptographic protocols.
在过去的二十年中,我们作为一个社会已经学到了很多关于如何编写安全加密协议的知识。
There is an important thing to understand, though:the FIPS 140-2 process does not currently examine cryptographic protocols, including implementations of SSL/TLS.
这有更重要的事情,虽然符合FIPS140-2进程,但是不检查加密协议,包括SSL/TLS的实现。
Today most formal methods researchers focus instead on verifying smaller but especially vulnerable or critical pieces of a system,like operating systems or cryptographic protocols.
如今大多数研究人员侧重于验证系统中较小但特别脆弱或关键的部分,如操作系统和加密协议
So in 1990 he founded one of the earliest digital currencies, DigiCash,which offered users anonymity through cryptographic protocols of his own devising.
因此,1990年,他创建了最早的数字货币DigiCash,该货币可以让用户通过他设计的密码协议进行匿名交易。
Today most formal methods researchers focus instead on verifying smaller but especially vulnerable or critical pieces of a system,like operating systems or cryptographic protocols.
现在,大多数形式方法研究人员都专注于验证更小但更脆弱或系统关键的组成部分,比如操作系统或加密协议
Matthew Green put it nicely:“PKCS 1v1.5 is awesome-if you're teaching a class on how to attack cryptographic protocols.
PKCS1v1.5非常棒-如果您要教授关于如何攻击密码协议的课程。
So by design, the FIPS 140-2 process did not examine the SSL/TLS implementation,or anything involving cryptographic protocols.
这有更重要的事情,虽然符合FIPS140-2进程,但是不检查加密协议,包括SSL/TLS的实现。
In the crypto world, when you are explaining a cryptographic protocol, you use hypothetical people.
在密码世界里,当您解释密码协议时,你用假设的人。
Secure Socket Layer(SSL), the original cryptographic protocol had its last version(SSL 3.0) released in 1999.
安全套接字层(SSL),原始密码协议在1999年发布了其最新版本(SSL3.0)。
It initially relied on the Secure Socket Layer(SSL) cryptographic protocol, but it later switched to SSL's more secure successor, Transport Layer Security(TLS).
它最初依赖于安全套接字层(SSL)加密协议,但后来转而使用SSL更安全的后继产品-传输层安全性(TLS)。
The tool is an emerging cryptographic protocol called a zero-­knowledge proof.
该工具是一种新兴的加密协议,称为零知识证明。
The tool is an emerging cryptographic protocol called a zero-­knowledge proof.
该工具是一种新兴的密码协议,称为零知识证明。
The creation andtransfer of coins is based on an open source cryptographic protocol and is not managed by any central authority.
特币的创造和转让基于一种开源的加密协议,不受到任何中央机构的管理。
Today Bernstein uses the most advanced Web Crypto API andproven cryptographic primitives and protocols.
如今,Bernstein使用最先进的WebCryptoAPI技术和经过验证的加密原始语言和协议
This was criticized by P2P and OS developers as a reckless notion,given that amat contracts are actually a de nova cryptographic protocol,” he added.
这被P2P和OS开发人员批评为鲁莽的概念,因为amat合同实际上是denova加密协议,”他补充说。
Results: 27, Time: 0.0257

Word-for-word translation

Top dictionary queries

English - Chinese