What is the translation of " ENCRYPTION METHOD " in Chinese?

加密方法

Examples of using Encryption method in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
MRAM could one day break modern encryption methods.
MRAM有一天可能会破坏现代加密方法.
Too many encryption methods make secure communications difficult.
加密方法过多导致安全通信变得困难.
It is pretty easy to identify which encryption method FreeBSD is set up to use.
可以很容易地识别FreeBSD使用哪种加密方法
PIA has all major protocols available, along with state-of-the-art encryption methods.
PIA具有所有可用的主要协议,以及最新的加密方法
This wireless encryption method uses a pre-shared key(PSK) for key management.
这种无线加密方法使用一个预共享密钥(PSK)进行密钥管理。
Next, devices creates a firewall around the connection andsends files using encryption method.
接下来,设备在连接周围创建防火墙并使用加密方法发送文件。
Microsoft plans to add the encryption method next year, but Yahoo has not said whether it will add it.
微软计划于明年添加这种加密技术,不过雅虎还未表示,是否会采用这种手段。
We use AES-256 to encrypt data you send to us,which is a very strong encryption method.
我们使用AES-256来对您发送给我们的数据进行加密处理,这是一个非常强大的加密方法
We use the Secure Socket Layer(SSL) encryption method, a very high security standard on the Internet.
我们使用安全套接字层(SSL)加密方法,该方法符合互联网上的极高安全标准。
The encryption method used is"DigiCert", who have granted us SSL certification which you can verify on the web.
所使用的加密方法是“DigiCert”,其向我们授予SSL证书,并且您可在网上验证此证书。
This limitation is due to those security types using the encryption method of Temporal Key Integrity Protocol(TKIP).
此限制是由于使用临时密钥完整性协议(TKIP)的加密方法的那些安全类型。
In general, the encryption method of the HTTPS website will make it inaccessible to third parties including ISPs.
通常,HTTPS网站的加密方式会让包含ISP在内的第三方无法访问它。
One major security issue of the wired side of network is the lack of a quick andeasy authentication and/or encryption method;
有线网络的一个主要安全问题是缺乏快速简便的身份验证和/或加密方法;
In that case, the default encryption method will kick in and ensure the file is not stored in cleartext.
在这种情况下,默认的加密方法将生效,并确保文件没有以明文的形式存储在服务器上。
In 1882, a banker in Sacramento, Calif.,named Frank Miller developed an absolutely unbreakable encryption method.
年,加州萨克拉门托的银行家弗兰克•米勒(FrankMiller)开发出一种牢不可的加密方法….
A proxy is a network encryption method that usually only works on your browser(Chrome, IE, Safari, etc).
网络代理是一种网络加密方法,通常只适用于浏览器(Chrome,IE,Safari等)。
Similar to encoding, obfuscation doesn't guarantee any securityproperty although sometimes it's mistakenly used as an encryption method.
与编码类似,混淆不能保证任何安全性,尽管有时会误将其用作加密方法.
By employing an encryption method, a password or key is used to code all of the messages sent over the wireless network.
通过采用加密方法,密码或密钥用于为通过无线网络发送的所有消息进行编码。
Encoding change notification that indicates that the messages transmitted sincenow will be sent using the encryption method and the key agreed by both sides.
编码改变通知,表示随后的信息都将用双方商定的加密方法和密钥发送。
If you select Encryption method:→ Loopback(loop-AES), the menu changes to provide the following options:.
如果您选择了Encryptionmethod:→Loopback(loop-AES),菜单选项将变成下面内容:.
One goal in the agency's 2013 budget request was to“influence policies, standards andspecifications for commercial public key technologies,” the most common encryption method.
该机构2013年的预算申请中阐述的目标之一是“影响商用公钥技术的政策、标准和规范”,而这种技术是最常见的加密方法
Based on the encryption methods used, it appears unlikely that the files can be restored even if the attacker received the victim's unique ID.”.
从采用的加密方法来看,即便攻击者收到受害者ID也不大可能恢复文件。
A quantum computer will be able to crack all the encryption methods in the world, and quantum encryption will be truly impeccable.
一台量子计算机将可以破解世上所有的加密方式,而量子加密也将真正无懈可击。
This encryption method might be fairly easily broken, obviously, but it's among the initial examples of encryption actually used in real life.
当然,这种加密方法可能很容易被破解,但它实际上是在现实世界中使用的第一个加密示例之一。
The Data Encryption Standard(DES) standardized the encryption methods of electronic data, and this drove a much broader study of cryptography.
DES(DataEncryptionStandard)规范了电子数据的加密方法,这推动了对密码学更广泛的研究。
This encryption method could be used any of these companies, creating a client side with a very high level of encryption, at 1/20thof the space.”.
种加密方法可以适用于任何公司,创建一个高度加密的客户端,却只使用1/20的空间。
Temporal Key Integrity Protocol, or TKIP, is an encryption method designed as a replacement for WEP without having to replace legacy hardware.
临时密钥完整性协议或TKIP,是设计来取代WEP而不必更换原有硬件的一种加密方法
These encryption methods and strengths are normally applied automatically, depending on which application we use, such as email, browsers, or other programs.
这些加密方法和优势通常会自动应用,具体取决于我们使用的应用程序,例如电子邮件,浏览器或其他程序。
You are also walked through various data encryption methods- such as obfuscation, hashing, and strong encryption- and how you can attack them.
您还可以遍历各种数据加密方法(如模糊处理、哈希处理和强加密)以及如何攻击它们。
Results: 29, Time: 0.0281

Word-for-word translation

Top dictionary queries

English - Chinese