Examples of using The encryption key in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Who holds the encryption key?
The encryption key is linked to the logged in user or computer.
Changing the encryption key of a database.
In particular, it can affect how your application creates, obtains,and stores the encryption key for the database.
People also translate
Anyone can use the encryption key(public key) to encrypt a message.
Going one stage further, it is also possible to set up a"Self Destruct" PIN that, when entered,deletes the encryption key automatically.
The encryption key for the election is held by an independent third party;
For simplicity, in this example the encryption key is hard-coded in the application code.
The encryption key for the elections were held by an independent third party;
The encryption key and any other cryptographic key should have some properties:.
We try to capture their traces to obtain the encryption key and at the same time, decipher the data.".
Of course, the encryption key is known only by the user and it never gets sent to the server.
If you have a strongly encrypted database,you must provide the encryption key to use the database or transaction log in any way.
The encryption key is stored on an external USB drive(the only, forced option) and does not have any additional protection.
They used asymmetrical encryption, where the encryption key is public, but the decryption key is secret.
If a customer encrypts data before uploading it to the cloud,then that customer must be careful to protect the encryption key.
If you lose the encryption key there is no way to access the data, even with the assistance of technical support.
With Android and Linux, an attacker doesn't even have to do that much work:the attacker can simply reset the encryption key.
MOBILedit Forensic will enable you to retrieve the data from a liveiPhone in a fast logical way without knowing the encryption key.
In the case of the analyzed protection devices,an attacker can extract the encryption key and use it to make configuration changes.
The encryption key is stored in the operating system itself rather than using a computer's TPM hardware, and it's possible an attacker could extract it.
You must be a member of the SSO administrator account andlogged onto the encryption-key server locally to back up the encryption key.
TKIP(Temporal Key Integrity Protocol)-A wireless encryption protocol that periodically changes the encryption key, making it harder to decode.
In this case, the OS will automatically recognize the USB drive,read the encryption key and automatically mount the encrypted volume.
Further, the Oracle databases are encrypted,so if a customer chooses to retain the encryption key, even Oracle can't decipher the customer's data.
While symmetric-key encryption is very faster than asymmetric encryption, the sender must swap the encryption key with the receiver before he can decrypt it.