What is the translation of " THE ENCRYPTION KEYS " in Chinese?

Examples of using The encryption keys in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
That is, if the encryption keys for each round are K1 K2 K3,….
就是说如果每一轮的加密秘钥分别是K1、K2、K3….
The records were meticulous, but Carrie Johnstone has the encryption keys.".
记录非常细致,但嘉莉约翰斯通有加密钥匙
That is, if the encryption keys for each round are K1 K2 K3,….
这就是说,如果各轮的加密密钥分别是K1,K2,K3….
In this case, you manage the encryption process, the encryption keys, and related tools.
在这种情况下,您需要管理加密过程、加密密钥和相关的工具。
The encryption keys never leave your device, and you are the only one who can see your passwords.
加密密钥永远不会离开您的设备,因此只有您可以接触到您的密码。
Organizations must then understand how the encryption keys are stored and managed.
组织还必须了解如何存储和管理加密密钥
Communications regulator Roskomnadzor said Telegramnow has 15 days to provide the encryption keys.
俄罗斯通信监管局表示Telegram有15天时间递交加密密钥
Organizations must then understand how the encryption keys are stored and managed.
组织还必须要了解加密密钥是如何存储和管理的。
Additionally, the Encrypted Storage Engine provides safe andsecure management of the encryption keys.
此外,加密存储引擎为加密密钥提供了安全可靠的管理机制。
Software key wrappers do not protect the encryption keys as well as hardware-based options;
软件密钥封装不保护加密密钥以及基于硬件的选项;.
The encryption keys are derived securely in the background and are unique for each user and session.
加密密钥是以隐藏方式安全地使用,并且对每一个用户和会话都是唯一的。
When Telegram did not provide the encryption keys, the FSB launched a formal complaint.
当Telegram没有提供加密密钥时,FSB发起了正式投诉。
The most sensitivepart of an encryption system is where the encryption keys are stored.
加密系统中最容易受到攻击的部分在于其加密密钥的存储。
If the encryption keys themselves are lost or comprised, then the data itself is effectively lost or compromised.
一旦加密密钥本身丢失或损坏,那么数据也将丢失或损坏。
Flexible key management options allow you to choose whether you orAWS will manage the encryption keys.
灵活的密钥管理选项允许客户选择由客户自己还是AWS来管理加密密钥
If the encryption keys themselves are lost or comprised, then the data itself is effectively lost or compromised.
如果加密密钥本身丢失或损坏,数据本身也就相应的丢失或损害了。
All data that is written is encrypted and the encryption keys for that data are never present on the Snowball.
所有写入数据均会经过加密,且这些数据的加密密钥绝不会显示在Snowball上。
As one can see, it all comes down to whether ornot the attacker has access to the USB drive containing the encryption keys.
可以看出,这一切都取决于攻击者是否能够访问包含加密密钥的USB驱动器。
However, even if the encryption keys were intercepted by the Intelligence services they would have been of limited use.
然而,即使加密密钥被情报部门侦听,其利用价值也有限。
In this case, the blockchain is private,and only certain participants would have the encryption keys to see the record.
在这种情况下,区块链是私有的,只有某些特定的参与者能持有加密密钥查看记录。
They may keep the encryption keys in a physical location or on a disc which provides an opportunity for them to be lost or stolen.
他们可能会在物理磁盘或光盘上保存加密密钥,这为其丢失或被盗提供了一个机会。
Blockchain records offer security, as only those with the encryption keys can edit or amend the sections they are entitled to.
区块链记录提供安全性,因为只有具有加密密钥的记录才能编辑或修改其有权访问的部分。
The company says that although credit card data was encrypted,it believes it possible that the hackers got the encryption keys too….
尽管银行卡数据已加密,但他们认为黑客可能也获得了加密密钥
Note on encryption: Dropbox handles the encryption keys, so they could look at your files if they were legally required to.
有关加密:Dropbox掌握加密的密钥,因此如果收到合法的要求,他们可以打开你的文件。
Keeping in mind the ever increasing and changing security threats on the internet,ICANN needs to update the encryption keys for the DNS addresses.
鉴于不断增加的安全攻击和违规行为,ICANN决定更新DNS地址的加密密钥
G Trusted Platform Module stores the encryption keys in the hardware, similar to how phones store keys in their hardware.
G可信平台模块在硬件存储加密密钥,类似于手机在他们的硬件中存储密钥。
Bring-your-own-key(BYOK) is a solution in which the end user enterprise, rather than the cloud service provider(CSP) or vendor,controls the encryption keys.
自带密钥(BYOK)是终端用户企业(而不是云服务提供商或供应商)控制加密密钥的解决方案。
Blockchain records offer security, as only those with the encryption keys can edit or amend the sections they are entitled to.
而区块链记录可提供安全性,因为只有那些具有加密密钥的用户可以编辑或修改他们有权使用的部分。
In addition to controlling the encryption keys, customers can gain greater visibility into activity inside of Slack via the Audit Logs API.
除了控制加密密钥之外,客户还可以通过AuditLogsAPI更好地了解发生在Slack内部的活动。
Failure to ensure propersegregation of duties means that admins who generate the encryption keys can use them to access sensitive, regulated data.
不能确保适当的职责分离意味着生成加密密钥的管理员可以使用它们来访问敏感、受监管的数据。
Results: 42, Time: 0.0291

Word-for-word translation

Top dictionary queries

English - Chinese