Examples of using Be decrypted in English and their translations into Korean
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Data: Buffer, specifies the data to be decrypted.
It cannot be decrypted without user's password and secret key.
Your encrypted data can't be decrypted without your key.
Files that have been attacked by the Petya.A virus are blocked and cannot be decrypted.
Information can only be decrypted by the host site that requested it.
The data is encrypted before you send it, and can only be decrypted by us.
Also the connection password will be decrypted and displayed as regular text.
The data can only be decrypted and accessed when the user enters their PIN, password, pattern, or through biometric authentication.
A message encrypted with the public key can only be decrypted using the proper private key.
The message 80 can then be decrypted at the mobile device 100 and the original message 15 is presented to the user.
Emails that go through this extension are encrypted, and can't be decrypted by Google.
It added that the data"can only be decrypted when it is received by our external, independent payment processor.".
If the user has read permission for the labels used in encryption and has access to the algorithm used, then the object may be decrypted.
All files are transferred encrypted so they must be decrypted upon download completion.
To decrypt, the user must enter a password in a program which will be transmitted encrypted to the drive where it will be decrypted.
For signature verification the object must first be decrypted so that a cryptographic hash can be computed.
Export-crippled cryptographic software is limited to a small key size,resulting in Ciphertext which usually can be decrypted by brute force.
As it has already been mentioned, text files can be decrypted by double-clicking on the private decryption key.
For example, Microsemi, a leading provider of semiconductor solutions, uses nShield HSMs in combination with security software to generate unique codes that can only be decrypted by the device for which each was generated.
Information encrypted with the public key cannot be decrypted without the corresponding private key, which only the merchant has.
Even if the source of the software stored in system memory 110 is encrypted, the program and data must first be decrypted before it can be processed by the CPUs.
Plus, there is no guarantee the files will be decrypted, and the affected files can become corrupted, rendering them unrecoverable.
This data may be encrypted, as noted above, butneed not be decrypted by connection server 14a-14n.
By 1945, most German Enigma traffic could be decrypted within a day or two, yet the Germans remained confident of its security.
Credentials are encrypted securely(using asymmetric encryption so that they cannot be decrypted in the cloud) before they are stored in the cloud.
This meaningless character string can be decrypted using a key, and the person receiving the message will see"SALUT" instead of"Hi7= FwU-23".
When the digital signature 42 has been verified, or sometimes even ifdigital signature verification fails, the encrypted message body 44 must then be decrypted before it can be displayed or further processed by a receiving messaging client, the computer system 31 and the mobile device 38 in FIG.
This means that encrypted data stored on the network must be decrypted by the existing domain key K in the master device(S701) and encrypted by the new domain key K'before being stored on the network again(S702).
Only when the stars dig deep into the very bowels of Hell…” could be decrypted as“only when the Milky Way falls straight into the bridge”.
The flag provides users a higher assurance that the data cannot be decrypted while the device is locked should their phone be lost or stolen.