decrypting
英[]
美[diːˈkrɪptɪŋ]
双语例句
- 1. With it, you can store session information in a database or implement a handler for encrypting and decrypting all of your data.
- 使用它,您可以将会话信息存储在数据库中,或者实现一个用于加密和解密你的所有数据的处理器。
youdao
- 2. Encrypting and Decrypting Data.
- 加密和解密数据。
youdao
- 3. The decrypting operation is the reverse of encrypting.
- 解密算法是加密算法的逆过程。
youdao
- 4. Decryption Key [request] For decrypting incoming request message.
- DecryptionKey [request]用于解密传入的请求消息。
youdao
- 5. It does not hold the key to decrypting them — only its users hold that.
- 它没有对这些进行解密的密码——只有它的用户拥有解密密码。
youdao
- 6. Decrypting the message with the private key of their X.509 certificate.
- 使用它们的X . 509证书的私钥来解密消息。
youdao
- 7. New built-in functions provide methods for encrypting and decrypting data.
- 新的内置函数提供了加密和解密数据的方法。
youdao
- 8. The decrypting process is just the reverse of the encrypting process.
- 解密算法即为加密的逆过程。
youdao
- 9. It was here that the complex work of decrypting the video of the Baghdad attack was done.
- 对直升机在巴格达发动攻击的那段录像进行解密这一复杂工作就是在那里完成的。
youdao
- 10. In this case the decrypting application needs no conversion for the certificate and private key.
- 这样,解密应用程序就不需要转换证书和私钥。
youdao
- 11. When decrypting the maximum length of the cipher text is the length of the modulus in bytes.
- 当解密的密文的最大长度是在字节模长度。
youdao
- 12. The database backup image contains the DB2 agent module and information required for decrypting it.
- 数据库备份映像包含用于解密的DB2代理模块和信息。
youdao
- 13. MessageCipher: component responsible for decrypting the input message and encrypting the reply message.
- MessageCipher:负责解密输入消息并加密回复消息的组件。
youdao
- 14. The images encrypting and images decrypting show that the sequences are sensitive to initial parameter.
- 图像加密解密实验表明,序列具有参数敏感性。
youdao
- 15. They are working with Roland, a hacker and identity thief who will assist them in finding and decrypting Scylla.
- 一个叫罗兰德的加入了他们,一个黑客和窃取信息的小偷,他将协助他们来找到并解密“锡拉”。
youdao
- 16. It provides you with a user-friendly graphical interface for encrypting and decrypting your sensitive data.
- 它为您提供了图形用户界面,用于加密和解密您的敏感数据。
youdao
- 17. The decrypting party must have access to the private key associated with the public key used to encrypt the message.
- 而解密方必须有权使用与用于加密消息的公钥关联的私钥。
youdao
- 18. Combined with recursion operation, an encrypting and decrypting based on MDA disorder information are designed.
- 结合递归运算,设计了基于MDA置换的信息加密、解密算法。
youdao
- 19. On selecting the OK button, a new window pops up asking for the password to be used for encrypting and decrypting the data.
- 单击ok按钮,出现一个新的窗口,要求输入数据加密和解密所用的密码。
youdao
- 20. The file is decrypting fine as whole but the real issue arises when I try to decrypt the partial file from the middle.
- 该文件正在解密整体,但真正的问题出现,当我尝试从中间解密部分文件。
youdao
- 21. Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.
- 由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。
youdao
- 22. The specific cryptographic cipher used between client and server (browser and tomcat) must be amenable to Wireshark's method of decrypting.
- 用于客户机和服务器(浏览器和tomcat)之间的特殊加密密码必须能用Wireshark的解密方式进行解密。
youdao
- 23. When you want to access the image from the cloud, Walrus is entrusted with the task of verifying and decrypting images that have been uploaded by users.
- 当要从云中访问镜像时,Walrus受委托确认并解密用户上传的镜像。
youdao
- 24. I have not been very successful in decrypting the Skynet files, but I have found some interesting Intel on the hard drives from Arkarna Industries.
- 我还没有十分成功的天网解密文件,但我已经发现了一些有趣的英特尔硬盘arkarna产业。
youdao
- 25. The design and exploitation of the off-line decrypting system of the logic indefinite chips is an important approach to analyze the logic indefinite chips.
- 脱机式逻辑不明芯片解析系统的设计与开发是进行逻辑不明芯片分析与研究的一个重要途径。
youdao
- 26. An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
- 非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
youdao
- 27. If Tom belongs to a large number of network groups, the PAC structure would grow simultaneously, and decrypting the entire structure would take much longer on the server.
- 如果Tom属于一个大型的网络组,那么PAC结构就会同时增长,对整个结构的解密也就会在服务器上花费更长的时间。
youdao
- 28. The function getTrustedCredentialValue() capsulates the retrieval of the actual credential value form Content Store and decrypting it thus verifying integrity and origin.
- 函数getTrustedCredentialValue() 从ContentStore 获取实际的凭证值并解密,从而检验完整性和来源。
youdao
- 29. The function getTrustedCredentialValue() capsulates the retrieval of the actual credential value form Content Store and decrypting it thus verifying integrity and origin.
- 函数getTrustedCredentialValue() 从ContentStore 获取实际的凭证值并解密,从而检验完整性和来源。
youdao
百度翻译
有道翻译