encrypts信息详情

encrypts发音

意思翻译

v.把……加密,将……译成密码

相似词语短语

encroach upon───侵占;干犯

encrimsoned light───包壳灯

encrust def───结壳def

encroaching defined───侵占定义

encroaching definition───侵犯定义

encrimsoned meaning───含意

encrusted meaning───镶嵌意义

encroaching───adj.渐渐渗入的

encroached───vi.蚕食,侵占

encrimsoned definition───附加定义

双语使用场景

It encrypts the information and then sends it over the network.───它对信息进行加密,然后通过网络发送。

The sender encrypts the message digest under her private key.───发送方用自己的私钥加密消息摘要。

Encrypts the session key with the server's public key, and.───服务器公钥对会话密钥进行加密。

IRM encrypts the downloaded files and limits the set of users and programs that are allowed to decrypt these files .───IRM会加密下载的文件,并限制允许对这些文件进行解密的用户和程序集。

Each node encrypts its copy of the symmetric key using the public key of a key pair specific to its Windows service account.───每个节点都使用Windows服务帐户专有密钥对的公钥来加密对称密钥的副本。

WebSphere Application Server encrypts various user tokens (including the LTPA cookie) using what are known as the LTPA encryption keys.───WebSphereApplicationServer使用LTPA加密密钥加密各种用户令牌(包括LTPAcookie)。

Next , the code example encrypts a copy of a byte array, saves it to a file, loads the data back from the file, and then decrypts the data .───接下来,代码示例对字节数组的副本进行加密,将加密后的副本保存到文件中,从该文件加载回数据,然后对数据进行解密。

For the purpose of this article, SSL can be regarded as an "add-on" that encrypts, validates, and authenticates an underlying IP protocol.───对于本文的目标来说,SSL可以认为是一个“附件”,它对底层IP协议进行加密、验证和认证。

The SSL connection encrypts the client credentials contained within the client certificate as they are sent over the network.───SSL连接在通过网络发送包含在客户端证书中的客户端凭据时对这些数据进行加密。

英语使用场景

Afterward, the main control desk encrypts the session key by using a public key, and transfers encrypted configuration information and session key to configuration server of network phone.

It is a free software package developed by Phillip Zimmerman that encrypts e-mail.

Kerberos authenticates the identity and encrypts their communications through secret - key cryptography.

Then, the main control desk encrypts configuration information of network phone system by using the session key.

He generates a fresh message, such as a timestamp, and encrypts it with the session key.

Setting up a virtual private network, or V.P.N., which encrypts all communications you transmit wirelessly whether on your home network or at a hot spot, is even more secure.