decrypted

decrypted

1. After performing an decrypt or verify operation from the applet, display the resulting text in a window.

12在面板程序中执行解密或验证操作后,在窗体中显示结果文本。

2. Not enough memory to store decrypted private key.

16没有足够的内存来保存解密的私钥。

3. Not enough memory to decrypt private key.

16没有足够的内存来解密私钥。

4. Not enough memory for decrypted key buffer.

16没有足够的内存用于解密缓存。

5. The stream is encrypted and can't be decrypted because no suitable key has been supplied.

20此为加密流,而且由于未提供合适的密钥因此无法解密。

6. CAPICOM can be used to digitally sign data, sign code, verify digital signatures, envelop data for privacy, hash data, encrypt decrypt data and more.

CAPICOM可用于对数据进行数字签名、对代码签名、验证数字签名、包封保密数据、对数据进行散列处理、加密及解密数据等等。

7. DVD players that have been encoded audio / video signal is encrypted and then sent to the receiving device from receiving equipment to decrypt.

DVD播放机对已编码的音频/视频信号进行加密,然后发送给接收设备,由接收设备进行解密。

8. IC decrypt: 51 series.

IC解密:51系列.

9. IRM encrypts the downloaded files and limits the set of users and programs that are allowed to decrypt these files.

IRM会加密下载的文件,并限制允许对这些文件进行解密的用户和程序集。

10. The value of KEY_SOURCE is valuable data that can be used to re-create the symmetric key and decrypt data.

KEY_SOURCE值是很重要的数据,可用来重新创建对称密钥和解密数据。

11. The Passport logon server uses this key to encrypt and decrypt the query strings passed between sites.

Passport登录服务器使用该密钥对站点间传递的查询字符串进行加密和解密。

12. To verify the identity of a remote server, SQL Server must receive information that can be decrypted with the public key in a certificate owned by a local database principal.

SQL Server收到的信息必须能够用本地数据库主体所拥有的证书中的公钥进行解密,才能验证远程服务器的身份。

13. SQL Server first tries to decrypt the database master key with the service master key of the instance.

SQL Server首先尝试使用实例的服务主密钥对数据库主密钥进行解密。

14. An N2 and N3 packet will have the same decrypted CW inside, for the same channel.

一个N2和N3型包具有相同的解密连续内,在同一频道。

15. Once enough of them are lost, the message can no longer be decrypted and read.

一旦密匙丢失的部分达到一定程度,消息就无法解密和读取。

16. First, open the symmetric key with which to decrypt the data.

下列范例是利用对称金钥为加密文字解密。

17. You cannot decrypt data encrypted using the certificates. Do you want to delete the certificates?

不能解密用证书加密的数据。要删除证书吗?

18. Unlike cryptography, which allows data to be encrypted and then decrypted, hashing data is a one-way process.

与加密不同,加密允许数据加密后再解密,而哈希数据只允许单向进行。

19. In order to encrypt and decrypt, you need an encryption algorithm and a key.

为了进行加密和解密,您需要加密算法和密钥。

20. Once messages are encrypted, even if illegal members eavesdrop these data, they can not decrypt the messages as well as only get unmeaning ones.

也因为讯息被加密,即便是资料遭窃听,若不是合法成员,也无法将讯息还原,而只是一串无意义的资讯。

21. This means that the data being sent is encrypted by one side, transmitted, and decrypted by the other side before processing.

也就是说,发送的数据由一方加密,在处理之前由另一方来传输和解密。

22. The implication of this is that if a message can be decrypted using the public key, then it must have been sent from the owner of the private key.

也就是说如果一份报文能用这个公钥解密,那么它一定是从私钥拥有者那里发送过来的。

23. The following key(s) are not trusted: %1 Their owner(s) will not be able to decrypt the message.

以下密钥不受信任:%1这些密钥的所有者不能解密此信件。

24. And files can be encrypted and decrypted with a few simple steps.

以及文件能够以一些简单的步骤被加密和解密。

25. It does not matter that Eve also knows Bob's PK because she cannot use it to decrypt the ciphertext.

伊芙也知道鲍伯的公钥,但是没关系,因为公钥无法用来解开密文。

26. True affects performance, because the variable value must be decrypted and encrypted for each round trip of the page.

会影响性能,因为在页的每次往返行程中,都必须加密和解密变量值。

27. However, the agent cannot decrypt the message with the public key.

但是,该代理无法用公钥解密该消息。

28. As the recipient, it searches the My certificate store for the certificate, and uses the associated private key to decrypt the message.

作为收件人,该示例在“我的证书”存储中搜索该证书,并使用关联的私钥解密邮件。

29. Your computer has to do extra work to decrypt all that data, and encrypted data doesn't travel across the internet as efficiently as unencrypted data," says the Gmail blog.

你的电脑也要多做不少解密的工作,并且加密过的数去在网上的传播不如没有加密的数据有效。”

30. Your private key lets you decrypt any message encrypted with your public key.

你的私钥可以解开任何用你的公钥加密过的信息。

31. C. Use the CIPHER command-line utility to decrypt the folder and its contents.

使用CIPHER指令行公用程式对资料夹及其内容解密。

32. Use one of the Decrypt methods of the EnvelopedCms class to decrypt the enveloped message.

使用EnvelopedCms类的Decrypt方法为封装的邮件解密。

33. Using the context menu you can encrypt ordecrypt files and folders by right-clicking on them in Explorer and selecting the encrypt or decrypt command.

使用你能够加密或者解密的上下文菜单由在对资源浏览器的他们上的右键点击所作的文件和文件夹和选择加密或者解密指挥。

34. Information encrypted using one key can only be decrypted using the other, and vice versa.

信息使用一个密钥加密过只能通过另一个密钥解密,无法破译。

35. The fake print service cannot generate the correct response because it cannot decrypt the ticket and get the session key.

假冒的打印服务无法生成正确的响应因为它无法把票解开并得到会话密钥。

36. Public-key cryptographic algorithms are also known as asymmetric algorithms because one key is required to encrypt data while another is required to decrypt data.

公钥加密算法也称为不对称算法,原因是需要用一个密钥加密数据而需要用另一个密钥来解密数据。

37. The public and private key scheme is interesting because data encrypted with a public key can only be decrypted with the associated private key.

公钥私钥模式的有趣之处在于,使用公钥加密的数据,只有用相应的私钥才可以解密。

38. The important point is that the keys are asymmetric - information encrypted with one key can be decrypted using the other key.

关键的问题是这些密钥是非对称的使用一个密钥加密的信息可以使用另一个密钥来解密。

39. According to Long once again to solve the world's rich and varied fans addictive title. Games available to players each for a few hours of fun to decrypt.

再次来到依龙丰富多彩的世界去解决上瘾的迷题。游戏提供给每个玩家数小时的解密乐趣。

40. Create, decrypt, delete, and open a key container; export and import a key; sign files using a key; and view and change the access control list for a key container.

创建、解密、删除、打开密钥容器;导出、导入密钥;使用密钥给文件签名;查看并更改密钥容器的访问控制列表。

41. The original files are then decrypted, extracted and written to your disk automatically.

初始文件然后自动地被解密,抽取和编写到你的碟片。

42. XtraTools: Fast File Encryptor Pro - encrypt or decrypt files, contents of folders and contains a lot of additional tools.

前快速的文件的编码机加密或解码文件,文件夹内容并且包含很多另外的工具。

43. SMS message received by the user will be decrypted using MultiTasker on the receiver side and can be viewed by using the password set by the reciever.

前提是接受方也需要安装这个软件才能解密及查看被加密的短信。

44. The encrypted product is accessible, but it can be decrypted only by those who have the correct key.

加密后的产品是可以访问的,但只有那些具有正确密钥的人才能解密。

45. Encrypts a file so that only the current user can decrypt the information within the file.

加密文件,只有当前用户能够解密这个文件信息.

46. Kaspersky said that the files the malware encoded cannot be decrypted because it uses a very strong, 1024-bit key.

卡巴斯基表示,被该种恶意软体锁码的档案无法解密,因为它使用一种非常强大的1024位元密钥。

47. Although the ciphertext message was stolen by the hacker, it cannot be decrypted without the right key.

即使资料窃取,也只有拥有此金钥的使用者才能够解开此密文。

48. The disassembler can be used to analyse the code statically, to remove the obfuscations, to decrypt binaries etc.

反汇编器可以用来静态分析代码,移除陷阱,对二进制代码进行解码等。

49. Conversely, data encrypted with the private key can be decrypted only with the public key.

反过来,使用私钥加密的数据只能用公钥解密。

50. When you send an application-encrypted message, the receiving queue manager uses the symmetric key to decrypt the message before sending it to its destination queue.

发送应用程序加密的消息时,接收队列管理器在将消息发送到其目标队列之前,使用对称密钥解密该消息。

51. Only the owner of the key is able to decrypt these files using the private key.

只有密钥的所有者能够使用私钥解密这些文件。

52. Only the relevant financial institution is able to decrypt the information.

只有相关的金融机构才可将资料解密。

53. Only the private key holder can unlock the symmetric key, which is then used to decrypt the message.

只有私钥持有者可以解锁对称密钥,然后使用解锁后的对称密钥解密邮件。

54. Only the CA's public key can decrypt the signature, verifying that the CA has authenticated the network entity that owns the Certificate.

只有证书机构(CA)的公共密钥才能解密此签名,以证实持有此证书的网络实体已经通过了CA的鉴定。

55. The ciphertext can only be decrypted with the corresponding private key.

只能使用相应的私钥对加密文本进行解密。

56. We just can hope that our antivirus software will find them before they work. Moreover, we can search more useful ways to decrypt.

只能寄希望我们的病毒侦测软件提前发现他们。同时,我们要思考更多的解密办法。

57. The content can only be decrypted by an agent with the corresponding private key.

只能由代理用相应的私钥解密该内容。

58. You can decrypt the encrypted Web. Config file contents, if you want to, by running aspnet_regiis. Exe with the -pd option.

可以根据需要通过运行带有-pd选项的aspnet_regiis.exe对已加密的Web.config文件内容进行解密。

59. Each portion of the 3-layer key can be changed independently, but each of them is required in order to decrypt wallet-stored information.

可以独立地修改三层密钥的每一部分,但要想对钱包中存储的信息进行解密就需要用到每一部分。

60. The public key can be used to verify a message signed with the private key, or to encrypt messages that can only be decrypted using the private key.

可以用公开密码匙核实经私人密码匙签署的讯息,或对只能用私人密码匙解密的讯息进行加密。

61. Each group of encrypted files can be decrypted in the group between members to achieve file-sharing.

各组的加密文件可以在组内成员间解密,达到了加密文件共享的目的。

62. The program realized the encrypt and decrypt of digital bid documents based on PKI technology and passed the test.

同时,根据电子标书的特殊性,用基于公钥基础结构的技术实现了电子标书的混合加解密实现,并通过了程序测试。

63. Since the program can't be decrypted, there's no way to get into it to run your replacement enter-key dialog.

因为程序不能解码,没有办法进入运行你的输入密匙对话框。

64. Therefore, no additional steps are required to decrypt the encrypted configuration settings for use by other ASP.NET features or to access the values in your code.

因此,不需要任何附加步骤即可对已加密的配置设置进行解密,供其他ASP.NET功能使用或用于访问代码中的值。

65. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special polynomial function (scheme 1).

在大整数分解困难问题的条件下,构造特殊多项式函数来解密S1(方案1)。

66. Under the condition of a large integer factoring problem, S1 is decrypted by constructing a special equation (scheme 1).

在大整数分解困难问题的条件下,构造特殊等式来解密S1(方案1)。

67. Under the condition of a discrete logarithm problem,S2 is decrypted by the OPE(Oblivious Polynomial Evaluation) protocol and Lagrange Interpolation Polynomial(scheme 2).

在离散对数困难问题的条件下,利用不经意多项式估值协议和拉格朗日插值多项式来解密S2(方案2).

68. Under the condition of discrete logarithm problem, S2 was decrypted by OPE (Oblivious Polynomial Evaluation) protocol and Lagrange Interpolation Polynomial (scheme 2).

在离散对数困难问题的条件下,利用不经意多项式估值协议(OPE)和拉格朗日插值多项式来解密S2(方案2)。

69. Under the condition of a discrete logarithm problem, S2 is decrypted by the OPE (Oblivious Polynomial Evaluation) protocol and Lagrange Interpolation Polynomial (scheme 2).

在离散对数困难问题的条件下,利用不经意多项式估值协议和拉格朗日插值多项式来解密S2(方案2)。

70. Under the condition of the discrete logarithm problem, S2 is decrypted by the Chinese Remainder Theorem (scheme 2).

在离散对数困难问题的条件下,利用中国剩余定理来解密S2(方案2)。

71. One or plural encrypt image would be processed priority or synchronously to accelerate decrypt process.

在解密的时候,可以根据实际需要,优先或同时分别处理一幅或多幅加密图像,加快解密过程。

72. In this case, the whole XML document is decrypted by the sales department and the payment information is disclosed.

在这种情况下,销售部门对整个XML文档解密,这就泄露了支付信息。

73. The block size is the basic unit of data that can be encrypted or decrypted in one operation.

块大小是在一个操作中可加密或解密的基本数据单元。

74. Add files you encrypt and decrypt very often to "Safe list".

增加那些你常译码和解码的档案到“安全目录”。

75. If SQL Server can successfully decrypt the information, it means that the remote database contains the private key that corresponds to the public key in the local certificate.

如果SQL Server可以成功地解密信息,这表示远程数据库包含与本地证书中的公钥相对应的私钥。

76. If all is well in that regard, the service next uses the session key to decrypt the authenticator.

如果一切正常,服务接着就用会话密钥去解验证器。

77. If you receive an encrypted message, you need to decrypt it before you read it.

如果你接收到了加密的信息,你在阅读它之前对其进行解密。

78. If your data is encrypted, it is advisable to decrypt itbefore backing it up.

如果你的数据已经加密,你最好在备份前将其解密。

79. If we use exponentiation to encrypt or decrypt, the adversary can use logarithm to attack.

如果我们运用求幂运算来加密和解密,对手就可以运用对数进行攻击。

80. Two packets encrypted with the same IV can be decrypted if the attacker knows the plain text of one of them.

如果攻击者知道两个用相同IV加密的信息包之一的明文,就可以对这两个信息包进行解密。

英语宝典
考试词汇表