decrypts

英 [diː'krɪpt]

vt. 译电文;解密码;解释
decrypt 的复数, 第三人称单数



双语例句

  1. At the client, WS-Security receives the response, validates the digital signature, and decrypts the message.
    WS-Security在客户机接收响应,验证数字签名和解密消息。
  2. So the client decrypts the message using this copy of TGT session key.
    所以客户端使用这个TGT会话密钥副本解密消息。
  3. The target server receives the PSTkt and decrypts it using its own secret key.
    目标服务器接收PSTkt并使用自己的秘密密钥解密。
  4. The privilege service decrypts the request and gets a copy of the session key and confirms the identity of the client.
    特权服务解密请求,获得会话密钥,并确认客户端的身份。
  5. The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.
    数据块使用一个对称密钥算法进行加密,它使用一个密钥来实现对数据的加密和解密。
  6. Step 19-The client login module/ application decrypts and interprets the result.
    步骤19&客户机登录模块/应用程序解密并解释此结果。
  7. Further, it decrypts the payment information for the accounts department and displays it on the console.
    而且,它还向会计部门解密支付信息,并在控制台上显示。
  8. Receiving the reply from KDC, client then decrypts the message using its own secret key.
    客户端接收KDC的回复,然后使用自己的秘密密钥解密消息。
  9. An IPSec router in the service infrastructure decrypts the IP packets and forwards them to the machine hosting the service for processing.
    服务基础结构中的IPSec路由器对IP数据包进行解密,并将其转发到服务所在的计算机中进行处理。
  10. The Client decrypts the message from the authentication service using client secret key.
    客户端使用它的秘密密钥解密来自身份验证服务的消息。
  11. The server receives the encrypted exchange key and decrypts it with its private key.
    服务器接接收加密交换密匙并使用其私有密匙进行解密。
  12. The DB2 restore command invokes the DB2 agent contained in the database backup image, and the DB2 agent decrypts it by communicating with the security server.
    DB2恢复命令调用DB2包含在数据库备份映像中的代理,然后DB2代理通过与安全服务器通信对其进行解密。
  13. The client decrypts the result using the shared session key.
    客户端使用共享会话密钥解密该结果。
  14. The client receives the response, decrypts it and obtains the PSTkt and the session key to be used with the target server.
    客户端收到响应消息,解密它,获得PSTkt和与目标服务器一同使用的会话密钥。
  15. The secondary database server decrypts the data and processes it for its operations.
    辅助数据库服务器则在解密数据之后再处理数据。
  16. The authentication service extracts the TGT from the request and decrypts it using its own secret key and validates/ verifies the request.
    身份验证服务从请求中提取出TGT,使用自己的秘密密钥解密它,然后验证请求。
  17. The authentication service gets the PSTkt request and decrypts it using its secret key.
    身份验证服务获取PSTkt请求,使用其秘密密钥解密它。
  18. The SSL Server decrypts and stores the secret key, using its private key.
    SSL服务器使用它的私钥对秘钥解密并存储它。
  19. The ssh client, on receiving the SSHPub from server, decrypts it with its private key and sends the accesskey ( AK) back to server.
    当从服务器收到SSHPub时,ssh客户机用它的私有密钥执行解密并把accesskey(AK)发送回服务器。
  20. The former encrypts a plain-text string, returning its encoding; the latter decrypts an encoded string and returns plain text.
    前者加密一个纯文本的字符串,返回其编码;后者解密一个加密了的字符串并返回纯文本。
  21. The receiver then decrypts the message digest using the sender's public key, confirming that the message was indeed sent by the sender.
    然后,接收方使用发送方的公钥对消息解密,确认消息确实是由发送方发送的。
  22. Bob sends the encrypted message to Alice and she decrypts it using her private key.
    小明将加密的消息发送给小红,而小红使用她的私钥解密该消息。
  23. To provide secure communication, you can develop a custom sink that encrypts and decrypts the message data sent to and from the remote object.
    要提供安全的通信,可以开发自定义接收,以便对发送到和来自远程对象的消息数据进行加密和解密。
  24. Isa server decrypts encrypted traffic and applies inspection and filtering to the content.
    isa服务器对加密的通讯进行解密,并对内容进行检查和筛选。
  25. The product executable that is downloaded from ELMS decrypts and extracts the product.
    从ELMS下载的产品可执行解码并且提取产品。
  26. Decrypts a file that was encrypted by the current account using the.
    方法解密由当前帐户加密的文件。
  27. That encryption software encrypts or decrypts information occupies the resource of CUP, and reduces the efficiency of systematic operation.
    加密软件处理信息的加密和解密运算需要占用CPU的资源,降低了系统运行的效率;
  28. There are many methods about how to realize encrypts and decrypts the database file in the VFP system. This thesis mainly introduces realizing encryption and decryption by utilizing stochastic pseudo-code, location operate function bitxor() and low-grade file function.
    如何在VFP系统中实现对数据表文件进行加密和解密,方法有多种,本文主要介绍利用随机伪码、位操作函数bitxor()、低级文件函数实现加密和解密。
  29. Part III decrypts ways of ideological and political education in Huizhou culture.
    第三部分解析了徽文化中的思想政治教育的途径。
  30. The present homomorphic encryption schemes are mostly in the form of "one-to-one", means one party encrypts and the other decrypts in public key cryptosystem.
    已有同态加密方案大多是公钥密码体制下的一方加密,一方解密的一对一的密码形式。