A similar request is needed to upload the encryption key, which is private. 需要用一个类似的请求上传私有的加密密匙。
Kerberos uses a principal's password ( encryption key) as the fundamental proof of identity. Kerberos使用一个主体的密码(加密密匙)作为它的身份的主要证明。
To encrypt file data, an encryption key password must be selected, which Tivoli Storage Manager uses to generate the encryption key for encrypting and decrypting the file data. 为加密文件数据,必须选择一个加密密钥口令,TivoliStorageManager使用它来生成加密密钥,以加密和解密文件数据。
Store the encryption key password for later use. 存储加密密钥口令以便此后使用。
On the following three panels, you are prompted to choose an encryption key, operating system support, and operating system. 在接下来的三个面板中,您需要选择一个加密密匙、操作系统支持以及操作系统。
Another aspect of LTPA authentication is encryption key sharing. LTPA身份验证的另一个方面是加密密匙共享。
The encryption key is used to encrypt the data transfer between the NAS and the RADIUS server. 加密密钥用于加密NAS和RADIUS服务器之间的数据传输。
You can use the same encryption key or different encryption keys against files and directories under the guard point. 您可以对保护点下的文件和目录使用相同或不同的加密密匙。
A mismatch in either the encryption key or key version number causes the decryption process to fail. 加密密匙或密匙版本号的不匹配会导致解密过程失败。
Again, the encryption key needs to match between the client and server. 同样,客户机与服务器之间的加密密钥必须匹配。
Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it. 接收者利用发送者的公开密钥和他们自己的秘密密钥的结合,解开该报文的秘密编码,并解密之。
Generate a new encryption key. 生成新的加密键。
Initialization errors and encryption key errors include the following messages. 初始化错误和加密密钥错误包含以下消息。
Here you can specify the length of the encryption key. 这里您可以指定密钥长度。
Here you can select the type of the encryption key for this partition. 这里您可以为分区选择加密密钥的类型。
You must input the encryption key twice to confirm that it was entered correctly. 您必须输入加密密钥两次,以确认正确地输入了密钥。
You can change the encryption key for a database. 您可以更改数据库的加密密钥。
When a user's identity is verified by the CA, the certificate uses the holder's public encryption key to protect this data. 当认证机构确认了用户的身份后,电子证书使用证书持有者的公共密钥来保护数据。
This improves the security of the encrypted information by restricting who can access the encryption key. 这样能够限制可以访问加密密钥的人员,从而增强加密信息的安全性。
This example shows how to replace the encryption key. 此示例显示如何替换加密密钥。
This example shows how to create a backup copy of the encryption key and save it to a password-protected file on a floppy disk. 此示例显示如何创建加密密钥备份副本,并将其保存到软盘中密码保护的文件中。
Designing an effective safe management scheme to resolve the database encryption key for the allocation and management issues. 设计一种高效安全的管理方案来解决数据库中加密密钥的分配与管理问题。
Jack, Henderson is using an interlaced encryption key. 杰克,亨德森使用的是一种交织加密法。
You need the encryption key each time you want to start the database. 每次您要启动数据库时,都需要加密密钥。
Research and Realization of Encryption Key Switch Technology for Stream Media in DRM DRM中流媒体加密密钥切换技术研究与实现
Generally, digital data in blocks of fixed bit length is combined with a digital encryption key. 一般而言,固定位长的字块中数字化数据是与数字密钥混合在一起的。
Utility is an encryption key management tool. 实用工具是一个加密密钥管理工具。
The encryption key is bound to a certificate. 加密密钥与证书绑定在一起。
The source password export server and the target server do not have the same encryption key for the source domain. 源密码导出服务器和目标服务器在源域上使用的加密密钥不一样。
Support for creating encrypted partitions is limited as it is not possible to generate a random encryption key. 由于无法生成随机的密钥,对于创建加密分区的支持仍然有限。