1·One of the museum exhibits is this underground magnet antenna from the Bita cryptographic hardware.
博物馆的展馆之一是来自于 Bita 加密硬件的地下磁铁天线。
2·I first discovered the Napoleonic cryptographic battle a few years ago when I was reading Sir Charles Oman's epic History of the Peninsular War.
几年前,我在阅读查尔斯·奥曼爵士的恢弘巨著《半岛战争史》时,第一次发现了拿破仑时期的密码战。
3·Create and exchange cryptographic keys for saml.
创建并交换用于SAML的加密密钥。
4·We need to implement cryptographic functionality as well.
我们还需要实现密码功能。
5·We will now try to form a strategy for cryptographic support.
现在我们将尝试形成一个用于密码支持的策略。
6·In fact, even MIDP 2.0 will not include generic cryptographic APIs.
实际上,甚至MIDP 2.0也将不包含通用密码api。
7·This handshake produces the cryptographic parameters of the session.
此次握手将生成会话的加密参数。
8·As with any cryptographic keys, these should be changed periodically.
与任何密码术密钥一样,应该定期改变这些密钥。
9·There is no 100-percent uncrackable, full-proof cryptographic method.
不存在 100% 不受攻击的绝对完整的加密方法。
10·The new LTPA token USES the following strong cryptographic techniques.
新的ltpa令牌使用以下强加密技术。
1·One of the museum exhibits is this underground magnet antenna from the Bita cryptographic hardware.
博物馆的展馆之一是来自于 Bita 加密硬件的地下磁铁天线。
2·A credential can be anything from simple password to a complex cryptographic key.
凭证可以是从简单的密码到复杂的加密密钥的任何东西。
3·This is a cryptographic protocol that takes as its inputs, among others, any attributes to be encoded into the token.
这是在一部分输入和属性需要编码到令牌中的时候所要采用的加密协议。
4·One of the museum exhibits is this underground magnet antennae from the 'Bita' cryptographic hardware.
博物馆的展馆之一,是来自于“碧塔海”加密硬件的地下磁铁天线。
5·This handshake produces the cryptographic parameters of the session.
此次握手将生成会话的加密参数。