1.
Methods and Techniques of Geolord-AT Software Results Importing VirtuoZo Software
Geolord-AT空三加密成果导入VirtuoZo的方法与技巧
2.
Domain member: Digitally encrypt secure channel data (when possible)
域成员: 对安全通道数据进行数字加密 (如果可能)
3.
In cryptography, the result of securing a block of data by applying a cryptographic function.
利用加密函数对数据块加密的结果。
4.
The primary and mating seal faces are lapped to a maximum of 3-helium light bands flatness to provide effective sealing and leakage protection.
主密封面和配套密封面叠加成最多3层的轻型带状平面,提高密封和防泄漏效果。
5.
"Generating cryptographic key and setting key protection...
"正在生成加密密钥并设置密钥保护...
6.
Clinical evaluation of the impression method of using silicone impression material and prepared plastic pins in cast-post-core restoration
硅橡胶加预成胶针精密印模铸造桩核临床效果评价
7.
Click Create New Encryption Key to generate a new encryption key.
单击“新建加密键”以生成新的加密键。
8.
No encryption allowed (server will disconnect if it requires encryption)
不允许加密(如果它需要加密,服务器将断开连接)
9.
In public-key or two-key encryption, a key pair is used for encryption and decryption.
公开密钥加密也称为双密钥加密,它需要使用一对密钥来分别完成加密和解密操作。
10.
The result showed that the MAP could maintain tenderness, inhibit the synthesis of chlorophyll in surface, and maintain better cell membrane integrity.
结果表明:高密度聚乙烯包装可保持茭白的嫩度、制果皮中叶绿素的合成及细胞质膜透性的增加。
11.
Certificate Services is generating the cryptographic key and setting key protection.
证书服务正在生成加密密钥并设置密钥保护。
12.
Design and Implementation of Encrypted Solid State Disk Integrated with Hardware Encryption
集成硬件加密的加密固态盘的设计与实现
13.
Require encryption (disconnect if server declines)
需要加密(如果服务器拒绝将断开连接)
14.
Encryption Algorithm based on Three-dimensional Scrambling
基于三维置乱的加密算法及效果分析
15.
Projected economic costs due to health consequences of teenagers’loss of confidentiality in obtaining reproductive health care services in Texas
德克萨斯州青少年生殖保健服务缺乏保密引起的健康后果而增加的经济成本
16.
"No encryption allowed (server will disconnect if it requires encryption)\0
"不允许加密 (如果它需要加密,服务器将断开连接)\0
17.
If you have a public-key encryption system, you can have it add an electronic signature to a document.
如果有了公开密钥加密系统,就可以对文档加上电子签名。
18.
Where the classified achievements in survey and drawing are duplicated, they must be subjected to the administration corresponding to the original security class.
复制保密的测绘成果,还必须按照原密级管理。