encrypted

美 [ɪnˈkrɪptɪd]英 [ɪnˈkrɪptɪd]
  • v.把…加密(或编码)
  • adj.加密的
  • encrypt的过去分词和过去式
encryptedencrypted

encrypted

频次

  • 1
    VERB 把…编码;把…加密
    If a document or piece of information is encrypted, it is written in a special code, so that only certain people can read it.

    Account details are encrypted to protect privacy.

    账户资料被加密,以保护隐私。

  • It is currently illegal to export this encryption technology from the US.

    从美国出口这种加密技术在当前是违法的。

  1. The merchant would pass the encrypted information on to the credit card processing agency , which would have the proper keys to decrypt the sensitive information .

    商家可以把加密信息传给信用卡处理机构,这些机构拥有正确的密匙,可对敏感信息解密。

  2. Steps 13 , 14 - Encrypt the Username and One-Time Password using the securely established GSS-API context and send across the encrypted information to the server .

    步骤13、14&使用前面建立的GSS-API上下文对用户名和一次性密码进行加密,并把加密的信息发送给服务器。

  3. Account details are encrypted to protect privacy .

    账户资料被加密,以保护隐私。

  4. And further down the road is biometric authentication , which could be encrypted with , say , a fingerprint .

    接下来是生物认证,可以用指纹等加密。

  5. Chip-and-PIN cards , by contrast , make fake cards or skimming impossible because the information that gets scanned is encrypted .

    相比之下,芯片密码卡不可能被伪造或侧录,因为扫描到的信息是加密的。

  6. Encrypt and compress individual files and folders . The program is compact , efficient and user friendly .

    加密和压缩的个人档案和folders.the计划是紧凑,高效和用户友好

  7. The Research of Encrypted Circuit Construction Based Secure Model for Mobile Agent

    基于加密电路构造的移动代理保护安全模型的研究

  8. Design of The Multimedia Data Encrypt System Based on Embedded DB

    嵌入式视频数据库数据加密系统的设计

  9. Study of information security and encrypt on wireless network

    无线网络中信息安全加密技术的研究

  10. Design and Realization of Once a Secret Key Encrypt System

    一次一密加密系统设计与实现

  11. Note that the key is also encrypted as described below .

    请注意,正如下面所描述的,密钥同样也被加密了。

  12. Research on the application of RAS encrypt techniques in the internet business

    数字加密技术在电子商务中运用的两种方法

  13. Network data is encrypted only while it is in transit .

    网络数据只在传输时加密。

  14. The popular encrypt algorithms are introduced in this paper .

    介绍了目前流行的加密算法规则及其应用领域。

  15. You might also want to encrypt specific configuration settings .

    您可能还需要加密特定配置设置。

  16. Guarantees of Information Safety & Encrypted Data Technology

    信息安全的保证&数据加密技术

  17. The Technology of Authorized Sharing of Encrypted Database Based on Digital Signature

    基于数字签名的加密数据库授权共享技术

  18. Hard Disk File Encrypt System Based on the Filter Driver of Windows 2000

    基于Windows2000的过滤器驱动程序实现的硬盘文件加密系统

  19. Design and Implementation of High Speed PCI Encrypted Card

    高速PCI密码卡设计与实现

  20. Any user that does not have the key cannot access the encrypted data .

    任何没有密钥的用户都不能够访问加密的数据。

  21. The Discussion of Mechanism on Chemical Increasing Production in Thrice Encrypt Well

    三次加密井油井化学增产机理探讨

  22. We use this value whenever we have to encrypt only the content .

    每当我们都仅须加密内容时都使用这个值。

  23. Instead , values of the fields in the local environment are encrypted .

    否则,在本地环境中的字段值将被加密。

  24. The actual encrypted data appears as contents of the tag .

    实际加密的数据作为标记的内容出现。

  25. An Encrypted Binary Image Digital Watermarking Algorithm Based on DCT

    基于DCT域的加密二值图像数字水印新算法

  26. The server always tests the connection first for encrypted session requests .

    服务器将始终针对已加密的会话请求测试连接。

  27. Have you provided options for users to encrypt data on their local systems ?

    是否为用户提供了在其本地机器上加密数据的选项?

  28. The design and implementation of identity validation and encrypted transfer protocol based on Web Service

    Web服务身份验证与数据加密传输协议的设计与实现

  29. The first is to encrypt anything that you put into session .

    第一是把您放入会话中的所有内容加密。

  30. The remote server cannot use the Windows NT encrypted password .

    远程服务器不能使用WINNT加密密码。