| 1. | Does not display the encrypted arguments 将不显示加密后的参数。 |
| 2. | Only its encrypted version is present 仅存在其加密后的版本。 |
| 3. | The encryption method is of higher safe level and easy to use 并将人体的指纹信息作为水印放在加密后的数据中。 |
| 4. | Access to the encrypted data is granted only after entering the 通过认证之后才能访问加密后的数据,口令是在加密分区创建时设置的。 |
| 5. | The return value is a 13 - character printable character string representing the encrypted password 返回值是一个包含13个可打印字符的字符串,用来表示加密后的密码。 |
| 6. | Encrypted files can only be unencrypted by the user that encrypted the files or by a recovery agent 中文大意就是:加密后的文件只能由加密的人来解密或者用恢复代理。 |
| 7. | Therefore , we proposed an conception of fuzzy ergodic matrices , which is used for the decryption algorithm 我们在引入了模糊遍历矩阵,用来破解纯位置置乱算法加密后的图像。 |
| 8. | This is because the encrypted value can be used against you ( remember , only you could have done the encryption because only you have the private key ) 因为加密后的信息可能被用来对付你(记住,别人知道该信息是你加密的,因为只有你有加密用的私钥) 。 |
| 9. | Only the correct password users are able to access encrypted files which encrypted files is not dependent on any external support procedures can be run separately 只有输入正确密码的用户才能访问加密后的文件且加密后的文件不依赖任何外部支持程序就可单独运行。 |
| 10. | The main purpose of this paper is to introduce , according to some algorithm , how to encrypt user secret code , how to protect the encrypted data and how to come true in vb 结合作者在实际应用中的体会,根据某些算法,对用户密码进行了加密处理以及对加密后的数据进行了保护,并介绍如何在vb中实现。 |