| 1. | Jack : i watched beresch give this guy a key card 我看见柏奇给了这家伙一张密匙卡 |
| 2. | Authorize ss and perform key exchange 批准用户端设备接入,执行密匙交换。 |
| 3. | I hacked into n . s . a . ' s network and pulled the decryption key 我入侵了国安局的网络,获取了密匙 |
| 4. | Law # 7 : encrypted data is only as secure as the decryption key 加密数据的安全程度取决于密匙的安全程度。 |
| 5. | Number of completely trusted signatures needed to make a key valid 使一个密匙有效所必须的完全信任的签名个数,目前是一个。 |
| 6. | Number of marginally trusted signatures needed to make a key valid 使一个密匙有效所必须的部分信任的签名个数,目前是两个。 |
| 7. | Notice that the alias , private key password , and key store password are the same as from listing 1 , the )请注意,别名、私钥密码、密匙库密码同清单1的 |
| 8. | No one denies the antiquity of the guild key and it , and it alone , translates these volumes 没人会否定这些破解密匙的古老,和它破译这些卷宗的唯一性。 |
| 9. | It ' s sort of like those probabilistic tests used to produce large prime numbers for public - key cryptography 这类似于那些用来为公开密匙系统产生大质数的概率测试。 |
| 10. | The data is thus duly segregated , and secured by a complex secret key system prohibiting unauthorised access 卡内的资料都是分隔储存,并由一套先进的密匙系统保护,严防非法使用。 |