|
1. | Today's strong algorithms, which need not remain secret, pose a mathematical problem that is hard to solve without the correct key. |
| 今天,强有力的算法必须保密,它提出的数学问题在没有正确的密钥情况下是难以解开的。 |
|
|
| |
2. | FOR INTERMITTENT 2ND GEAR OPERATION AND THEN A SUBSEQUENT RETURN TO NORMAL OPERATION WITHOUT CYCLING THE IGNITION KEY |
| 对于间歇的第二档操作,及随后的不用旋转点火钥匙就能返回正常操作 |
|
|
| |
3. | The steps and operations performed in converting encrypted messages into plaintext without initial knowledge of the key employed in the encryption. |
| 在不知道密码系统的密钥的情形下,将密文转变成明文的步骤和操作(过程)。 |
|
|
| |
4. | To work well, digital envelopes require that a public key infrastructure is in place: without the correct digital key to decrypt the wrapper, an intruder can't view the message inside. |
| 为了很好工作,数字信封需要有一个公开的密钥基础设施:没有正确的数字密钥对包装器解密,入侵者就不能看到里面的信息。 |
|
|
| |
5. | The key is to help strengthen your immune system and modify symptoms without taking them away because they are part of the recovery process. |
| 问题的关键在于增强你的免疫力,而不是通过简单地消除症状来缓解病情,因为这些症状是痊愈过程的必然环节。 |
|
|
| |
6. | With its vast territory and huge population, our country can't get along without some large key industries. |
| 我国国家大、人口多,没有一点大的骨干工业是不行的。 |
|
|
| |
7. | To open(a lock) without the use of a key. |
| 撬开锁不用钥匙而打开(锁) |
|
|
| |
8. | Without delay, she placed the golden key into the keyhole and turned it. |
| 毫不迟疑地,她把金钥匙插进钥匙孔里,然后旋转钥匙。 |
|
|
| |
9. | This allows Site A to communicate with Sites B and C using a single security device and key management system -- but different keys -- without making communications with either party vulnerable to the other. |
| 这就允许A场点利用单一的安全装置和密钥管理系统(但不同的密钥)与B场点和C场点进行通信,而不与易受其它方攻击的一方进行通信。 |
|
|
| |
10. | The key to this approach is first to choose the right individuals to design for—those users whose needs best represent the needs of a larger set of key constituents (see Figure 5-2)—and then to prioritize these individuals so that the needs of the most important users are met without compromising our ability to meet the needs of secondary users. |
| 这种方法的关键是首先要确定产品是为哪些人所设计的,首先选择合适的个体,他的需求代表很大一部分关键成员的需求(见图5-2)。 之后,将这些个体进行优先级排序,以解决最重要用户的需求,这样一来就可以保证我们在满足了最重要个体的需求的同时,不会损害那些次重要个体的需求。 |
|
|
| |