英 [ɪnˈkrɪpt] 美 [ɪnˈkrɪpt]
v. 把……加密,将……译成密码
第三人称单数encrypts
现在分词encrypting
过去式encrypted
过去分词encrypted
encrypt /ɪnˈkrɪpt/ [ encrypting encrypted encrypts ]
及物动词 If a document or piece of information is encrypted, it is written in a special code, so that only certain people can read it. 把...译成密码; 加密
Account details are encrypted to protect privacy.
帐户信息均加以密码,以保护隐私。
...a program that will encrypt the information before sending.
...在发送前将信息加密的一个程序。
...encrypted signals.
...加密信号。
不可数名词
It is currently illegal to export this encryption technology from the U.S.
从美国出口这项加密技术在目前是违法的。
加密-引用次数:702
The different kinds of encrypt and access control techniques are analyzed.
对各种加密算法和访问控制方法进行了研究分析。
把…编码
加密-引用次数:208
This is called "encrypt once,decrypt many ways".
这种特性可以称为“一次加密,多种方式解密”。
信息加密与隐私保护 在很多信息管理软件中会应用哈希(Hash)和加密(Encrypt)进行数据保护,哈希是将目标对象转换成具有相同长度的、不可逆的杂凑字符串(或叫作信息摘要),而加密是将目标文本转换成具有相同...
1、哈希(Hash)与加密(Encrypt)的区别 在本文开始,我需要首先从直观层面阐述哈希(Hash)和加密(Encrypt)的区别,因为我见过很多朋友对这两个概念不是...
... 英文名: ENCRYPT 资源格式: DVDRip 导演: Oscar L. Costo ...
encryption 加密;加密术
The system lets you encrypt or scramble the data that's sent between machines.
这个系统可以让你对机器间互发的数据作加密或扰频处理。
We'll now use that key to encrypt data.
现在我们将使用那个密钥来加密数据。
One option is to not encrypt the key.
一种选择是不对密钥加密。
If you have some plain text, some message that you want to send, well, you can encrypt it or you can scramble it using a key, a secret key, which might be a physical machine like the Enigma 13 or it might be a number like 13.
如果你有没有加密的文本,你想要寄送的一些消息,你就可以加密它,或者你可以用一个密钥使其变得混乱,那就像一个英格玛的物理装置,或者他就是一个数字。
计算机科学课程节选 : 哈佛公开课
You type at the keyboard words that you want to encrypt.
你从键盘上键入你想加密的单词。
计算机科学课程节选 : 哈佛公开课
But how many of you have ever called Facebook up or called Amazon up and kind of whispered into their ear I'm going to encrypt this with the number 13.
但是有谁听过Facebook或者亚马逊,稍微低声地告诉他们,我将用密钥13加密这个消息?
计算机科学课程节选 : 哈佛公开课
So Appsense has written an application called Data Locker which lets firms encrypt information in Dropbox.
FORBES: Linking Personal Compute Devices To Corporate Systems -- Securely
"So most people encrypt using external devices like VPNs or tools like 'stunnel, '" Goldsmith says.
Many Reapers and Predators don't encrypt the video they transmit to American troops on the ground.