「encrypted~」の共起表現(1語右で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > encrypted~の意味・解説 > encrypted~に関連した共起表現

「encrypted~」の共起表現一覧(1語右で並び替え)

該当件数 : 148



ated with Kabbalah astrology, and records an encrypted alphabet for use in mystical formulas.
ts the creation of resident and non-resident encrypted and non-encrypted viruses.
Its literature employed an encrypted and enigmatic style.
The employee's laptop was not encrypted, and was not recovered.
the Galois field per each block (128 bit) of encrypted and authenticated data.
transmission, intended for military use, was encrypted and was only available to authorised users w
It allows users to send SMS's that are encrypted and signed usingPKI technology and ensures t
k into sixteen 32-bit words that are further encrypted and rearranged.
ability to choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts.
re codec alleged to have the ability to play encrypted and/or otherwise protected media content.
If the key is to be encrypted, another key is needed, and so on ad infinit
, easily detected viruses, which are usually encrypted as well.
ations, radio programs broadcasting messages encrypted as number sequences.
, to which anything written is automatically encrypted before being stored on a computer's hard or
s one of several countries seeking access to encrypted BlackBerry communication.
y of the plaintext bits will cause the final encrypted block to change in a way that cannot be pred
the Data Encryption Standard algorithm (DES) encrypted blocks of eight bytes.
As of this time, all channels are now encrypted both C-band and Ku-band signals.
ine the range and location of the data to be encrypted, but the process is the same for each.
C:\\Windows is encrypted, but if the user logs off and logs on again,
World War codebreaking centre where messages encrypted by the Enigma Machine were decrypted) where
he drafting of sports programs on the French encrypted channel.
grams for creating a decentralized anonymous encrypted communication network.
Therefore, nearly all encrypted communities are hosted on the Internet with
Actifed is a G2-generated encrypted computer virus which infects .COM and .EXE f
ecurity is provided by means of a 128bit SSL encrypted connection, user-name and password, as well
y subdomain names, will reveal if 'Send For: Encrypted connections only,' has been set.
LibVNCClient furthermore supports IPv6 and encrypted connections.
GARS radio or fiber optic cables to transmit encrypted data between the ECS and the launchers.
ne, Research in Motion, to give it access to encrypted data transmitted via the handset.
e attacker can extract some information from encrypted data sufficient to distinguish it from rando
The theme of the human brain storing encrypted data is found in William Gibson's short stor
nations considering a ban is security: that encrypted data stored on servers in another nation may
uter's memory, allowing the computer to read encrypted data after waking up or after reading back t
ext attack which can reveal the existence of encrypted data, as follows.
user that can access the key can access the encrypted data.
f v3.10 will include: Parametrized Missions, Encrypted databases and scenarios, and Harpoon Users D
Real Madrid TV is an encrypted Digital television channel, operated by Real
lowed in 2006 by MIPRO introducing the first encrypted digital wireless microphone system in Taiwan
) system that allows one to create a virtual encrypted disk within a file.
Unlocking FileVault: An Analysis of Apple's Encrypted Disk Storage System.
s on the system and securely move them to an encrypted disk
ms overwrite their cached encryption keys as encrypted disks are dismounted.
Therefore, ensuring that all encrypted disks are dismounted (secured) whenever it i
across the street from the Herald to receive encrypted dispatches to which he held the only key.
mentation faces criticism for not supporting encrypted documents and formula format in the same way
ing rebranding as U Television and switch to encrypted DVB-T
IA official in 2004 sent an Iranian agent an encrypted electronic message, mistakenly including dat
Zimmermann suggests that "online encrypted email storage" cannot be expected to provide
which led to the discovery of a handwritten encrypted fax in French promising an amount of R500,00
t is supplied to allow basic, but effective, encrypted file systems to be created
ch that a low percentage (1% - 0.01%) of the encrypted files may be cracked in a reasonably short t
ny user who knows the access password for an encrypted filesystem should be able to mount it when n
yptographic Filesystem) is a POSIX-compliant encrypted filesystem that has been part of the mainlin
Multiple encrypted filesystems can be stored within a single di
The setup of loop devices needed to access encrypted filesystems within ordinary files should occ
More recent innovations have included encrypted firing parameters, which must be decrypted t
ilitary transmissions they are almost always encrypted for security reasons.
The recorder data is stored in an encrypted format and can be presented to any official
Messages are encrypted from the pathology laboratory to the DTS ser
grammable electronic computer, to help solve encrypted German messages.
SARBE - Encrypted GPS emergency beacons for military forces
And if you use our encrypted homepage, you can be end to end encrypted as
Recently it has been applied to encrypted HTTP cookies in several web application fram
File wiping is applied when deleting an encrypted image
data wiping is applied transparently when an encrypted image is deleted.)
Encrypted images can be accessed on Windows Mobile and
Encrypted indexes and communications
ch allegedly has the capability to determine encrypted information such as IP addresses, port numbe
rams to examine Biblical passages to extract encrypted information about future events.
AllPeers encrypted its communication using standard protocols l
2 is used as the plaintext for Part 3 of the encrypted Kryptos sculpture at CIA Headquarters in Lan
N pivoting enables the attacker to create an encrypted layer 2 tunnel into the compromised machine
peers" to relay network connections over SSL encrypted links.
r in the 1994 FARMS Review which included an encrypted message stating "Metcalf is Butthead."
The Latin numbers in the sentence - an encrypted message - summon up to the year 1670.
aber (now called CipherSaber-1 or CS1), each encrypted message begins with a random ten byte initia
decrypted from Morse code for the audience ( encrypted message is in German once decrypted), it app
) leaks data about whether the padding of an encrypted message is correct or not.
tion method used, some information about the encrypted message, or refine the potential key space.
had used to reveal them back into the whole encrypted message, to good effect.
Encrypted Messages in Alban Berg's Music.
g of characters, civilians cannot decode any encrypted messages because they most likely use one-ti
gma codes and resulted in faster decoding of encrypted messages, as well as providing an up-to-date
ant to pounce on anyone who it finds sending encrypted messages.
It supports OTR encrypted messages.
tween the two is supposedly able to read the encrypted messages.
rom detecting (as opposed to decrypting) the encrypted messages.
uropean spies, he used actual radio traffic ( encrypted number sequences in spoken German language v
rs in World War II who were solving messages encrypted on the Enigma machine.
dely accepted solution is to store the files encrypted on the physical media (disks, USB pen drives
To simplify the code, the author has encrypted only a vectorial search pattern in it, so th
The existing system, TACAN, is not encrypted or concealed in any way, which can reveal th
as Abraxas5, discovered in April 1993, is an encrypted, overwriting, file infecting computer virus
emporary mail-addresses) as well as offering encrypted password and file storage and connectivity s
ciated plaintext (such as a username with an encrypted password) and checks the variations against
launched on 28 August 1998 and serves as an encrypted pay-television service.
Cryptograms - decipher encrypted phrases
verified when the bank's software sends the encrypted PIN to a hardware security module (HSM).
he Trojan and the CLEARAID program recovered encrypted plaintext after the Trojan triggered.
components, including ASIC-based IPS, Custom Encrypted RAID Drives, and Hardware Security Modules.
ymity by routing traffic through a series of encrypted relays.
y and the core group would privately compile encrypted reports detailing both the legal protests an
ption using cipher-block chaining (CBC) with encrypted salt-sector initialization vector (ESSIV), t
The encrypted sculpture Cyrillic Projector is part of an e
This encrypted section is used as a means of encouraging vi
y the OpenSSH project, which runs inside the encrypted Secure Shell connection.
Currently the encrypted signal is beamed via AsiaSat 3S across Mainl
ing SourceForge due to issues with exporting encrypted software.
fruux synchronization uses encrypted SSL transfers.
hm and key), and comparing the output to the encrypted string.
(FTA) direct-to-home (DTH) broadcasting and encrypted subscription channels / services.
Gay TV was an encrypted subscription channel from the UK that broadc
Encrypted swap partitions are supported, and can be co
jects, including a book of Private Codes for encrypted telegraphy.
the Thirty Years' War, some Swedish officers encrypted their messages by writing with runes.
]... the decade of the monument still stands encrypted this way, in this way I see black daedalus a
Exchanging data encrypted through XXTEA, XOR algorithms
The crew was forced to use a slow, encrypted transmission method, likely causing the imag
be avoided by using ssh, SSL, SPKM or other encrypted transport layer.
LUKS, cryptoloop, dm-crypt), allowing data encrypted under Linux to be read (and written) freely.
mi and Hi-1 may be switched, so that Hi-1 is encrypted under the key mi.
re likely to occur when the same letters are encrypted using the same key letters than by mere coin
laintext from a block of ciphertext that was encrypted using what was then the standard default enc
both the plaintext (called a crib), and its encrypted version (ciphertext).
rtually all services uplinked by Cancom were encrypted via this method, with the exception of one c
A crypto-society is an encrypted virtual community.
BestCrypt can create and mount an encrypted virtual drive using AES, Blowfish, Twofish,
Infected files will have Cleevix's encrypted virus code appended to them.
le to use one of these programs to access an encrypted volume created by the other.
r Windows Mobile which allows using the same encrypted volume on both platforms.
key stretching (using PBKDF2), and remembers encrypted volume configuration across reboots.
This software is compatible with Linux encrypted volumes (e.g.
oice-over-Wi-Fi analyzer that can be used on encrypted VoWLAN networks.
systems can be deployed to provide dedicated encrypted VPN gateways, stateful firewall protection,
For using as a full-fledged encrypted VPN.
storage service primarily accessible through encrypted WebDAV.
password hashes, stored in the SAM file, are encrypted with the Syskey, and the Syskey value is not
A special plaintext file is created and encrypted with the encryption method under attack, suc
Data is encrypted with PKI prior to submission for report proc
SSL transfers (128-bit) and stores the data encrypted with 448-bit Blowfish.
library for accessing and unscrambling DVDs encrypted with the Content Scramble System (CSS).
as it is used to decrypt all correspondence encrypted with the public key.
The messages composed by the user will be encrypted with recipient's public key and will land up
he Real-time Transport Protocol which may be encrypted with the Secure Real-time Transport Protocol
updated, it is unable to rip DVD's that are encrypted with newer forms of copy protection.
The message is encrypted with some block cipher algorithm in CBC mode
s the "deconstructive reading" as a parasite encrypted within itself as part of itself.
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS