「encrypted~」の共起表現一覧(1語右で並び替え)
該当件数 : 148件
ated with Kabbalah astrology, and records an | encrypted alphabet for use in mystical formulas. |
ts the creation of resident and non-resident | encrypted and non-encrypted viruses. |
Its literature employed an | encrypted and enigmatic style. |
The employee's laptop was not | encrypted, and was not recovered. |
the Galois field per each block (128 bit) of | encrypted and authenticated data. |
transmission, intended for military use, was | encrypted and was only available to authorised users w |
It allows users to send SMS's that are | encrypted and signed usingPKI technology and ensures t |
k into sixteen 32-bit words that are further | encrypted and rearranged. |
ability to choose arbitrary plaintexts to be | encrypted and obtain the corresponding ciphertexts. |
re codec alleged to have the ability to play | encrypted and/or otherwise protected media content. |
If the key is to be | encrypted, another key is needed, and so on ad infinit |
, easily detected viruses, which are usually | encrypted as well. |
ations, radio programs broadcasting messages | encrypted as number sequences. |
, to which anything written is automatically | encrypted before being stored on a computer's hard or |
s one of several countries seeking access to | encrypted BlackBerry communication. |
y of the plaintext bits will cause the final | encrypted block to change in a way that cannot be pred |
the Data Encryption Standard algorithm (DES) | encrypted blocks of eight bytes. |
As of this time, all channels are now | encrypted both C-band and Ku-band signals. |
ine the range and location of the data to be | encrypted, but the process is the same for each. |
C:\\Windows is | encrypted, but if the user logs off and logs on again, |
World War codebreaking centre where messages | encrypted by the Enigma Machine were decrypted) where |
he drafting of sports programs on the French | encrypted channel. |
grams for creating a decentralized anonymous | encrypted communication network. |
Therefore, nearly all | encrypted communities are hosted on the Internet with |
Actifed is a G2-generated | encrypted computer virus which infects .COM and .EXE f |
ecurity is provided by means of a 128bit SSL | encrypted connection, user-name and password, as well |
y subdomain names, will reveal if 'Send For: | Encrypted connections only,' has been set. |
LibVNCClient furthermore supports IPv6 and | encrypted connections. |
GARS radio or fiber optic cables to transmit | encrypted data between the ECS and the launchers. |
ne, Research in Motion, to give it access to | encrypted data transmitted via the handset. |
e attacker can extract some information from | encrypted data sufficient to distinguish it from rando |
The theme of the human brain storing | encrypted data is found in William Gibson's short stor |
nations considering a ban is security: that | encrypted data stored on servers in another nation may |
uter's memory, allowing the computer to read | encrypted data after waking up or after reading back t |
ext attack which can reveal the existence of | encrypted data, as follows. |
user that can access the key can access the | encrypted data. |
f v3.10 will include: Parametrized Missions, | Encrypted databases and scenarios, and Harpoon Users D |
Real Madrid TV is an | encrypted Digital television channel, operated by Real |
lowed in 2006 by MIPRO introducing the first | encrypted digital wireless microphone system in Taiwan |
) system that allows one to create a virtual | encrypted disk within a file. |
Unlocking FileVault: An Analysis of Apple's | Encrypted Disk Storage System. |
s on the system and securely move them to an | encrypted disk |
ms overwrite their cached encryption keys as | encrypted disks are dismounted. |
Therefore, ensuring that all | encrypted disks are dismounted (secured) whenever it i |
across the street from the Herald to receive | encrypted dispatches to which he held the only key. |
mentation faces criticism for not supporting | encrypted documents and formula format in the same way |
ing rebranding as U Television and switch to | encrypted DVB-T |
IA official in 2004 sent an Iranian agent an | encrypted electronic message, mistakenly including dat |
Zimmermann suggests that "online | encrypted email storage" cannot be expected to provide |
which led to the discovery of a handwritten | encrypted fax in French promising an amount of R500,00 |
t is supplied to allow basic, but effective, | encrypted file systems to be created |
ch that a low percentage (1% - 0.01%) of the | encrypted files may be cracked in a reasonably short t |
ny user who knows the access password for an | encrypted filesystem should be able to mount it when n |
yptographic Filesystem) is a POSIX-compliant | encrypted filesystem that has been part of the mainlin |
Multiple | encrypted filesystems can be stored within a single di |
The setup of loop devices needed to access | encrypted filesystems within ordinary files should occ |
More recent innovations have included | encrypted firing parameters, which must be decrypted t |
ilitary transmissions they are almost always | encrypted for security reasons. |
The recorder data is stored in an | encrypted format and can be presented to any official |
Messages are | encrypted from the pathology laboratory to the DTS ser |
grammable electronic computer, to help solve | encrypted German messages. |
SARBE - | Encrypted GPS emergency beacons for military forces |
And if you use our | encrypted homepage, you can be end to end encrypted as |
Recently it has been applied to | encrypted HTTP cookies in several web application fram |
File wiping is applied when deleting an | encrypted image |
data wiping is applied transparently when an | encrypted image is deleted.) |
Encrypted images can be accessed on Windows Mobile and | |
Encrypted indexes and communications | |
ch allegedly has the capability to determine | encrypted information such as IP addresses, port numbe |
rams to examine Biblical passages to extract | encrypted information about future events. |
AllPeers | encrypted its communication using standard protocols l |
2 is used as the plaintext for Part 3 of the | encrypted Kryptos sculpture at CIA Headquarters in Lan |
N pivoting enables the attacker to create an | encrypted layer 2 tunnel into the compromised machine |
peers" to relay network connections over SSL | encrypted links. |
r in the 1994 FARMS Review which included an | encrypted message stating "Metcalf is Butthead." |
The Latin numbers in the sentence - an | encrypted message - summon up to the year 1670. |
aber (now called CipherSaber-1 or CS1), each | encrypted message begins with a random ten byte initia |
decrypted from Morse code for the audience ( | encrypted message is in German once decrypted), it app |
) leaks data about whether the padding of an | encrypted message is correct or not. |
tion method used, some information about the | encrypted message, or refine the potential key space. |
had used to reveal them back into the whole | encrypted message, to good effect. |
Encrypted Messages in Alban Berg's Music. | |
g of characters, civilians cannot decode any | encrypted messages because they most likely use one-ti |
gma codes and resulted in faster decoding of | encrypted messages, as well as providing an up-to-date |
ant to pounce on anyone who it finds sending | encrypted messages. |
It supports OTR | encrypted messages. |
tween the two is supposedly able to read the | encrypted messages. |
rom detecting (as opposed to decrypting) the | encrypted messages. |
uropean spies, he used actual radio traffic ( | encrypted number sequences in spoken German language v |
rs in World War II who were solving messages | encrypted on the Enigma machine. |
dely accepted solution is to store the files | encrypted on the physical media (disks, USB pen drives |
To simplify the code, the author has | encrypted only a vectorial search pattern in it, so th |
The existing system, TACAN, is not | encrypted or concealed in any way, which can reveal th |
as Abraxas5, discovered in April 1993, is an | encrypted, overwriting, file infecting computer virus |
emporary mail-addresses) as well as offering | encrypted password and file storage and connectivity s |
ciated plaintext (such as a username with an | encrypted password) and checks the variations against |
launched on 28 August 1998 and serves as an | encrypted pay-television service. |
Cryptograms - decipher | encrypted phrases |
verified when the bank's software sends the | encrypted PIN to a hardware security module (HSM). |
he Trojan and the CLEARAID program recovered | encrypted plaintext after the Trojan triggered. |
components, including ASIC-based IPS, Custom | Encrypted RAID Drives, and Hardware Security Modules. |
ymity by routing traffic through a series of | encrypted relays. |
y and the core group would privately compile | encrypted reports detailing both the legal protests an |
ption using cipher-block chaining (CBC) with | encrypted salt-sector initialization vector (ESSIV), t |
The | encrypted sculpture Cyrillic Projector is part of an e |
This | encrypted section is used as a means of encouraging vi |
y the OpenSSH project, which runs inside the | encrypted Secure Shell connection. |
Currently the | encrypted signal is beamed via AsiaSat 3S across Mainl |
ing SourceForge due to issues with exporting | encrypted software. |
fruux synchronization uses | encrypted SSL transfers. |
hm and key), and comparing the output to the | encrypted string. |
(FTA) direct-to-home (DTH) broadcasting and | encrypted subscription channels / services. |
Gay TV was an | encrypted subscription channel from the UK that broadc |
Encrypted swap partitions are supported, and can be co | |
jects, including a book of Private Codes for | encrypted telegraphy. |
the Thirty Years' War, some Swedish officers | encrypted their messages by writing with runes. |
]... the decade of the monument still stands | encrypted this way, in this way I see black daedalus a |
Exchanging data | encrypted through XXTEA, XOR algorithms |
The crew was forced to use a slow, | encrypted transmission method, likely causing the imag |
be avoided by using ssh, SSL, SPKM or other | encrypted transport layer. |
LUKS, cryptoloop, dm-crypt), allowing data | encrypted under Linux to be read (and written) freely. |
mi and Hi-1 may be switched, so that Hi-1 is | encrypted under the key mi. |
re likely to occur when the same letters are | encrypted using the same key letters than by mere coin |
laintext from a block of ciphertext that was | encrypted using what was then the standard default enc |
both the plaintext (called a crib), and its | encrypted version (ciphertext). |
rtually all services uplinked by Cancom were | encrypted via this method, with the exception of one c |
A crypto-society is an | encrypted virtual community. |
BestCrypt can create and mount an | encrypted virtual drive using AES, Blowfish, Twofish, |
Infected files will have Cleevix's | encrypted virus code appended to them. |
le to use one of these programs to access an | encrypted volume created by the other. |
r Windows Mobile which allows using the same | encrypted volume on both platforms. |
key stretching (using PBKDF2), and remembers | encrypted volume configuration across reboots. |
This software is compatible with Linux | encrypted volumes (e.g. |
oice-over-Wi-Fi analyzer that can be used on | encrypted VoWLAN networks. |
systems can be deployed to provide dedicated | encrypted VPN gateways, stateful firewall protection, |
For using as a full-fledged | encrypted VPN. |
storage service primarily accessible through | encrypted WebDAV. |
password hashes, stored in the SAM file, are | encrypted with the Syskey, and the Syskey value is not |
A special plaintext file is created and | encrypted with the encryption method under attack, suc |
Data is | encrypted with PKI prior to submission for report proc |
SSL transfers (128-bit) and stores the data | encrypted with 448-bit Blowfish. |
library for accessing and unscrambling DVDs | encrypted with the Content Scramble System (CSS). |
as it is used to decrypt all correspondence | encrypted with the public key. |
The messages composed by the user will be | encrypted with recipient's public key and will land up |
he Real-time Transport Protocol which may be | encrypted with the Secure Real-time Transport Protocol |
updated, it is unable to rip DVD's that are | encrypted with newer forms of copy protection. |
The message is | encrypted with some block cipher algorithm in CBC mode |
s the "deconstructive reading" as a parasite | encrypted within itself as part of itself. |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |