网站首页  词典首页

请输入您要查询的词汇:

 

词汇 example_english_master-key
释义

Examples of master key


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
It is powerful because structure appears to provide a masterkey to the central tendencies of major powers.
Is there a masterkey to his thinking, a central argument or idea around which all the rest revolves?
We assume a maximum number of cut levels for each pin and choose a bitting vector for the top masterkey as the starting point.
In a masterkey system, a lock has at least one pin with more than one cut, allowing more than one key to open it.
Recently published work which, directly or indirectly, addresses these topics is illuminating in detail but cautious in suggesting that a ' masterkey ' has been found.
Although staff have a masterkey to bedrooms, hotels enable guests to safeguard their privacy and control access to their rooms by providing printed cards to hang outside the door.
In politics, the way to success is to seek for the masterkey which will unlock not only one door but all doors.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Each member has one of these small safes, numbered, but he has not a key, the masterkey being kept by the secretary or treasurer.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Common ownership of a new town's estate was often referred to by him as the "masterkey".
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Drastic arms reductions are the masterkey to the problems facing our country.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
For all that work his masterkey was the revenue provided by the mining industry, and, secondly, as an essential temporary measure, a substantial loan of £6,000,000 or £7,000,000 for reconstruction.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
He may be worried that persons could be forced to hand over a masterkey rather than, say, a session key because the authority serving the notice provided insufficient information.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
It seems to me that it is technical and professional training which is the masterkey for solving the terrible problem of dealing with disabled officers and men.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
And even now they can be understood only by those who possess the masterkey to unlock them.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Its products are typically marketed toward and installed into moderately sized or larger masterkey systems.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The locker was opened with a station staff masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Establishment of link keys is based on a masterkey which controls link key correspondence.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
By definition, a change key is not a masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
This is especially important for masterkey systems with lots of users.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Both methods may be combined to create a composite masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Note that, of course, a leaked masterkey reveals all the session keys derived from it.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
There are two desirable reasons for updating the masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
This pseudorandom key is derived from the sector number and a static 2048-bit masterkey with 128 bits of salt.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The key required to decrypt the masterkey is called the user key.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Landlords are not allowed to keep a spare or masterkey when renting out an apartment.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The individual sector keys are stored on disk and encrypted with a masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Thus, the key management protocol needs to exchange only one masterkey, all the necessary session keys are generated by applying the key derivation function.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Ultimately, the five keys join together to form a masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The system allowed pages to be marked unlocked, or the key to be a masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A far more secure (and more expensive) system has two cylinders in each lock, one for the change key and one for the masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
On the other hand, generation of a masterkey requires a higher quality, such as more entropy.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In 2003, he independently rediscovered a serious vulnerability in masterkey security in physical locks that was an open secret among locksmiths; his decision to disclose it publicly provoked controversy.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
For example, master keyed pin tumbler locks often have two shear points at each pin position, one for the change key and one for the masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
For the security key, see masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Ideally, devices will have the trust center address and initial masterkey preloaded; if a momentary vulnerability is allowed, it will be sent as described above.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In the course of their activities, they came across the locker, used the masterkey to open it, and found a suitcase full of gold coins.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Ultimately, at least the initial masterkey must be obtained through a secure medium (transport or pre-installation), as the security of the whole network depends on it.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
This key is essentially a masterkey.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The firm wanted men for "master keying pin tumber cylinder locks," which is obviously a matter of some complication.
From the
Hansard archive

Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0
Once the master keys are updated, traffic that has been encrypted or authenticated with the help of earlier master keys can not be played back.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Note that there is a difference between "master keys" and "session keys".
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In a master keyed lock, some or all of the pin stacks in the lock have three pins in it instead of two.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Link and master keys are only visible to the application layer.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Locks that have master keys have a second set of the mechanism used to operate them that is identical to all of the others in the set of locks.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Intel has confirmed that the crack is real, and believes the masterkey was reverse engineered rather than leaked.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
If you make a duplicate key from the masterkey, then a duplicate key from the first duplicate, in four generations the keys will not fit the lock.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2025/2/2 16:26:36