DictionaryForumContacts

Terms containing Key | all forms | exact matches only
SubjectEnglishChinese Taiwan
comp., MSasymmetric key algorithm非對稱金鑰演算法 (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSAuthority Key Identifier授權單位金鑰識別元 (A certificate extension used by the certificate chaining engine to determine what certificate was used to sign a presented certificate. The AKI can contain the issuer name, serial number, public key information, or no information at all. By matching the information in a certificate's AKI extension to a CA certificate's Subject Key Identifier (SKI) extension, a certificate chain can be built)
comp., MSclass key member類別機碼成員 (One of the members of a multi-valued class key)
comp., MSenhanced key usage增強金鑰使用方法 (An extended property value that specifies the uses for which a certificate is valid)
comp., MSexternal key file外部金鑰檔案 (A file that contains the external key and is stored on an external media device. The name and contents of the file are internal to Microsoft and can change from version to version)
comp., MSforeign key association外部索引鍵關聯 (An association between entities that is managed through foreign key properties)
comp., MSGroup Key Distribution Service群組金鑰發佈服務 (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys)
comp., MSInternet Key Exchange網際網路金鑰交換 (A protocol that establishes the security association and shared keys necessary for computers to communicate by using Internet Protocol security (IPsec))
comp., MSkey action按鍵動作 (Term used to describe program behavior when a certain key is pressed on the keyboard. Key actions are associated with items within a source document)
comp., MSkey attribute索引鍵屬性 (The attribute of a dimension that links the non-key attributes in the dimension to related measures)
comp., MSkey-based renewal金鑰型更新 (A method of renewing a certificate using the existing key material as the sole form of authentication)
comp., MSkey certification authority金鑰憑證授權單位 (A trusted entity that typically keeps a secure database of compound messages signed with the KCA's private key. In practical implementations, the compound messages consist of the user's name, the user's public key, and any other important information about the user. When the receiving application gets a signed message from a user, the application can then verify the public key received with the message by comparing it to the public key stored in the KCA database)
comp., MSkey column索引鍵資料行 (A column whose contents uniquely identify every row in a table)
comp., MSkey combination按鍵組合 (Any combination of keys that must be pressed simultaneously)
comp., MSkey derivation function A cryptographic function that generates key material from a secret value金鑰衍生函數 (Key Derivation Function)
comp., MSkey dictation金鑰指定 (The action by a Trusted Intermediary Agent of determining the key that will be used in an IPsec connection)
comp., MSKey Distribution Center金鑰發佈中心 (A network service that supplies session tickets and temporary session keys to users and computers within an Active Directory domain. The KDC runs on each domain controller as part of Active Directory Domain Services (AD DS))
comp., MSKey Distribution Center proxy service金鑰發佈中心 Proxy 服務 (A service that runs on corporate network edge servers to proxy Kerberos protocol messages to domain controllers which are situated on the corporate network. This permits Kerberos authentication to edge services such as Remote Desktop Services Gateway or DirectAccess Server)
comp., MSkey exchange金鑰交換 (Confidential exchange of secret keys online, which is commonly done with public key cryptography)
comp., MSkey filter索引鍵篩選 (A metadata column or field in a Key Filters control)
comp., MSKey Filters索引鍵篩選 (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values)
comp., MSkey generator金鑰產生器 (A hardware or software component that is used to generate encryption key material)
comp., MSkey ID金鑰識別碼 (A value that identifies the key for a packaged Windows Media file)
comp., MSkey ID金鑰識別元 (A globally unique identifier that uniquely identifies content for the purposes of licensing)
comp., MSkey identifier金鑰識別元 (A globally unique identifier that uniquely identifies content for the purposes of licensing)
comp., MSkey index金鑰索引 (The location where a specific network key for a wireless access point is stored)
comp., MSKey lock啟動鍵盤鎖 (An option that locks the keypad to avoid accidental key presses)
comp., MSkey logger鍵盤記錄木馬程式 (A type of malware that sends key strokes or screen shots to an attacker)
comp., MSKey Management Server金鑰管理伺服器 (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group)
comp., MSKey Management Service金鑰管理服務 (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures)
comp., MSKey Master金鑰主機 (A DNS server role that is responsible for all DNSSEC key management for a specific DNSSEC-signed DNS zone. Different DNS zones can have different Key Masters. The Key Master role can be moved from one DNS server to a different DNS server, but a DNS zone can have only one Key Master at a given time. To be a Key Master, the DNS server must be authoritative for the DNS zone, the zone must be signed with DNSSEC, and the DNS server must be selected to be the Key Master for the DNS zone)
comp., MSKey Metrics關鍵計量 (A tab in Application Diagnostics that provides an at-a-glance view of a selected application. The graph displays 1. the average performance based on the Monitored Requests counter, and 2. the number of requests. By looking at the graph, you can easily determine the traffic load and make inferences about problems that might be occurring)
comp., MSkey pair金鑰組 (A private key and its related public key)
comp., MSkey performance indicator關鍵效能指標 (A predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer)
comp., MSKey press按鍵動作 (" An option in "ringtones & sounds" settings. When this option is selected, the phone makes a sound when buttons on the on-screen keypad or keyboard are tapped.")
comp., MSkey protector金鑰保護裝置 (A blob (binary large object) that is used to restrict access to a BitLocker-protected disk)
comp., MSkey range lock關鍵範圍鎖定 (A lock that is used to lock ranges between records in a table to prevent phantom additions to, or deletions from, a set of records. Ensures serializable transactions)
comp., MSkey recovery金鑰復原 (The process of recovering a user's private key)
comp., MSkey repeat rate按鍵重複速度 (The rate at which characters repeat when a user holds down a key)
comp., MSkey roaming金鑰漫遊 (The process of moving between different environments or computers while authenitcated by certificates or keys centrally stored on a server)
comp., MSkey rollover金鑰變換 (The process by which an existing cryptographic key is replaced with a new cryptographic key and associated signatures are updated)
comp., MSkey search attack密鑰搜尋攻擊 (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered)
comp., MSkey seed金鑰種子 (A Base64-encoded 30-byte value that is used in conjunction with a key ID to create a content key)
comp., MSkey sequence按鍵順序 (Any combination of keys that must be pressed sequentially)
comp., MSkey signing key金鑰簽署金鑰 (A public key corresponding to a private key that is used to sign one or more DNS record sets at the zone apex)
comp., MSkey spline主要曲線 (A graphical representation of the changes in a property value between two keyframes that animate the property)
comp., MSkey-value pair機碼值組 (A set of data items that contains a unique identifier, called a key, and a value that is the actual data for the key)
comp., MSlicense key pack授權金鑰包 (A digital representation of one or more licenses)
comp., MSlicense key seed授權金鑰種子 (A shared secret value that is used to generate keys to encrypt Windows Media files)
comp., MSMicrosoft Exchange Key Management ServerMicrosoft Exchange 金鑰管理伺服器 (The Exchange computer on which the Key Management Service has been installed. There can be one Key Management Server per administrative group)
comp., MSMicrosoft Group Key Distribution ServiceMicrosoft 群組金鑰發佈服務 (An Active Directory Domain Services service that provides cryptographic keys that correspond to arbitrary sets of security principals in AD DS to users who are authorized to access those keys)
comp., MSpublic key algorithm公開金鑰演算法 (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSPublic Key Cryptography Standards公開金鑰加密標準 (A family of standards for public key cryptography that includes RSA encryption, Diffie-Hellman key agreement, password-based encryption, extended-syntax, cryptographic message syntax, private key information syntax, and certificate request syntax, as well as selected attributes. Developed, owned, and maintained by RSA Data Security, Inc)
comp., MSpublic key encryption公開金鑰加密 (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp., MSpublic key infrastructure公開金鑰基礎結構 (The laws, policies, standards, and software that regulate or manipulate certificates and public and private keys. In practice, it is a system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in an electronic transaction. Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce)
comp., MSpublic key infrastructure hierarchy公開金鑰基礎結構階層 (A hierarchy in which the roles of the certification authority are separated into one root CA and one or more subordinate CAs)
comp., MSsecret key encryption祕密金鑰加密 (An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data)
comp., MSsubject key identifier主體金鑰識別碼 (A certificate extension that contains a hash of the certification authority's certificate public key. This hash is placed in the Authority Key Identifier (AKI) extension of all issued certificates to facilitate chain building)
comp., MSsymmetric-key cryptography對稱金鑰密碼編譯 (A type of cryptography that uses symmetric keys to provide confidentiality)
comp., MSvirtual key code虛擬按鍵碼 (A symbolic constant name, hexadecimal value, or mouse or keyboard equivalent that provides a hardware and language-independent method of identifying keyboard keys. Each virtual key code represents a unique keyboard key and also identifies the purpose of that key. The keyboard driver must provide one or more keyboard layouts that maps keyboard scan codes to the appropriate virtual key codes)

Get short URL