Firstly, sometimes only part of a message contains sensitive information, and so you are wasting cycles if you encrypt the whole message.
首先,有时候消息只有一部分包含敏感信息,所以如果加密整个消息的话就会浪费周期时间。
Typically for one-to-one interactions we use the service public key to encrypt information (and provide confidentiality).
对于一对一交互,我们通常使用服务公钥来加密信息并提供机密性。
We begin with an overview of what it means to encrypt and decrypt information, followed by some practical examples involving passwords and other data, using PHP's built-in functionality.
我们通过使用PHP内置功能先了解加密和解密信息的意义,进而了解涉及密码和其他数据的一些实际示例。
Ensure that a sufficiently robust encryption algorithm, such as triple DES or AES, is used to encrypt all confidential information stored on the system.
确保充分健全的加密算法,比如三重DES或者AES,用来加密所有存储在系统上的机密信息。
When you use super encryption, you can encrypt just the payment information with the accounts department's secret key to produce an element-encrypted XML file.
使用超级加密时,您可以用会计部门的秘钥只加密支付信息,以产生元素加密的XML文件。
Encrypt confidential or market valued information.
加密机密或有市场价值的信息。
There is no way to delete the file, as it will simply be restored, but you can encrypt your iPhone back-ups to make the information somewhat less accessible.
你是没有办法删除这个文件的,因为它就是要存数据的,但是,你可以对能比的iPhone备份进行加密,以便确保对这一信息的访问不那么容易。
It is used so you can programmatically determine if the password is being used to encrypt information (rwflag = 1) or decrypt information (rwflag = 0).
使用它的目的是使我们可以编程确定这个密码是正在用来加密信息(rwflag =1)还是解密信息(rwflag =0)。
We regularly encrypt electronic communication today because of the proliferation of identity theft and other information-based crimes.
由于盗窃个人身份和其它以信息为基础的犯罪行为的泛滥,我们通常把为电子信息交流加密。
To encrypt images is one of the important methods to ensure information safety.
对图像入行加密是保证图像信息安全的主要手腕之一。
Digital certificates bind owners to a pair of electronic keys that can be used to encrypt and sign information, assuring that the keys actually belong to the person or organization specified.
数字证明把拥有者与一对能用于对信息加密和签名的电子钥匙捆绑在一起,保证了这对钥匙真正属于指定的个人或机构。
In order to ensure information transmission security, encrypt and decrypt was used in channel coding and decoding of data communication.
为了保证信息传输的安全性,往往在数据通信的信道编码中进行加密处理,在收方进行解密处理。
Not only it confirms our identity to visitors but it also allows us to encrypt customer's information using state of the art 256-bit encryption.
它不仅肯定了我们对旅客的身份,但它也使我们能够加密客户的信息利用国家最先进的256位加密。
Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.
信息安全技术主要包括以加密技术为代表的密码技术、密钥管理技术、数据库加密技术等。
Two classical encryption methods PGP and information hiding technology are introduced. An approach to encrypt information based on these two methods is proposed at the same time.
本文介绍了PGP和信息隐藏技术这两种典型的加密方式,并提出了一种基于这两种加密方式的组合加密方法。
If the sensitive information needs only to be verified and not decrypted to a human-readable format, encrypt the sensitive information using a one-way hash.
如果只需要验证敏感资讯,而不将它解码为人们可读取的格式,则使用单向杂凑加密敏感资讯。
It is most unsuccessful when the significant information transmitted in plaintext forms on network, so we need to encrypt datas.
当重要的信息在网络上以明文的形式传输时是极不安全的,这就需要对数据进行加密。
The invented method and device have high reliability and flexibility. It realizes to encrypt sensitive information transmitted on common telephone network with relatively low cost.
实施本发明的方法及设备,有很大的可靠性和很大的灵活性,以较低成本实现在普通电话网上对敏感信息的加密。
It is proposed to apply the theory of private homomorphism to encrypt the database important or sensitive information, thus realizing direct operation of encrypted message.
提出了把秘密同态理论应用于加密数据库中重要或敏感的信息,从而可以实现直接对数据库密文进行操作的方法。
By installing the tool as web browser extension, you can encrypt and protect your information on any web site by security question and answer. Only people who know the answer can decrypt the message.
以浏览器扩展的方式安装本软件,您在任何网站的页面上均可通过设置安全问题和答案加密保护您的信息,只有知道答案的人才能对信息解密。
Sites buy them to encrypt traffic and assure visitors it's O. K. to enter confidential information.
网站购买加密流量,保证游客的行进入机密信息。
A new block cipher is designed where the diffusion of matrix multiplication is combined with the confusion of specially designed matrix operation to encrypt information.
设计了一种新的分组密码算法,该算法利用矩阵乘法的扩散作用与专门设计的一种矩阵运算的混乱作用实现对信息的加密。
The algorithm can be used to encrypt the hidden information when information hiding begins, in order to increase its security.
这个算法可以用于信息隐藏技术开始时对隐藏信息的加密处理,提高信息隐藏技术的安全性。
The easiest way here is to encrypt on the device and then decrypted, the origin of the code is a related example of the U disk data encryption to protect information hiding, to prevent privacy leaks.
这里最简单的方法就是对设备加密,然后再解密,本源代码就是一个与此相关的例子,对U盘数据加密,保护信息隐蔽,防止隐私泄露。
To reduce the risk of unauthorized access to sensitive information, you may want to encrypt your data.
为了减少对敏感信息进行未授权访问的风险,您可能需要加密数据。
Instead, encrypt the information so that, if it is exposed to an attacker somehow, the attacker cannot easily determine what the sensitive information contains.
而是应该加密资讯,以便资讯公开给攻击者时,该攻击者也无法轻易地判断敏感资讯所包含的内容。
An authenticated key agreement protocol is used to provide authentication in communication systems, and produces a short-time key that can encrypt the transferred information.
密钥协商协议在通信系统中为通信的参与者提供身份认证,并为参与者生成一个用来加密传递消息的临时会话密钥。
We strongly recommend that you should encrypt your important data. More information, please contact with our it department.
对于您的重要数据,我们强烈建议您对数据进行加密并备份,具体的方案请与我们的IT部门联系。
NET provides a feature called protected configuration, which enables you to encrypt sensitive information in a configuration file.
NET提供了一项称为“受保护配置”的功能,可用于加密配置文件中的敏感信息。
NET provides a feature called protected configuration, which enables you to encrypt sensitive information in a configuration file.
NET提供了一项称为“受保护配置”的功能,可用于加密配置文件中的敏感信息。
应用推荐