• In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.

    以色列案例中,安全和加密技术一直是他们的强项不是过去一样是个增长行业

    youdao

  • Of course, security and encryption also come into play, since the proxy must be able to open the "package" to look at it or decode its contents.

    当然由于代理必须能力打开”,看看内部或者内容进行 码,所以安全和加密随之而来

    youdao

  • For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.

    例如处理电子商务银行交易金融任何应用程序部分都需要所能提供最高级别的安全性加密

    youdao

  • The article introduces the network security and encryption techniques applied by the authors in the first examination system for the registered architects in China.

    本文介绍作者在全国第一注册建筑师网络考试系统中所应用网络安全加密技术

    youdao

  • The 10 patents cover wireless data, speech coding, security and encryption and are "infringed by all Apple iPhone models shipped since the iPhone was introduced in 2007."

    诺基亚的10专利包括无线数据语音编码安全和加密以及所有出货苹果iPhone机型中的技术。2007年推出iPhone以来,所有的苹果iPhone机型都侵犯了诺基亚的专利”。

    youdao

  • Compared with access authentication mechanism based on base mobile IP protocol, security and encryption for the mechanism are enhanced, which can resist common security att...

    相比基本移动IP协议接入认证方法,该方法加密强度安全性更高,可以更有效地抵御常见安全攻击

    youdao

  • After theoretic analysis and simulation experiments, the system has higher sensitivity to initial conditions, better security and encryption effects, so it is adapt for images encryption.

    理论分析模拟试验可以看出,系统具有较高初值敏感性强的安全性和较好的加密效果,可用于实际的图像加密系统。

    youdao

  • The other one is to analyze Address Resolution Protocol (ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology.

    其二,分析ARP协议实现细节,采用ARP欺骗技术实现安全加密路由平台原有网络结构的彻底透明

    youdao

  • Encryption is a tradeoff between speed and security.

    加密速度安全性之间折衷

    youdao

  • We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.

    我们为认证授权通过加密保护数据这些方面的安全问题提供解决方案

    youdao

  • With both security configurations, symmetric encryption is used for the messages exchanged between the client and the service.

    通过这两种安全性配置客户端服务之间消息交换使用对称加密

    youdao

  • It information security professionals in the medical industry appear to be reluctant to deploy document authentication and encryption for users.

    似乎医疗产业IT信息安全专家们情愿用户提供文档认证加密功能

    youdao

  • Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data.

    一般安全特性确保至少六个字符密码并且敏感数据进行加密

    youdao

  • This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    安全策略使用非对称加密执行数字签名验证加密解密

    youdao

  • Wireless banking is security sensitive and it's essential to find the right balance between speed and encryption.

    无线银行安全性要求非常高,必须找到速度加密之间正确平衡点

    youdao

  • We'll then slowly increase the complexity of the security requirements and explain the XML Encryption schema and the use of its different elements.

    然后我们慢慢地增加安全性需求复杂程度解释xml加密模式及其不同元素使用

    youdao

  • Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.

    指纹识别器、板载数据加密以及其他基于硬件安全功能现在笔记本电脑上很普遍智能手机其他“后pc”设备依然有待支持。

    youdao

  • They include patents on wireless data, speech coding, security, and encryption, according to Nokia.

    诺基亚的说法,它们包括无线数据语音编码安全和加密方面专利

    youdao

  • It is helpful (but not necessary) for you to be familiar with basic concepts of security such as private and public keys, signatures, and encryption.

    熟悉安全基本概念(比如私钥公钥签名、加密)会帮助,不是必需的

    youdao

  • Setting security plays an important part in your GRUB configuration; setting a password and using MD5 encryption pays dividends to your overall system security.

    GRUB配置中,设置安全性非常重要;设置口令使用MD 5加密,可以保证整个系统安全

    youdao

  • This simple implementation demonstrates how XML Encryption can be a viable security framework for larger and more complex business applications.

    这个简单实现演示了XML加密如何能够成为用于较大型以及比较复杂业务应用程序可行安全性框架

    youdao

  • One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

    使用公用安全性系统之一PKI(公用密钥基础),一种用于PDA智能电话安全性的加密技术

    youdao

  • Address XML security using XML encryption and signatures.

    使用xml加密签名解决XML安全

    youdao

  • Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.

    LotusNotes服务实例包括Domino安全模型(Security Model),可以进行用户身份验证访问控制加密

    youdao

  • Next we need to create the keys and certificates for the Web services security signatures and encryption.

    接下来我们需要Web服务安全性签名加密创建密钥证书

    youdao

  • Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    youdao

  • WS-Security allows the user to use a variety of security elements, such as user names, signature and encryption mechanisms and security tokens.

    WS - Security允许用户使用多种安全性元素比如用户签名加密机制以及安全令牌

    youdao

  • For WS-Security authentication, encryption and signing are supported.

    对于WS - Security身份验证支持加密签名

    youdao

  • signencr: WS-Security signing of body and headers, with timestamp, and encryption of body

    signencr主体头部WS-Security签名使用时间戳和主体加密

    youdao

  • As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.

    正如Axis2WS - Security签名加密”中所介绍的,可以使用消息进行签名使用接收者公钥对消息进行加密

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定