Network data encryption occurs if you enable the encryption on either side of a network connection.
只要在网络连接的某一端启用了加密,就会进行网络数据加密。
Authentication in DB2 does not only involve encrypting user names and passwords but also allows for encryption of data as it travels across the network between the clients and the server.
DB 2中的身份验证不仅涉及对用户名和密码进行加密,还允许对客户机与服务器之间通过网络传输的数据进行加密。
Always make sure sensitive data are stored or transmitted on a network with proper encryption.
要一直确保在有适当加密的网络上存储或传送敏感数据。
The encryption prevents the data from being observed or modified while it travels through the network.
当数据流经网络时,加密可以防止数据被查看或修改。
This specifies the minimum level of encryption of the data stream ("network encryption") for the connection.
该属性为连接指定数据流的最小级别的加密(“network encryption”)。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
Once the data has been received, network encryption is no longer in effect.
一旦接收到数据,网络加密将不再有效。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
At last studying data exchange methodology which is used in network encryption.
最后研究电子数据交换,主要应用于网络加密。
Link encryption is an effective way to protect the data of inside network.
链路加密是保护内部网络数据安全的一种有效方法。
The data encryption technology is one of the key skills to ensure the network security.
数据加密技术是实现网络安全的关键技术之一。
The security measures to the data in AMRS are analyzed and the scheme that implements point to point encryption to the date of remote network is proposed based on digital signature technique.
分析了当前国内已应用的远程抄表系统对其数据所采取的安全措施,提出利用数字签名技术对远程网络数据施行端对端加密;
According to the thorough analysis about the technology of HOOK PE, network connection monitoring and encryption transmission for the sharing data are realized with NDIS-HOOK.
在对内核hookPE技术深入分析的基础上用NDIS - HOOK实现了对网络连接的监控和文件共享数据的加密传输。
The data encryption is an important technological means that ensures network data secure in the communication.
数据加密是保证网络数据通信安全的一种重要技术手段。
Data encryption is one of the key technologies in network security.
数据加密技术是实现网络安全的关键技术之一。
The system consists of the real-time processing of speech signals, the data encryption and the network transmissions.
该系统包括语音信号的实时处理、数据加密、网络传输。
It's no doubt that data encryption is an indispensable step to ensure data's security in the open conditions of network transferring.
在网络传输的开放性环境下,对数据的加密处理无疑是保证数据安全的必要环节。
Compress Secure Transfer Model (CSTM) integrated data compression, encryption and network community to improve a bandwidth and the reliability of data transmission.
提出了一种网络数据安全模型CSTM, CSTM把数据压缩、加密、网络传输技术充分结合起来,有效提高数据传输的带宽和安全性。
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.
该系统能有效的防止网络内部的重要数据通过网络泄露出去,无需用户进行手动的加密解密操作。
In real wireless network application environment, these technologies must be combined to integral secure transport protocol to implement data encryption and authentication.
而在真正的无线网络应用环境中,需要把两者结合起来,形成完整的安全传输协议,以实现数据保密、身份认证等功能。
The Secure Ether Network Card, which is a sort of safety, integrates the data encryption technology into the network card and provides the encryption and the authentication services to the link layer.
保密以太网卡是将数据加密技术集成到网卡上,对链路层数据提供加密和认证服务的安全设备。
We want you to concentrate. Coding your application rather than dealing with low level issues like network data transmission, encryption, or data remote update.
让您专注于应用层编码,而不用处理底层编码的问题,如网络数据传输,加密,或数据远程更新。
Because of the network open and other insecurity factors, we often want to transmit data, image and video information by effective encryption.
由于网络的公开性以及其他不安全因素,我们往往希望能够将我们要传送的数据,图像以及视频等信息进行有效的加密传输。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
File service is provided that encrypts data of file transparently for users. Each user has a different key for encryption, users access the storage system by network driver mapping.
系统为用户提供了透明的文件加解密服务,用户通过映射网络驱动器的方式访问自己的存储空间。
The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
应用推荐