本文介绍了作者在全国第一个注册建筑师网络考试系统中所应用的网络安全与加密技术。
The article introduces the network security and encryption techniques applied by the authors in the first examination system for the registered architects in China.
使用xml加密,每一方都可以保持与任何通信方的安全或非安全状态。
With XML Encryption, each party can maintain secure or insecure states with any of the communicating parties.
这使您能够结合使用DB 2代理模块和备份,从而实现通过与安全服务器通信加密数据库备份映像。
This enables you to use the DB2 agent module with a backup, which enables you to encrypt a database backup image by communicating with the security server.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
为了确保安全,可以结合使用rsync与加密技术,确保在没有正确的密码或加密密钥的情况下无法读取远程文件。
For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.
TETRA的加密功能为用户提供自由选择具体需要的终端,同时保障与所有其他用户的安全通信能力。
The TETRA crypto provides users with the freedom to choose a terminal based on their own specific needs while safeguarding the ability to communicate securely with all other users.
与传闻恰好相反,RIM的安全结构在世界各地同样安全,而且RIM不会向任何人泄露顾客的加密密匙。
Ontrary to any rumors, the security architecture is the same around the world and RIM truly has no ability to provide its customers' encryption keys.
与传输级安全性相比,WS - Security允许用户只是加密消息的一部分(例如,信用卡号码)而不是加密客户机和服务器之间的完整通信。
In comparison to transport-level security WS-Security allows the user only to encrypt parts of the message (e.g., the credit card number) and not the whole communication between the client and server.
出于安全性考虑,WLAN的WiredEquivalentPrivacy (WEP)加密机制提供与有线网络相同的安全级别。
For security, WLAN's wired equivalent Privacy (WEP) encryption mechanism provides a level of security equivalent to wired networks.
图1中的架构提供了一个面向CICSTS与TXSeries集成的安全设置示例,使用了经ssl加密的IPIC (ip连接)。
The architecture in Figure 1 provides an example of the security setup for CICS TS and TXSeries integration using IPIC (IP Connectivity) with SSL.
东芝的删除技术与市面上的Ironkey等“超安全加密”US B驱动器有很多相似之处。
Toshiba's Wipe has a lot in common with certain super-secure encrypted USB drives on the market, such as the Ironkey.
沃尔沃加密锁相当于一个起动锁,因为起动钥匙通过安全加密的电信号和随机滚动码与发动机的起动电路进行通信。
The Volvo Immobiliser serves as a starter block since the starter key communicates with the engine′s starting circuit via security-coded electronic signals and random rolling codes.
安全数据库的理论研究主要集中在多级安全数据库、访问控制、数据库加密与推理通道控制等领域。
The theoretical research of the dependable database concentrates on the multi-layer safe database, access controlling, database encoding, channel control and so on.
对于处理支付交易的网站,网络服务器也支持加密套接字协议(SSL)——用于在因特网上安全地传输与接收信息的因特网协议。
For Web sites that process payment transactions, the Web server also supports secure Sockets Layer (SSL), the Internet protocol for transmitting and receiving information securely over the Internet.
各子系统与安全管理中心之间的通信采用了加密、签名、认证等安全机制。
The communication between each subsystem and the security management center integrates many kinds of network security mechanisms such as encryption, signature, authentication etc.
该论文首先给出加密卡安全应用开发与设计体系结构。
This paper at first gives encryption card architectures of development and design of security applications.
针对信息与网络安全的重要性及严峻性,提出了一种汉字信息加密、在BMP图像文件中隐藏、恢复及解密的方法。
In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.
系统开发涉及身份验证、数字签名与传输加密、工作流定义、审批应用、电子签章和痕迹跟踪等关键安全技术。
Many key security technologies are involved, such as ID authentication, digital signature and transfer encryption, workflow definition, accreditation application, electronic seal and trail trace.
TLS协议(传输层安全)能够在客户机与服务器之间认证,建立加密连接。
TLS ( Transport Layer Security) is capable of authenticating both the client and the server and creating a encrypted connection between the two.
首先详细讨论了与安全技术相关的一系列关键技术,包括数据拦截技术、数据加密技术、密钥管理技术等。
Firstly, some key technologies correlated with security are discussed in detail, such as data interception, data encryption, key management, etc.
SSL(加密套接字协议层)是一个在TCP/IP中运行于的传输层和应用层之间的、确保客户机与服务器之间通信安全的协议。
SSL (Secure Sockets Layer) is a protocol that operates between the Transport and Application Layers of TCP/IP and secures communications between the client and the server.
综合运用系统钩子、网络通信、数据加密和数据库等多种技术,计算机操作行为分析与数据安全管理系统的功能已经基本实现。
Using the technologies such as hook, network communication, data encrypting and database, computer operation analyzing and data security managing system has been implemented.
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
我使用AES与RSA加密和解密为客户端和服务器的安全通信。
I'm using AES with RSA encryption and decryption for client and server's secure communication.
本文主要在掌握了一定的数据加密与信息安全、身份认证等知识的基础上,对EKE协议和CAPTCHA作了较为深入的研究。
This paper deeply researches on EKE protocol and CAPTCHA on the base of the knowledge of Data Encryption and Information Security.
我们根据附网存储的特点,设计了一个附网存储安全系统,本文重点介绍其应用级加密算法的设计与实现。
We design a NAS security system based on NAS character, This paper introduces the design and implement of application encryption arithmetic.
本文详细分析了EPON系统面临的安全隐患,讨论了鉴权与加密的一些关键问题。
The threats to EPON security are analyzed in detail in this paper. The main issues about authentication and encryption are also discussed.
本文详细分析了EPON系统面临的安全隐患,讨论了鉴权与加密的一些关键问题。
The threats to EPON security are analyzed in detail in this paper. The main issues about authentication and encryption are also discussed.
应用推荐