可以通过SSL连接实现网络加密。
一旦接收到数据,网络加密将不再有效。
Once the data has been received, network encryption is no longer in effect.
网络加密在选定协议的网络传输层上进行。
Network encryption occurs at the network transfer layer of a selected protocol.
ENCRYPTION:网络加密信任属性。
最后研究电子数据交换,主要应用于网络加密。
At last studying data exchange methodology which is used in network encryption.
第三章研究课题是密码技术、数字签名、网络加密技术和安全API。
The third chapter studies cryptology data signature types of network cryptology and secure API.
例如,可信上下文对象中指定的IP地址可能不正确,或者可信上下文不能接受您的网络加密属性级别。
For example, the IP address specified in a trusted context object might be incorrect, or your network encryption attributes may not be strong enough to be accepted by the trusted context.
在研究现有的安全方案的基础上,提出了一种支持安全网内处理的无线传感器网络加密方案。
Based on learning the existing security schemes, an encryption scheme supporting secure in-network processing for wireless sensor networks was introduced.
文中讨论了怎样在非对称密钥体制下集成一个网络加密系统及相关的密钥管理算法,并结合银行的网络系统的结构进行了一些探讨。
This paper describes how to integrate a networks cryptographic system based on the non-symmetric cryptographic system, and the correlative key-management method.
这意味着所有网络传输都是加密的,并且消息篡改也可以检测到。
This means that all network traffic is encrypted, and tampering with messages is also detected.
DB 2中的身份验证不仅涉及对用户名和密码进行加密,还允许对客户机与服务器之间通过网络传输的数据进行加密。
Authentication in DB2 does not only involve encrypting user names and passwords but also allows for encryption of data as it travels across the network between the clients and the server.
如果那不可能——比如当块之间使用网络通信时——那么使用加密等机制来防范攻击者。
If that's not possible — such as when the pieces communicate using a network — use mechanisms such as encryption to counter attackers.
某种可能使用IP安全性协议 (IPSEC)的网络级加密形式(例如虚拟专用网 (VPN))是最可取的解决方案,虽然也有其他合理的选择。
Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.
这使他能够为他通过网络发送的数据加密,并保护他自己的IP地址身份。
This enables him to encrypt data he sends over the network and protect the identity of his own Internet protocol (IP) address.
它对流经网络的每个IP数据包进行身份验证和加密。
It authenticates and encrypts each IP packet flowing through the network.
例如,重叠集群以解决命名空间问题几乎从来就不是个好主意,但是重叠集群以提供加密的网络路径也许是恰当的解决方案。
For example, overlapping clusters to solve namespace issues is almost never a good idea, but doing so to provide an encrypted network path may be the right solution.
授权电脑是指纹识别的、唯一可以通过加密的通信通道对网络上关键资产进行访问的设备。
Authorized computers are 'fingerprinted' and are the only devices allowed to communicate across an encrypted communications channel to critical assets on the network.
要一直确保在有适当加密的网络上存储或传送敏感数据。
Always make sure sensitive data are stored or transmitted on a network with proper encryption.
在传输层,数据使用TLS协议进行加密和封装,然后通过网络进行传输。
At the transport layer, the data is encrypted and wrapped in the TLS protocol, for transport across the network.
当数据流经网络时,加密可以防止数据被查看或修改。
The encryption prevents the data from being observed or modified while it travels through the network.
该网络使用安全RF链路,通过出口加密保护联合作战行动。
The network USES a secure RF link, protected through exportable encryption for joint and coalition operations.
只要在网络连接的某一端启用了加密,就会进行网络数据加密。
Network data encryption occurs if you enable the encryption on either side of a network connection.
加密网络数据对客户端性能的影响微乎其微。
Encrypting network data has little effect on client performance.
这些规则指定消息发送的顺序、每条消息的格式以及对网络通信应用加密算法的方式。
These rules specify the order in which messages are sent, the format of each message, and the way cryptographic algorithms are applied to network communications.
进程内通信可以避免远程服务调用的所有开销,包括序列化、加密、遍历网络堆栈和网络延迟。
Intraprocess communication avoids all the overhead of a remote service invocation, including serialization, encryption, traversing the network stack, and network latency.
网络数据只在传输时加密。
我是通过邻居未加密的无线网络上网的。
Instead, I got online via the unsecured wireless networks of my neighbors.
例如,您需要使用网络安全加密令牌控制对ejb的访问。
For example, you need to control access to EJBs using a network-safe encrypted token.
它在本地网络和GoogleApps之间提供一个加密连接。
It provides an encrypted link between a local network and Google Apps.
之前的封禁指向Facebook,滚石杂志的官网和加密网络的使用。
Previous bans have targeted Facebook, Rolling Stone magazine's website and the use of encrypted networks.
应用推荐