• The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.

    详细阐述了其加密原理密文索引结构重复性数据加密处理算法抗攻击性进行了分析。

    youdao

  • Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.

    苹果公司这些问题立场斯诺登事件出现形成,在之后,公司开始采用一系列技术,这些技术在默认情况下使用者的数据加密限制他人访问

    youdao

  • We have already demonstrated how to author XML Encryption files and exchange encrypted data.

    我们已经演示了如何创建xml加密文件以及交换加密数据

    youdao

  • This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.

    包括识别认证授权访问控制数据屏蔽审计加密

    youdao

  • We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.

    我们为认证授权通过加密保护数据这些方面的安全问题提供解决方案

    youdao

  • Authentication in DB2 does not only involve encrypting user names and passwords but also allows for encryption of data as it travels across the network between the clients and the server.

    DB 2中的身份验证不仅涉及用户密码进行加密允许客户机服务器之间通过网络传输数据进行加密

    youdao

  • For now, you will not enable the message level security such as message encryption or digital signatures (for data integrity).

    暂时不要启用消息安全性比如消息加密数字签名(针对数据完整性)。

    youdao

  • Network data encryption occurs if you enable the encryption on either side of a network connection.

    只要网络连接一端启用加密,就会进行网络数据加密。

    youdao

  • Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data.

    一般安全特性确保至少六个字符密码并且敏感数据进行加密

    youdao

  • The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.

    加密可以保证有关某个主题数据机密性原因只有拥有正确服务提供者才能正确执行解密因此也能读懂数据。

    youdao

  • They include patents on wireless data, speech coding, security, and encryption, according to Nokia.

    诺基亚的说法,它们包括无线数据语音编码安全和加密方面专利

    youdao

  • DATA_ENCRYPT_CMP - This specifies that the server accepts encrypted server authentication schemes and the encryption of user data.

    DATA_ENCRYPT _ CMP——指定服务器接受加密SERVER身份验证模式用户数据加密

    youdao

  • These databases protect local data through data encryption.

    这些数据库通过数据加密保护本地数据。

    youdao

  • In addition, its encryption capabilities provide enhanced data security.

    此外加密功能增强数据安全性

    youdao

  • Mitigating this exposure usually means enforcing policies for data storage or implementing encryption software at the desktop level to protect sensitive data.

    为了降低数据泄漏的风险常常需要实施数据存储策略桌面使用加密软件保护敏感数据。

    youdao

  • The encryption prevents the data from being observed or modified while it travels through the network.

    数据流经网络时,加密可以防止数据查看修改

    youdao

  • The main difference between NIS and NIS + is that the latter supports authentication and encryption for data exchanges between the NIS master and slave computers.

    NISNIS +主要区别在于,后者支持nis计算机计算机间的身份验证数据交换加密

    youdao

  • Consider this: If you want to add another element of protection to your hidden data, you could combine it with encryption before embedding the data.

    想想看:如果希望添加另一个元素保护隐藏数据应该嵌入数据进行加密

    youdao

  • Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.

    指纹识别器、板载数据加密以及其他基于硬件安全功能现在笔记本电脑上很普遍智能手机其他“后pc”设备依然有待支持。

    youdao

  • Encryption of data is vital if sensitive data is being transmitted over a public medium.

    数据加密非常关键,如果敏感数据通过公共中介传输的话

    youdao

  • The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.

    用于数字加密密钥可能最初请求传送同一密钥,可能是另一个随机生成的密钥,后者更具代表性。

    youdao

  • Most data encryption methods require explicit decisions of where and when to encrypt data, manual mounting and unmounting of encrypted images, and entering passwords.

    大多数数据加密方法需要在什么地方什么时候数据进行加密作出明确决策手动装入卸载加密映像输入相应密码

    youdao

  • For instance, in 64-bit DES-CBC encryption, the data would be divided into 8-byte blocks.

    例如64DES- CBC加密中,数据分为8字节

    youdao

  • The encryption algorithm used to secure data

    用于保护数据加密算法

    youdao

  • Further, 7zip also proffers its own format, featuring a higher compression ratio than any other scheme, gigantic capacity reaching into terabytes, and strong data encryption.

    另外7zip提供自己格式,这种格式的压缩任何其他方案容量限制达到tb级,支持强大的数据加密

    youdao

  • The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.

    用于数据加密密钥使用带有与服务提供者(Service Provider)的 X.509 证书相关联公钥对称算法进行加密的。

    youdao

  • In June, it bought PGP Corp and GuardianEdge, two privately held companies focusing on email and data encryption, for an undisclosed sum.

    6月,他们收购了PGPGuardianEdge公司,专注邮件数据加密的私人所有公司,交易金额不详

    youdao

  • This combination refers to the name of the key that Imran USES for data encryption.

    这个组合引用Imran用于数据加密密钥名称

    youdao

  • Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.

    RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可数据加密规则,支持改善的安全性能。

    youdao

  • Federal Information Processing (FIPS) 140-2 approved data encryption.

    联邦信息处理(FIPS) 140-2许可数据加密

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定