The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.
详细阐述了其加密原理和密文索引结构,对重复性数据的加密处理和算法抗攻击性进行了分析。
Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
We have already demonstrated how to author XML Encryption files and exchange encrypted data.
我们已经演示了如何创建xml加密文件以及交换加密数据。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
Authentication in DB2 does not only involve encrypting user names and passwords but also allows for encryption of data as it travels across the network between the clients and the server.
DB 2中的身份验证不仅涉及对用户名和密码进行加密,还允许对客户机与服务器之间通过网络传输的数据进行加密。
For now, you will not enable the message level security such as message encryption or digital signatures (for data integrity).
暂时不要启用消息级安全性,比如消息加密或数字签名(针对数据完整性)。
Network data encryption occurs if you enable the encryption on either side of a network connection.
只要在网络连接的某一端启用了加密,就会进行网络数据加密。
Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data.
一般的安全特性是确保至少六个字符的密码,并且对敏感数据进行加密。
The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.
加密可以保证有关某个主题的数据机密性,原因是只有拥有正确私钥的服务提供者才能正确执行解密,因此也能读懂该数据。
They include patents on wireless data, speech coding, security, and encryption, according to Nokia.
按诺基亚的说法,它们包括无线数据、语音编码、安全和加密方面专利。
DATA_ENCRYPT_CMP - This specifies that the server accepts encrypted server authentication schemes and the encryption of user data.
DATA_ENCRYPT _ CMP——这指定服务器接受加密的SERVER身份验证模式和用户数据的加密。
These databases protect local data through data encryption.
这些数据库通过数据加密保护本地数据。
In addition, its encryption capabilities provide enhanced data security.
此外,它的加密功能增强了数据安全性。
Mitigating this exposure usually means enforcing policies for data storage or implementing encryption software at the desktop level to protect sensitive data.
为了降低数据泄漏的风险,常常需要实施数据存储策略,或在桌面级使用加密软件保护敏感数据。
The encryption prevents the data from being observed or modified while it travels through the network.
当数据流经网络时,加密可以防止数据被查看或修改。
The main difference between NIS and NIS + is that the latter supports authentication and encryption for data exchanges between the NIS master and slave computers.
NIS和NIS +间的主要区别在于,后者支持nis主计算机和从计算机间的身份验证和数据交换加密。
Consider this: If you want to add another element of protection to your hidden data, you could combine it with encryption before embedding the data.
想想看:如果希望添加另一个元素来保护隐藏数据,您应该在嵌入数据前进行加密。
Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.
指纹识别器、板载数据加密,以及其他基于硬件的安全功能,现在在笔记本电脑上很普遍,但智能手机和其他“后pc”设备依然有待支持。
Encryption of data is vital if sensitive data is being transmitted over a public medium.
数据加密非常关键,如果敏感数据被通过公共中介传输的话。
The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.
用于数字加密的密钥可能是在最初请求中传送的同一密钥,也可能是另一个随机生成的密钥,而后者更具代表性。
Most data encryption methods require explicit decisions of where and when to encrypt data, manual mounting and unmounting of encrypted images, and entering passwords.
大多数数据加密方法需要对在什么地方与什么时候对数据进行加密作出明确的决策、手动装入和卸载加密的映像,并输入相应的密码。
For instance, in 64-bit DES-CBC encryption, the data would be divided into 8-byte blocks.
例如,在64位DES- CBC加密中,数据会分为8字节的块。
The encryption algorithm used to secure data
用于保护数据的加密算法
Further, 7zip also proffers its own format, featuring a higher compression ratio than any other scheme, gigantic capacity reaching into terabytes, and strong data encryption.
另外,7zip还提供自己的格式,这种格式的压缩率比任何其他方案都高,容量限制达到tb级,支持强大的数据加密。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
In June, it bought PGP Corp and GuardianEdge, two privately held companies focusing on email and data encryption, for an undisclosed sum.
在6月,他们收购了PGP和GuardianEdge公司,两家专注于邮件及数据加密的私人所有公司,交易金额不详。
This combination refers to the name of the key that Imran USES for data encryption.
这个组合引用了Imran用于数据加密的密钥名称。
Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.
RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可的数据加密规则,支持改善的安全性能。
Federal Information Processing (FIPS) 140-2 approved data encryption.
联邦信息处理(FIPS) 140-2许可的数据加密。
应用推荐