Having fixed business place and facilities by which stamps encryption device and bank bill vouchers may be safely protected;
具有固定的营业地点和安全保管印章、编押机具、银行汇票凭证的设施;
Unless you are using an encryption device (hardware or software), you should assume that email over the Internet is not secure.
除非你用加密的软件或硬件,不然所有的电子邮件都不是安全的。
To(avoid) this kind of attack, the authors suggest that the encryption device should be protected to prevent the adversary from deducing faults.
为了避免这类攻击,建议用户对加密设备进行保护,阻止攻击者对其进行故障诱导。
The principle and realization of the analogue interface circuit of the analogue-digital-analogue encryption device are introduced in this paper.
介绍了模数模保密机模拟接口的原理及其实现。
Hard disk encryption card, which is designed based on the IP reuse in this paper, is a kind of hardware encryption device to ensure storage security.
基于IP复用方法实现的硬盘加密卡,是一种用于保障数据存储安全的硬件加密装置。
Indeed, in 2003 computer scientist Gordon Rugg demonstrated that text resembling that in the book could be generated with a Cardan grille, an encryption device invented around 1550.
事实上,在2003年电脑科学家戈登·鲁格示范了书中内容可以用一种1550年被发明的叫“万象格”的密码编写装置造出来。
The TKL is a rugged, easy -to-use, small-form factor, single-button programmable device that quickly loads encryption keys into radios in the field.
该设备是一种坚固易于使用、小尺寸、单键可编程设备,能够在战场上迅速上传加密密钥。
While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.
这并不会保护数据以防可以监听用户输入密码的根权限入侵,它可以为丢失的没有文件系统加密的设备提供保护。
Encryption of sensitive user data on mobile device using AES-256.
在移动设备上的敏感数据加密用户使用AES- 256。
The attacker exploits the correct and incorrect encryption results to disclose the secret information (key) hidden in the cryptographic device.
攻击者同时利用正确的和错误的加密结果来发现隐藏在密码设备中的秘密信息(密钥)。
If the main device fails, the backup can take over, duplicating all the encryption parameters, that were in force.
如果主设备失灵,备用设备可切换过来,将所有有效的加密参数复制下来。
The storage device manufacturers are seeking storage hardware-based solutions, the basic approach is to rely on hardware encryption.
而存储设备生产厂商则是寻求基于存储设备硬件的解决方案,基本的做法是依靠硬件加密技术。
When the program first checks the local computer running the mobile device is present, then select the mobile device, to achieve encryption.
本程序在运行时首先检测本地计算机的移动设备是否存在,然后选择移动设备,实现加密。
The easiest way here is to encrypt on the device and then decrypted, the origin of the code is a related example of the U disk data encryption to protect information hiding, to prevent privacy leaks.
这里最简单的方法就是对设备加密,然后再解密,本源代码就是一个与此相关的例子,对U盘数据加密,保护信息隐蔽,防止隐私泄露。
The technician still has to go through whatever authentication or possible encryption that has been setup in the device for access.
技术人员还必须通过设备端口初始设置的身份验证或密码才可以进行操作。
The present invention provides a digital encryption key method and a system, wherein the system is applied between a memory device and a host device.
本发明提供了一种数字密钥方法和系统,应用于一存储装置与一主机装置之间,可将所述存储装置作为一密钥卡。
The present invention provides a digital encryption key method and a system, wherein the system is applied between a memory device and a host device.
本发明提供了一种数字密钥方法和系统,应用于一存储装置与一主机装置之间,可将所述存储装置作为一密钥卡。
应用推荐