End-to-End encryption is offered by TETRA to protect data during the entire transmission.
TETRA还提供端-端加密服务,确保整个传输过程的机密性。
IDEA is a symmetrical block cipher. End-to-end encryption based on IDEA is presented and analyzed.
分析了基于分组密码算法idea设计的端-端加密系统。
Air interface security and end-to-end encryption a re offered by TETRA to protect data during the entire transmission.
数字集群系统TETRA提供空中接口加密和端-端加密以实现通信的机密性。
The TETRA system also supports powerful DMO mode and enables authentication, air interface encryption and end-to-end encryption.
能支持功能强大的移动台脱网直通(DMO)方式,可实现鉴权、空中接口加密和端对端加密;
The one I am using is optimally secure because they have their own proprietary high end encryption codec with patented technology that is hosted in a professional facility.
我是一个用最佳保障,因为他们有自己的专有高完加密与解码主办的一项专利技术,专业厂。
In this way, you should be able to see that the variable is correctly set after the transformation and that its value is kept unchanged until the end of the encryption action.
这样,您应能够看到变量的设置在转换之后仍是正确的并且直到加密操作结束时它的值也保持不变。
All that RIM is saying is that while the message is encrypted it is not possible to provide a key to decrypt it. What about at either end of the encryption process?
所有RIM公司的说法都是建立在加密的信息是没有密钥来破解的基础上,那如果是在任意一个加密过程结束前?
You also need to define a WebSphere Message Broker policy to tell the system whether signing or encryption is in use and which end is doing this.
您还需要定义WebSphereMessageBroker策略,以告诉系统是否正在使用签名或加密,以及哪一端在执行签名或加密。
The difference is that the conversations are scrambled from end to end, using a special form of encryption called SCIP (secure communications interoperability protocol).
区别在于通话是端到端加密编码的,通过被称为SCIP (securecommunications interoperability protocol,安全交互通讯协议)的特殊形式。
In the end, you should choose to use the form of encryption that meets your security requirements.
最后,您应该选择使用符合自身安全需求的加密方式。
To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.
为了解决这些问题,我们需要一种具有灵活加密方案的端对端安全性模型以满足一系列不同的需求。
There's an incremental impact of port encryption on end-user response time.
端口加密对最终用户响应时间的影响随用户数增大而增大。
Use XML Encryption of SOAP messages for end-to-end confidentiality.
使用SOAP消息的XML加密来实现端到端的机密性。
You could also use a custom encryption algorithm to encrypt the username and the password at the client end using WMLScript.
您也可以用WMLScript来编写自定义的加密算法,以对客户端的用户名和密码进行加密。
At end of the paper, the realization of real time encryption and authentication system suitable to wireless monitoring system is introduced according to the character of system and data.
根据无线监控调度系统的系统特点及传输的数据特点,给出了适用于无线监控调度系统的实时加密认证系统的实现。
In the end, image encryption and decryption with the new sequence are studied.
最后应用此序列进行了图像加密解密的研究。
The system encryption includes encryption for node, link and end to end.
其加密包括节点、链路及端-端等加密。
Attack involves encryption from one end, decryption from the other, and matching the results in the middle.
攻击的思想是从一端加密,另一端解密,在中间进行结果匹配。
Watermark embedding at a server end, encryption and PDCF packaging of media data and reverse processing of a client are the core content of the invention.
服务器端水印嵌入、媒体数据的加密和PD CF打包以及客户端的逆处理过程是本发明的核心内容。
XML encryption provides end-to-end security for applications that require secure exchange of structured data.
XML加密为结构数据的安全交换提供了端到端的加密。
Based on the analyzing of public_key cryptosystem, a practical algorithm of RSA is studied. A network information encryption and decryption system of end to end is developed.
基于对公钥密码体制的分析,研究了RSA密码体制的实现算法,开发了端对端的网络传输信息加密解密系统,在实际网络环境条件下进行的测试证明了其安全性和可靠性。
The dissertation designed a video encryption transmission system based on ARM to this end.
为此,本文设计了基于ARM的视频加密传输系统。
The invention comprises: According to the characteristics of PE format, divide a primary server end program into a primary data file and an encryption executable file;
包括:利用PE格式特点,将原始服务器端程序拆分为主数据文件和加密可执行文 件;
In then end, "adding to the confusion" of the series, with the same M-sequence "encryption" and restore the original source sequence.
在接受端再把“加乱”了的序列,用同样的M序列“解扰”,恢复原有的信源序列。
In then end, "adding to the confusion" of the series, with the same M-sequence "encryption" and restore the original source sequence.
在接受端再把“加乱”了的序列,用同样的M序列“解扰”,恢复原有的信源序列。
应用推荐