The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
Encryption is a tradeoff between speed and security.
加密是速度和安全性之间的折衷。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
With both security configurations, symmetric encryption is used for the messages exchanged between the client and the service.
通过这两种安全性配置,客户端和服务之间的消息交换使用了对称加密。
It information security professionals in the medical industry appear to be reluctant to deploy document authentication and encryption for users.
似乎医疗产业的IT信息安全专家们很不情愿为用户提供文档认证和加密功能。
Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data.
一般的安全特性是确保至少六个字符的密码,并且对敏感数据进行加密。
For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.
例如,处理电子商务、银行交易或金融的任何应用程序部分都需要所能提供的最高级别的安全性和加密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
Wireless banking is security sensitive and it's essential to find the right balance between speed and encryption.
无线银行对安全性的要求非常高,必须找到速度和加密之间正确的平衡点。
We'll then slowly increase the complexity of the security requirements and explain the XML Encryption schema and the use of its different elements.
然后我们将慢慢地增加安全性需求的复杂程度,并解释xml加密模式及其不同元素的使用。
Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.
指纹识别器、板载数据加密,以及其他基于硬件的安全功能,现在在笔记本电脑上很普遍,但智能手机和其他“后pc”设备依然有待支持。
They include patents on wireless data, speech coding, security, and encryption, according to Nokia.
按诺基亚的说法,它们包括无线数据、语音编码、安全和加密方面专利。
It is helpful (but not necessary) for you to be familiar with basic concepts of security such as private and public keys, signatures, and encryption.
熟悉安全的基本概念(比如私钥和公钥、签名、加密)会有帮助,但不是必需的。
Setting security plays an important part in your GRUB configuration; setting a password and using MD5 encryption pays dividends to your overall system security.
在GRUB配置中,设置安全性非常重要;设置口令,并使用MD 5加密,可以保证整个系统的安全。
This simple implementation demonstrates how XML Encryption can be a viable security framework for larger and more complex business applications.
这个简单实现演示了XML加密如何能够成为用于较大型以及比较复杂业务应用程序的可行的安全性框架。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
At least two major credit card companies and four of the top ten U.S. banks have bought phone-encryption software, a security firm representative told Fortune.
至少有两家主要的信用卡公司,以及四家美国排名前十的银行都购买了手机加密软件。
Encryption and signing are the basis for most enterprise security implementations, so check back to see how you can apply these features in your own web services.
加密和签名是大多数企业安全实现的基础,回顾一下这些特性,看看如何在您自己的Web服务中应用它们。
Address XML security using XML encryption and signatures.
使用xml加密和签名解决XML安全。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
Next we need to create the keys and certificates for the Web services security signatures and encryption.
接下来,我们需要为Web服务安全性签名和加密创建密钥和证书。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
WS-Security allows the user to use a variety of security elements, such as user names, signature and encryption mechanisms and security tokens.
WS - Security允许用户使用多种安全性元素,比如用户名、签名和加密机制以及安全令牌。
For WS-Security authentication, encryption and signing are supported.
对于WS - Security身份验证,支持加密和签名。
signencr: WS-Security signing of body and headers, with timestamp, and encryption of body
signencr:主体和头部的WS-Security签名,使用时间戳和主体加密
As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.
正如在“Axis2WS - Security签名和加密”中所介绍的,您可以使用您的私钥对消息进行签名,并使用接收者的公钥对消息进行加密。
Handle security, encryption, and authentication requirements.
解决安全、加密和身份验证的要求。
The Listing 8 properties file is used by the underlying WSS4J WS-Security code to configure the signature and encryption processing.
底层的WSS4JWS-Security代码使用清单8 所示的属性文件配置签名和加密处理。
When the extra complexity of X.509 certificates, XML Encryption and XML Digital Signature is not worth the effort because security is not the primary concern.
对于特别复杂的X . 509证书,不值得使用xml加密(XML Encryption)和XML数字签名(XML Digital Signature),因为安全性不是首要考虑事项。
IBM Informix Dynamic server 10.0 provides significant advances in database server security, encryption, authentication, and availability.
IBMInformixDynamicServer 10.0在数据库服务器安全、加密、身份验证和可用性方面有很大的提高。
应用推荐