Of course, data being sent from the browser to the server is not compressed and therefore doesn't carry this extra encryption.
当然,从浏览器到服务器发送的数据并未压缩,因而没有携带这种额外的加密。
Listing 2 contains only XML Encryption's schema, while Listing 3 contains both XML Encryption as well as elements from the original data in Listing 1.
清单2只包含xml加密的模式,而清单3既包含xml加密模式又包含来自清单1中原始数据的元素。
Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.
密钥—密钥就一些密码数据,通常使用特定加密算法从用户的密码中获得。
Before I get started, let me first differentiate this process from one of the other processes used to alter data and keep it away from those not authorized to view it: encryption.
在开始之前,请允许我首先将它与另一种改变数据以防止未授权查看的方法区分一下,这种方法就是加密。
Now, Google will use the same encryption methods that banks on e-commerce sites use to prevent others from snooping on your searches as your data moves between your browser and Google's servers.
现在好了,谷歌将采用与电子商务网站银行同样的加密方式,这样一来,数据在浏览器与谷歌服务器间互通往来之时,你再也不用担心哪个家伙暗中窥探你了。
The encryption prevents the data from being observed or modified while it travels through the network.
当数据流经网络时,加密可以防止数据被查看或修改。
This encrypted data element references the <xenc:EncryptedKey> value from the security header as the key for the symmetric encryption used on the Body content.
这个已加密的数据从安全头部引用 <xenc:EncryptedKey>值作为在Body内容中用于对称加密的密匙。
When encryption is used, a separate padding effect occurs from the base64 encoding used for the encrypted data.
在使用加密时,加密数据所使用的base64编码中出现了单独的填充(padding)效果。
This allows for file encryption in order to protect confidential data from attackers with physical access to the computer.
EFS允许文件加密,以便保护保密的数据不会被攻击者以直接访问计算机的方式进行窃取。
Encryption is not directly related to authentication and authorization but is an important aspect of protecting data, during transit or at rest, from unauthorized users.
加密与认证和授权没有直接的关系,但是,在保护传输中的或静止的数据不受未经授权用户访问的时候,它也是一个重要的方面。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
EnSTratus holds encryption keys and manages user access from its own SaaS solution, shielding data housed in the public cloud from unauthorized access.
EnSTratus持有密钥并管理用户获得属于其的SaaS解决方案,保护储存于云中的数据不受到未认证用户的读取。
This is because RFB depends on Data Encryption Standard DES encoding, and us export restrictions effectively prevent Tcl from bundling DES.
这是因为RF B依赖于数据加密标准(Data Encryption Standard,DES)编码,并且美国的出口限制有效地阻止了Tcl捆绑DES。
While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.
这并不会保护数据以防可以监听用户输入密码的根权限入侵,它可以为丢失的没有文件系统加密的设备提供保护。
Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive.
表示所有DES实现都必须从中派生的数据加密标准(DES)算法的基类。
Whilst it is possible to use encryption to secure your Assets as they are being transmitted, once the data is in the hands of the client it is possible to find ways to grab the content from them.
在资源传送时,有可能会使用某些加密方式来保护你的资源。当数据被客户端控制的时候则有可能找到某种方法从数据内容中掘取某些资源。
Privacy is to keep information secret from all but those who are authorized to see it by data encryption.
保密是指通过数据加密,防止对手破译系统中的机密信息。
DES (Data encryption standard) encryption arithmetic has stood the long test from when it became the encryption standard to now.
加密算法在成为加密标准到今天,经历了长期的考验。
Since then, encryption technology—which allows consumers and companies to secure their data and devices from outside eyes—has grown ever more popular.
从那时起,保护消费者和公司的数据和设备免受他人窥探的加密技术就变得愈加流行。
Represents the base class for Triple Data Encryption Standard algorithms from which all.
表示三重数据加密标准算法的基类。
To convert data from its original form to a form that can only be read by someone that can reverse the encryption.
将数据从原始形式转换为默认可识别的形式,并且可以在转换回原来的编码。
Encryption can also protect a user's data from being accessed by unauthorized users.
加密还可防止未经授权的用户访问用户数据。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.
该系统能有效的防止网络内部的重要数据通过网络泄露出去,无需用户进行手动的加密解密操作。
The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".
本研究来源于省自然科学基金课题“计算机通信网络变结构数据加密与安全研究”。
Above all, traditional data encryption can not solve the data leakage behavior which is from internal staff within enterprise.
重要的是传统的加密方式并不能解决企业内部人员泄露数据的行为。
To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.
为保护用户数据、系统资源不被非法访问和滥用,现代文件系统设立了文件访问控制、数据加密等各种安全机制。
In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.
为了防止静止数据被不法人士存取、窃取或修改,通常采取一些安全措施,如数据加密和分等级的口令保护。
In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.
为了防止静止数据被不法人士存取、窃取或修改,通常采取一些安全措施,如数据加密和分等级的口令保护。
应用推荐