• Of course, data being sent from the browser to the server is not compressed and therefore doesn't carry this extra encryption.

    当然浏览器服务器发送数据并未压缩因而没有携带这种额外的加密

    youdao

  • Listing 2 contains only XML Encryption's schema, while Listing 3 contains both XML Encryption as well as elements from the original data in Listing 1.

    清单2包含xml加密模式清单3包含xml加密模式又包含来自清单1原始数据元素

    youdao

  • Key - a key is cryptographic data which is usually derived from a user's password using specific encryption algorithms.

    密钥—密钥一些密码数据通常使用特定加密算法用户密码中获得

    youdao

  • Before I get started, let me first differentiate this process from one of the other processes used to alter data and keep it away from those not authorized to view it: encryption.

    开始之前请允许首先改变数据防止授权查看的方法区分一下,这种方法就是加密。

    youdao

  • Now, Google will use the same encryption methods that banks on e-commerce sites use to prevent others from snooping on your searches as your data moves between your browser and Google's servers.

    现在好了谷歌采用电子商务网站银行同样加密方式这样一来,数据浏览器与谷歌服务器互通往来之时,再也不用担心哪个家伙暗中窥探你了。

    youdao

  • The encryption prevents the data from being observed or modified while it travels through the network.

    数据流经网络时,加密可以防止数据查看修改

    youdao

  • This encrypted data element references the <xenc:EncryptedKey> value from the security header as the key for the symmetric encryption used on the Body content.

    这个加密数据安全头部引用 <xenc:EncryptedKey>作为Body内容用于对称加密的密匙。

    youdao

  • When encryption is used, a separate padding effect occurs from the base64 encoding used for the encrypted data.

    使用加密加密数据所使用base64编码出现单独填充(padding)效果

    youdao

  • This allows for file encryption in order to protect confidential data from attackers with physical access to the computer.

    EFS允许文件加密以便保护保密数据不会被攻击直接访问计算机的方式进行窃取。

    youdao

  • Encryption is not directly related to authentication and authorization but is an important aspect of protecting data, during transit or at rest, from unauthorized users.

    加密认证授权没有直接关系但是保护传输中的静止数据不受未经授权用户访问的时候,它也是一个重要方面

    youdao

  • When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.

    一旦计算机断开对等网络,网络形成节点随即不复存在储存在节点上的密钥数据随之消失

    youdao

  • EnSTratus holds encryption keys and manages user access from its own SaaS solution, shielding data housed in the public cloud from unauthorized access.

    EnSTratus持有密钥管理用户获得属于SaaS解决方案保护储存于中的数据不受到认证用户的读取。

    youdao

  • This is because RFB depends on Data Encryption Standard DES encoding, and us export restrictions effectively prevent Tcl from bundling DES.

    是因为RF B依赖数据加密标准(Data Encryption Standard,DES)编码并且美国出口限制有效地阻止Tcl捆绑DES。

    youdao

  • While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.

    并不保护数据以防可以监听用户输入密码权限入侵,可以丢失没有文件系统加密设备提供保护

    youdao

  • Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive.

    表示所有DES实现都必须从中派生数据加密标准(DES)算法

    youdao

  • Whilst it is possible to use encryption to secure your Assets as they are being transmitted, once the data is in the hands of the client it is possible to find ways to grab the content from them.

    资源传送时,有可能使用某些加密方式保护资源。数据客户端控制的时候则有可能找到某种方法从数据内容取某些资源。

    youdao

  • Privacy is to keep information secret from all but those who are authorized to see it by data encryption.

    保密通过数据加密防止对手破译系统中的机密信息

    youdao

  • DES (Data encryption standard) encryption arithmetic has stood the long test from when it became the encryption standard to now.

    加密算法成为加密标准今天,经历了长期考验

    youdao

  • Since then, encryption technology—which allows consumers and companies to secure their data and devices from outside eyes—has grown ever more popular.

    那时起保护消费者公司数据设备免受他人窥探的加密技术变得愈加流行。

    youdao

  • Represents the base class for Triple Data Encryption Standard algorithms from which all.

    表示三重数据加密标准算法

    youdao

  • To convert data from its original form to a form that can only be read by someone that can reverse the encryption.

    数据原始形式转换为默认可识别的形式,并且可以转换回原来编码。

    youdao

  • Encryption can also protect a user's data from being accessed by unauthorized users.

    加密防止未经授权用户访问用户数据

    youdao

  • When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.

    一旦计算机断开对等网络,网络形成节点随即不复存在储存在节点上的密钥数据随之消失

    youdao

  • The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.

    系统有效防止网络内部的重要数据通过网络泄露出去无需用户进行手动加密解密操作

    youdao

  • The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".

    研究来源于自然科学基金课题“计算机通信网络结构数据加密安全研究”。

    youdao

  • Above all, traditional data encryption can not solve the data leakage behavior which is from internal staff within enterprise.

    重要的是传统加密方式并不能解决企业内部人员泄露数据行为

    youdao

  • To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.

    保护用户数据系统资源不被非法访问滥用,现代文件系统设立了文件访问控制、数据加密各种安全机制

    youdao

  • In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.

    为了防止静止数据不法人士存取窃取修改通常采取一些安全措施数据加密分等级口令保护

    youdao

  • In order to keep data at rest from being accessed, stolen, or altered by unauthorized people, security measures such as data encryption and hierarchical password protection are commonly used.

    为了防止静止数据不法人士存取窃取修改通常采取一些安全措施数据加密分等级口令保护

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定