哈希算法在信息安全领域主要应用于验证数据完整性和签名认证。
In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.
通过验证复制中的所有参与方都具有与主控复制定义匹配的表和复制的列属性,确保数据完整性。
Ensures data integrity by verifying that all participants in the replicate have table and replicated column attributes that match the master replicate definition.
如果您使用了该修饰符,您的表在执行载入操作之后,将处于检查暂挂状态,以便给您机会验证新数据的完整性。
If you use this modifier, your table will be placed in check pending state following the load operation, to give you the opportunity to verify the integrity of the new data.
在讨论云时,有许多特性应该加以讨论,其中包括:多租户、安全性、数据完整性验证、恢复期望值以及退出策略。
When discussing the cloud, there are many characteristics that should be discussed, including: multi-tenancy, security, data integrity verification, retrieval expectations, and exit strategies.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
相反,如果从未知源获取XML文档,则要验证XML文档以维护数据的完整性。
On the contrary, if XML documents are received from an unknown source, be careful to validate XML documents to maintain data integrity.
验证XML(NicholasChase,developerWorks,2003 年8 月):验证文件和文档以确保数据满足完整性约束。
Validating XML (Nicholas Chase, developerWorks, August 2003): Validate files and documents to make sure that data fits integrity constraints.
它设置加密、完整性验证和(可选)压缩并向上层公开一个用于发送和接收纯文本数据包的API。
It sets up encryption, integrity verification, and (optionally) compression and exposes to the upper layer an API for sending and receiving plain text packets.
此外,驱动器自身可以验证正在写入的数据,以便其完整性代码与数据匹配。
In addition, the drive itself can validate the data being written, so that its integrity code matches the data.
利用客户端验证,您可以增强用户体验,而服务器端验证能够真正维护应用程序输入数据的完整性。
You can enhance the user experience with client-side validation, while server-side validation provides the true maintenance of the application's inputted data integrity.
最终,它会对加密的数据和索引进行编码,编码的方式使得之后数据校验器能够使用存储证据来验证数据的完整性。
Finally, it encodes the encrypted data and index in such a way that the data verifier can later verify their integrity using a proof of storage.
它可用于验证消息、提供完整性检查,以及提供加密密钥来保证数据的机密性。
It can be used to authenticate the messages, to provide integrity, as well as encryption key to ensure confidentiality of the data.
支持基于用户提供的模式验证XML数据,这使得应用程序开发人员和数据库管理员可以对DB2中存储的 XML 数据实施数据完整性约束。
Support for validating XML data based on user-supplied schemas, which allows application developers and database administrators to enforce data integrity constraints for XML data stored in DB2.
当已签名的数据在注册中心间被复制时,您可以简单地通过验证签名来保证它们的完整性。
When signed data is copied between registries, you can guarantee its integrity by simply validating the signature.
SPKM使用公钥基础设施在一个联机分布式应用程序环境下提供身份验证、密钥设立、数据完整性和数据机密性。
SPKM provides authentication, key establishment, data integrity, and data confidentiality in an online distributed application environment using a public key infrastructure.
解决方案的体系结构包括使用XML数字签名(XML Digital Signature)和 XML 加密(XML Encryption)来满足验证、数据完整性和数据机密性的需求。
The architecture of the solution includes the ability for them to leverage both XML Digital Signature and XML Encryption to address authentication, data integrity, and data confidentiality.
我们可以通过验证用户输入的准确性和完整性,来增强整体数据质量。
We can improve overall data quality by validating user input for accuracy and completeness.
验证读取备份数据来证实其完整性。此步骤需要额外的时间,但验证有助于确保您的备份是成功的。
Verification reads the backed-up data to verify its integrity. This step takes extra time, but verification helps ensure that your backup is successful.
使用哈希代码确保数据完整性描述如何生成和验证哈希值。
Ensuring Data Integrity with hash Codes describes how you can generate and verify hash values.
验证读取备份数据来证实其完整性。
Verification reads the backed-up data to verify its integrity.
哈希值还可用于验证通过不安全信道发送的数据的完整性。
Hash values are also useful for verifying the integrity of data sent through insecure channels.
它可以提供256位高强度数据加密、完整性验证、基于PKI的身份认证以及抗重播保护功能,最大限度地对上层应用提供安全保护。
It can provide high strength (with key of 256bits) encryption, integrality validation, identity authentication based on PKI, and anti-replay protection for upper layer application.
实际的实体的属性用验证属性,以确保数据库的完整性是维持。
The actual entities' properties are decorated with the validation attributes to ensure that the dataase integrity is maintained.
你能向数据集的多个数据表中添加新行、验证每行的有效性和参照完整性。
You can add new travel, test and verify to the middle of the many data table of data set every effectiveness and consult integrality.
该模型中,中间节点根据前驱节点的签密信息鉴别转发数据的完整性,验证转发链路的真实性。
In this model, the forwarding nodes could identify the integrity of the received information and the validity of the forwarding path according to the signcryption of previous nodes.
协调主数据的设置和验证相关的跨职能部门确保数据的质量和完整性。
Coordinate master data setup and validations with applicable cross functional departments ensuring data quality and integrity is maintained.
建议部署传统的数据网络安全技术如加密、身份验证和数据完整性等。
Conventional data networks policies like encryption, authentication and data integrity are highly recommended.
SSL保护数据不被改变(数据完整性),保护用户的标识(保密性),并保证数据来自预期客户(身份验证)。
SSL protects against data being altered (data integrity), protects a user's identity (confidentiality), and assures that data originates from the expected client (authentication).
为了保证数据质量,系统已建立初步的数据清理转换与数据源回溯验证功能,保证数据仓库数据的正确性、完整性和实效性。
Basic data cleaning and data validation function was developed to meet data quality demand referring to data integrality, data authenticity and data time effectiveness.
为了保证数据质量,系统已建立初步的数据清理转换与数据源回溯验证功能,保证数据仓库数据的正确性、完整性和实效性。
Basic data cleaning and data validation function was developed to meet data quality demand referring to data integrality, data authenticity and data time effectiveness.
应用推荐