Lets you provide an encryption of the stored user IDs and passwords.
使您能够对存储的用户ID和密码进行加密。
As it was pointed out in other answers, MD5 is not an encryption algorithm.
指出在其他答案,MD 5不是一个加密算法。
Each INTEGER in the SEQUENCE specifies an encryption algorithm that the client supports.
SEQUENCE中的每个INTEGER指定客户机支持的一种加密算法。
If you're looking for an encryption library, Recommended two-way encryption gems for Ruby?
如果你正在寻找一个加密库,建议双向加密为红宝石宝石吗?
Users can also use the set encryption password statement to set an encryption password for a session.
用户还可以使用SETENCRYPTIONpassword语句为一个会话设置一个加密密码。
This paper presents an encryption engine composed of a single chip processor and a dual port RAM.
本文论述一个由单片机和双端口存储器构成的加密机,阐述了加密机的工作原理和操作流程。
Data stored on removable tape cartridges may be encrypted by an encryption engine to protect the data.
可更换的盒式带上存储的数据可被加密引擎加密以保护该数据。
Then an encryption algorithm based on chaos has been proposed and a file-encryption system is developed.
将基于混沌的加密算法应用到数字图像加密中。
Using an encryption scheme will prevent exposing a user's password if the database ever becomes compromised.
如果数据库暴露了,那么使用加密方案将防止暴露用户的密码。
So, , if the satellite were to encode an encryption key in that quantum state, any interception would be obvious.
因此,如果这颗卫星要在量子态中加密秘钥的话,任何拦截都是显而易见无意义的。
In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan.
为了增强水印信号的安全性,采用了基于混沌和位平面的水印加密算法。
"Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."
“盗版者有无限的时间和资源”Ishikawa说,“你无法建立一个不能被破解的加密技术。”
Use this page to create an encryption key. It is recommended that you back up the encryption key after you create it.
使用此页面可创建加密键。建议在创建加密键后对其进行备份。
On the following three panels, you are prompted to choose an encryption key, operating system support, and operating system.
在接下来的三个面板中,您需要选择一个加密密匙、操作系统支持以及操作系统。
If an encryption key is created with this option, the encryption key is stored on the agent disk with password protection.
如果加密密匙在创建时带有这个选项,那么它就存储在有密码保护的代理磁盘上。
This algorithm applies to document kind document encryption not only, can carry out an encryption on image kind document.
这个算法不仅适用于文档类文件的加密,还可以对图像类文件进行加密。
Once you generate the key, you can use the AbderaSecurity class to get an Encryption object and feed it the key you just created.
生成密钥之后,便可以使用AbderaSecurity类获得一个Encryption对象并把刚创建的密钥提供给它。
After backing out of the menu, an encryption key can be selected by moving the trackball and typing characters on the keyboard.
退回菜单后,通过移动轨迹球或输入键盘上的字母选择一个密钥。
Unless you are using an encryption device (hardware or software), you should assume that email over the Internet is not secure.
除非你用加密的软件或硬件,不然所有的电子邮件都不是安全的。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
And who wants to run off to a third party website and run a dozen email addresses through an encryption algorithm one at a time? Not me.
而且谁会希望在一个第三方网站上通过加密算法同时运行12个email帐号,我可不想那样。
TACACS is an encryption protocol and therefore less secure than the later TACACS + and Remote Authentication Dial-In User Service protocols.
TACACS是一个安全的加密协议,因此低于后来TACACS +和远程认证拨号用户服务协议。
This paper discusses and curry out an encryption algorithm based on one-dimensional chaotic map, which have good security and practicability.
本文设计了一种基于混沌理论和单表置换加密方法的一维混沌表加密算法。
Using the technologies of DNA synthesis, DNA clone, PCR and DNA chip and the theory of computational complexity, an encryption scheme is formed.
利用DNA合成技术、DNA克隆技术、PCR扩增技术以及DNA芯片技术,结合密码学的计算复杂度理论,提出了一种基于DNA技术的加密方法。
If you build an encryption algorithm around a function's easy direction, anyone wanting to break your encryption needs to work at it from the hard side.
如果围绕某个函数的简单方向构造一个加密算法,那么想要破解加密的任何人都需要从相反的方向来解密。
If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.
如果在加密和解密操作中成功地使用了密钥对,那么必定在操作的某个部分使用了密钥对中的私钥。
They don't cover secure server communication explicitly but give some hints about it and provide an encryption library to simplify any encryption tasks.
他们不包括安全服务器通信明确但给一些提示和提供了一个加密库来简化任何加密任务。
For example, if a service provider's security policy declaration requires encrypted messages, the ESB can configure an encryption mediation automatically.
例如,如果服务提供者的安全策略声明要求使用加密消息,则ESB可以自动配置一个encryption中介。
An encryption algorithm based on data-scrambling is presented. Firstly, we extract odd number bits of the important information to form a new information.
提出一种基于数位置乱的加密体制,该方案中首先采用置乱算法将明文信息的奇数位提取出来组成一个新的信息;
An encryption algorithm based on data-scrambling is presented. Firstly, we extract odd number bits of the important information to form a new information.
提出一种基于数位置乱的加密体制,该方案中首先采用置乱算法将明文信息的奇数位提取出来组成一个新的信息;
应用推荐