• The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.

    发明属于计算机信息安全处理系统尤其属于一种外置式计算机硬盘数据加密方法及其装置。

    youdao

  • In addition to the encryptCompleteXmlFile method, I have now added the following two methods to service the encryption requirements of different types of data (encryption granularity)

    除了encryptCompleteXmlFile方法现在添加以下两个方法来为不同数据类型加密要求(加密颗粒度)提供服务

    youdao

  • Both the Edge and the Guardian use a different encryption method to send E-mail and other forms of data.

    EdgeGuardian使用一种不同加密方式发送电子邮件其他形式数据

    youdao

  • Is there a way to determine which encryption method (WEP, WAP, WAP2,...) is used just by analyze the traffic data of WiFi?

    有没有一种方法确定哪些加密方法(wep,wap,WAP2。)通过分析无线网络流量数据使用吗?

    youdao

  • This encryption method can prevent the loss of disk and file replication caused by sensitive data leakage.

    这种加密方式防止磁盘丢失文件复制导致敏感数据泄漏

    youdao

  • This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.

    这种加密方式可以控制应用系统用户数据访问权限并且真实数据所有数据库用户可见的,安全的一加密方式。

    youdao

  • Based on the encryption method, a pirate tracing scheme is proposed for the copyright protection of digital data.

    根据所提的加密算法给出一种适用于数字数据版权盗版跟踪方案

    youdao

  • In this paper the order preserving encryption for numeric data is analyzed. An order preserving encryption method for character data in relational databases is proposed.

    数值型数据保持顺序加密方法进行了分析,基础上提出了一种在关系数据库中针对字符数据的序加密方法。

    youdao

  • MD5 algorithm is an authentication method used in a broad research field. The data encryption techniques are summarized in this paper.

    MD 5报文摘要算法一种应用广泛身份认证算法,该文首先对数据加密技术进行了简要的概述。

    youdao

  • Aiming at the data secrecy problem in database, we have analyzed some present encryption mechanism and put forward a new query method based on ciphertext index.

    针对数据库数据保密性问题分析了目前已有的一些加密机制提出一种基于密文索引新的查询方法

    youdao

  • According to ATA protocol, PHES used hardware encryption method in FPGA to achieve the transparent data encryption and high data throughput rate by pipeline operation.

    根据ATA协议,该系统利用FPGA硬件加密方法实现数据透明加密流水线操作达到吞吐

    youdao

  • Encryption is an effective method to enforce data security, so if we encrypt data before storage, many database security problems could be solved.

    加密一种保证数据安全有效手段,通过加密存储数据,数据库很多安全问题都可以得到解决。

    youdao

  • Based on data partitioning idea and multi-threading technology, a database encryption and decryption method is proposed and its effectiveness is verified by experiments.

    利用数据划分思想多线程技术提出一种解密数据库数据的方法并用实验来检验方法的有效性

    youdao

  • Based on data partitioning idea and multi-threading technology, a database encryption and decryption method is proposed and its effectiveness is verified by experiments.

    利用数据划分思想多线程技术提出一种解密数据库数据的方法并用实验来检验方法的有效性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定