The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.
详细阐述了其加密原理和密文索引结构,对重复性数据的加密处理和算法抗攻击性进行了分析。
Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
We have already demonstrated how to author XML Encryption files and exchange encrypted data.
我们已经演示了如何创建xml加密文件以及交换加密数据。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
Authentication in DB2 does not only involve encrypting user names and passwords but also allows for encryption of data as it travels across the network between the clients and the server.
DB 2中的身份验证不仅涉及对用户名和密码进行加密,还允许对客户机与服务器之间通过网络传输的数据进行加密。
For now, you will not enable the message level security such as message encryption or digital signatures (for data integrity).
暂时不要启用消息级安全性,比如消息加密或数字签名(针对数据完整性)。
Network data encryption occurs if you enable the encryption on either side of a network connection.
只要在网络连接的某一端启用了加密,就会进行网络数据加密。
Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data.
一般的安全特性是确保至少六个字符的密码,并且对敏感数据进行加密。
The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.
加密可以保证有关某个主题的数据机密性,原因是只有拥有正确私钥的服务提供者才能正确执行解密,因此也能读懂该数据。
They include patents on wireless data, speech coding, security, and encryption, according to Nokia.
按诺基亚的说法,它们包括无线数据、语音编码、安全和加密方面专利。
DATA_ENCRYPT_CMP - This specifies that the server accepts encrypted server authentication schemes and the encryption of user data.
DATA_ENCRYPT _ CMP——这指定服务器接受加密的SERVER身份验证模式和用户数据的加密。
In cloud computing, VMM allows users to monitor and thus manage aspects of the process such as data access, data storage, encryption, addressing, topology, and workload movement.
在云计算中,VMM允许监视用户,因此可以管理数据访问、数据存储、加密、寻址、拓扑和工作负载转移等方面。
Mitigating this exposure usually means enforcing policies for data storage or implementing encryption software at the desktop level to protect sensitive data.
为了降低数据泄漏的风险,常常需要实施数据存储策略,或在桌面级使用加密软件保护敏感数据。
The encryption prevents the data from being observed or modified while it travels through the network.
当数据流经网络时,加密可以防止数据被查看或修改。
The main difference between NIS and NIS + is that the latter supports authentication and encryption for data exchanges between the NIS master and slave computers.
NIS和NIS +间的主要区别在于,后者支持nis主计算机和从计算机间的身份验证和数据交换加密。
Consider this: If you want to add another element of protection to your hidden data, you could combine it with encryption before embedding the data.
想想看:如果希望添加另一个元素来保护隐藏数据,您应该在嵌入数据前进行加密。
Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.
指纹识别器、板载数据加密,以及其他基于硬件的安全功能,现在在笔记本电脑上很普遍,但智能手机和其他“后pc”设备依然有待支持。
The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.
用于数字加密的密钥可能是在最初请求中传送的同一密钥,也可能是另一个随机生成的密钥,而后者更具代表性。
Yet, regardless of the growth in remote users, just 27% of respondents say their companies currently use hard disk encryption to protect sensitive data on corporate endpoints.
但在被调查者中,除去正不断增多的远程用户,只有27%的人表示他们的公司目前使用了硬盘加密技术来保护企业终端的敏感数据。
Most data encryption methods require explicit decisions of where and when to encrypt data, manual mounting and unmounting of encrypted images, and entering passwords.
大多数数据加密方法需要对在什么地方与什么时候对数据进行加密作出明确的决策、手动装入和卸载加密的映像,并输入相应的密码。
For instance, in 64-bit DES-CBC encryption, the data would be divided into 8-byte blocks.
例如,在64位DES- CBC加密中,数据会分为8字节的块。
Further, 7zip also proffers its own format, featuring a higher compression ratio than any other scheme, gigantic capacity reaching into terabytes, and strong data encryption.
另外,7zip还提供自己的格式,这种格式的压缩率比任何其他方案都高,容量限制达到tb级,支持强大的数据加密。
And some operating systems such as later versions of Apple's iOS include ready-made encryption capabilities that protect data on devices.
而且,一些操作系统(如苹果iOS的最新版本)会有现成的加密功能,并为设备提供数据保护。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
In June, it bought PGP Corp and GuardianEdge, two privately held companies focusing on email and data encryption, for an undisclosed sum.
在6月,他们收购了PGP和GuardianEdge公司,两家专注于邮件及数据加密的私人所有公司,交易金额不详。
Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.
RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可的数据加密规则,支持改善的安全性能。
Federal Information Processing (FIPS) 140-2 approved data encryption.
联邦信息处理(FIPS) 140-2许可的数据加密。
In addition to the encryptCompleteXmlFile method, I have now added the following two methods to service the encryption requirements of different types of data (encryption granularity)
除了encryptCompleteXmlFile方法,我现在添加了以下两个方法来为不同数据类型的加密要求(加密颗粒度)提供服务。
The former, RSH, is a standard remote shell system that offers basic authentication security, but no encryption, while the latter, SSH, offers both authentication and encryption of the data.
前者(rsh)是一种标准的远程Shell系统,它提供了基本的身份验证安全性,但不提供加密功能,而后者(ssh)提供了基本的身份验证和数据加密功能。
应用推荐