• In addition to the encrypted content, XML encryption allows you to specify the algorithm used for encryption or the encryption key used as part of the two elements discussed above.

    除了加密内容以外,XML加密还允许上面讨论两个元素中指定用于加密算法或者加入用于加密的密钥

    youdao

  • The combination of algorithm and the key length results in having stronger encryption, medium encryption, and weak encryption.

    算法密钥长度组合产生加密中等加密和加密。

    youdao

  • All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.

    XML加密标记存在解密需要所有信息:加密算法名称加密数据类型以及加密密钥的名称。

    youdao

  • It's even more common to find crucial flaws in crypto-graphic algorithm implementations, which can turn strong encryption into weak encryption (or sometimes no encryption at all).

    更为普遍情况是,加密算法实现发现具有关键缺陷可以原本的强加密退化加密(有时甚至相当于完全不加密)。

    youdao

  • Database encryption: some of the database itself provides encryption mechanism in the database kernel to achieve the storage of encryption.

    数据库自带加密某些数据库自身提供了加密机制数据库内核实现存储加密。

    youdao

  • Overall encryption: the use of a comprehensive encryption system or storage encryption gateway system, the database file where the disk sector encryption.

    全盘加密采用全盘加密系统或者存储加密网关系统,数据库文件所在磁盘扇区进行加密。

    youdao

  • At the moment, it does not include XML encryption; I expect XML encryption or a similar encryption methodology to be part of it in the future.

    目前包含XML加密期望XML加密类似的加密方法将来成为一部分。

    youdao

  • MD5 encryption is one-way encryption algorithm, the so-called one-way encryption is only for data encryption, In other words, there is no way to encrypt the data after decryption.

    MD 5就是采用单向加密的加密算法所谓单向加密就是只能数据进行加密,就是说,没有办法加密以后数据进行解密。

    youdao

  • The paper gives some practical methods of encryption and decryption as well as preventive trace, including hard disk encryption, floppy disk encryption, disk file encryption and protection.

    给出一些常用加密解密方法跟踪技术,内容包括硬盘加密、软盘加密以及磁盘软件加密保护技术。

    youdao

  • The multiuser both-lock encryption system of grey encryption theory is improved and a secret sharing scheme based on both-lock encryption system is put forward.

    灰色加密理论中的用户双锁加密系统进行了改进,提出了一种基于多用户双锁加密系统的密钥分存方案

    youdao

  • There are also further descriptions on the characteristics of the process of basic encryption techniques, technology limitation, the effect on DBMS, encryption mode and encryption for database.

    详细描述数据库加密基本流程特点技术限制、加密DBMS影响、加密方式以及数据库的加密方法

    youdao

  • DES (Data encryption standard) encryption arithmetic has stood the long test from when it became the encryption standard to now.

    加密算法成为加密标准今天,经历了长期考验

    youdao

  • It has strongpoint of symmetry encryption scheme such as encryption speed and encrypt intensity, but also has advantage of public key encryption scheme on key distribution and key management.

    方法兼有加密体制优点:既有对称密码加密体制的加密速度快强度高的优点,拥有公钥密码体制密钥分发管理上的优势

    youdao

  • Ring authenticated encryption scheme can be regarded as the combination of message encryption scheme and ring signature scheme, which has both encryption and ring signatures priority.

    认证加密方案加密方案签名方案融合具有这两种方案的优点。

    youdao

  • It has implemented XML encryption with encryption, and got encryption with digital signature algorithm.

    最后文档加密算法实现XML文档加密,数字签名算法把要加密元素进行加密。

    youdao

  • Public-key encryption solves the problem of managing several keys, but encryption is slow compared to conventional encryption.

    公开钥匙加密法解决管理几个钥匙问题但是与常规加密相比,公开钥匙加密慢些

    youdao

  • The encryption principle and index structure of encryption data are developed. The encryption processing of duplicate data and algorithm exposure are analyzed.

    详细阐述了其加密原理密文索引结构重复性数据加密处理算法抗攻击性进行了分析。

    youdao

  • The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.

    RDP协议使用对称加密算法rc4多达128钥匙。rc4加密产生的一个初步交流其中关键使用RSA的非对称加密。

    youdao

  • In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.

    机制通过非对称加密算法随机密钥加密用户备份信息,以及“一次一”加密数据库等手段有效解决传统密钥恢复机制密钥产生存储、备份、恢复过程中的安全问题

    youdao

  • In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.

    机制通过非对称加密算法随机密钥加密用户备份信息,以及“一次一”加密数据库等手段有效解决传统密钥恢复机制密钥产生存储、备份、恢复过程中的安全问题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定