• IDEA is a symmetrical block cipher. End-to-end encryption based on IDEA is presented and analyzed.

    分析了基于分组密码算法idea设计的-端加密系统。

    youdao

  • Air interface security and end-to-end encryption a re offered by TETRA to protect data during the entire transmission.

    数字集群系统TETRA提供空中接口加密端-端加密以实现通信的机密性。

    youdao

  • The TETRA system also supports powerful DMO mode and enables authentication, air interface encryption and end-to-end encryption.

    支持功能强大移动台脱网直通(DMO方式可实现鉴权、空中接口加密端对端加密;

    youdao

  • The one I am using is optimally secure because they have their own proprietary high end encryption codec with patented technology that is hosted in a professional facility.

    最佳保障因为他们自己专有加密解码主办专利技术,专业厂。

    youdao

  • All that RIM is saying is that while the message is encrypted it is not possible to provide a key to decrypt it. What about at either end of the encryption process?

    所有RIM公司说法都建立加密信息没有密钥来破解的基础上,那如果任意一个加密过程结束前

    youdao

  • You also need to define a WebSphere Message Broker policy to tell the system whether signing or encryption is in use and which end is doing this.

    需要定义WebSphereMessageBroker策略告诉系统是否正在使用签名加密以及一端在执行签名或加密。

    youdao

  • The difference is that the conversations are scrambled from end to end, using a special form of encryption called SCIP (secure communications interoperability protocol).

    区别在于通话是加密编码通过被称为SCIP (securecommunications interoperability protocol,安全交互通讯协议)的特殊形式

    youdao

  • To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.

    为了解决这些问题我们需要一种具有灵活加密方案端对端安全性模型满足一系列不同需求

    youdao

  • Use XML Encryption of SOAP messages for end-to-end confidentiality.

    使用SOAP消息XML加密实现端到端的机密性

    youdao

  • You could also use a custom encryption algorithm to encrypt the username and the password at the client end using WMLScript.

    可以WMLScript来编写自定义加密算法客户端的用户名密码进行加密

    youdao

  • At end of the paper, the realization of real time encryption and authentication system suitable to wireless monitoring system is introduced according to the character of system and data.

    根据无线监控调度系统系统特点传输数据特点,给出了适用于无线监控调度系统的实时加密认证系统的实现

    youdao

  • Attack involves encryption from one end, decryption from the other, and matching the results in the middle.

    攻击的思想是从一端加密一端解密中间进行结果匹配

    youdao

  • Watermark embedding at a server end, encryption and PDCF packaging of media data and reverse processing of a client are the core content of the invention.

    服务器水印嵌入媒体数据加密PD CF打包以及客户端的处理过程本发明的核心内容

    youdao

  • XML encryption provides end-to-end security for applications that require secure exchange of structured data.

    XML加密为结构数据安全交换提供了端到端的加密。

    youdao

  • Based on the analyzing of public_key cryptosystem, a practical algorithm of RSA is studied. A network information encryption and decryption system of end to end is developed.

    基于公钥密码体制的分析研究RSA密码体制实现算法开发对端的网络传输信息加密解密系统实际网络环境条件下进行的测试证明了其安全性可靠性。

    youdao

  • The invention comprises: According to the characteristics of PE format, divide a primary server end program into a primary data file and an encryption executable file;

    包括利用PE格式特点,将原始服务器程序拆分为主数据文件加密执行文 件;

    youdao

  • The invention comprises: According to the characteristics of PE format, divide a primary server end program into a primary data file and an encryption executable file;

    包括利用PE格式特点,将原始服务器程序拆分为主数据文件加密执行文 件;

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定