Network encryption can be achieved through SSL connections.
可以通过SSL连接实现网络加密。
This specifies the minimum level of encryption of the data stream ("network encryption") for the connection.
该属性为连接指定数据流的最小级别的加密(“network encryption”)。
For example, the IP address specified in a trusted context object might be incorrect, or your network encryption attributes may not be strong enough to be accepted by the trusted context.
例如,可信上下文对象中指定的IP地址可能不正确,或者可信上下文不能接受您的网络加密属性级别。
When configuring a secure environment, you must make sure that every component provides for appropriate authentication, authorization, and encryption of network traffic.
在配置安全环境时,您必须确保所有组件都能为网络通信提供相应的身份验证、授权和加密。
Authentication in DB2 does not only involve encrypting user names and passwords but also allows for encryption of data as it travels across the network between the clients and the server.
DB 2中的身份验证不仅涉及对用户名和密码进行加密,还允许对客户机与服务器之间通过网络传输的数据进行加密。
If that's not possible — such as when the pieces communicate using a network — use mechanisms such as encryption to counter attackers.
如果那不可能——比如当块之间使用网络通信时——那么使用加密等机制来防范攻击者。
Network data encryption occurs if you enable the encryption on either side of a network connection.
只要在网络连接的某一端启用了加密,就会进行网络数据加密。
Intraprocess communication avoids all the overhead of a remote service invocation, including serialization, encryption, traversing the network stack, and network latency.
进程内通信可以避免远程服务调用的所有开销,包括序列化、加密、遍历网络堆栈和网络延迟。
The encryption prevents the data from being observed or modified while it travels through the network.
当数据流经网络时,加密可以防止数据被查看或修改。
The network USES a secure RF link, protected through exportable encryption for joint and coalition operations.
该网络使用安全RF链路,通过出口加密保护联合作战行动。
The UAE's regulators say the BlackBerry's proprietary network and tight encryption make messages the devices send over the Internet too secure.
阿联酋的监管官员称,黑莓的专用网络,和先进的加密技术使该手机经因特网发送的信息安全得过了头。
Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.
某种可能使用IP安全性协议 (IPSEC)的网络级加密形式(例如虚拟专用网 (VPN))是最可取的解决方案,虽然也有其他合理的选择。
The link between the ESB and provider services may be secured by network architecture, by ESB credentials or by encryption using PKI.
ESB和提供者服务之间的链路可能由网络体系结构、ESB凭据或使用 PKI 的加密进行保护。
Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.
通过网络和由传输提供的安全性、消息中已批准的声明,以及用收件人已知的密钥对请求进行加密,请求者可以对收件人进行身份验证。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
Today, Google cracked an old encryption algorithm called SHA-1, although this does not sound like the most significant milestone in the network security.
今天谷歌破解了一种名为SHA-1的老式加密算法,尽管此事听起来不像是网络安全界最重大的里程碑。
Then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced.
相关网络安全协议应运而生,而它们的基础都是安全有效的加密算法。
An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
RSA_TLS encryption protects the confidentiality and integrity of network packets as they pass between the client and the server.
当网络数据包在客户端和服务器之间进行传输时,使用RSA_TLS加密可保护它们的保密性和完整性。
If the home or office Wi-Fi network is used improperly, it can also be thecause of a security breach – again, the passwords at the router must be complexenough, and WPA2 encryption should be set.
如果家里或者办公室的无线网络使用不当,它也可能造成安全问题,再一次强调,路由器的密码必须足够复杂,并且设置成WPA2的加密方式。
This paper presents a new encryption system of H. 320 videoconference on DDN network.
本文基于DDN通信网络,提出了一种H。320视频会议加密系统。
The communication between each subsystem and the security management center integrates many kinds of network security mechanisms such as encryption, signature, authentication etc.
各子系统与安全管理中心之间的通信采用了加密、签名、认证等安全机制。
Thus, you can easily run your program without encryption when necessary, which can be useful when you want to "sniff" the network to see what is actually traversing the wire.
这样,在必要时,您就可以很容易地运行未加密的程序,当您想要“嗅探”网络,看看到底有什么东西正在通过网络时,这一点很有用。
In view of the importance of information and network security, a method of Chinese information encryption, BMP image and text hiding and the decryption is put forward.
针对信息与网络安全的重要性及严峻性,提出了一种汉字信息加密、在BMP图像文件中隐藏、恢复及解密的方法。
In this increasingly internetworked world, link-based encryption may no longer be the most effective or efficient approach to network security.
在互连网络越来越多的世界里,基于链路的加密可能不再是网络安全最有效或高效方法。
The principles of cryptography are today applied to the encryption of fax, television, and computer network communications.
密码法的原则现今应用于传真、电视与计算机网络通讯的加密。
The security measures to the data in AMRS are analyzed and the scheme that implements point to point encryption to the date of remote network is proposed based on digital signature technique.
分析了当前国内已应用的远程抄表系统对其数据所采取的安全措施,提出利用数字签名技术对远程网络数据施行端对端加密;
The data encryption is an important technological means that ensures network data secure in the communication.
数据加密是保证网络数据通信安全的一种重要技术手段。
The article emphasizes on discussing the two measures to protect the datum in the network: accessing control measure and information encryption measure.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
应用推荐