The security encryption technology prevents the users from illegally embezzling legal links.
防止非法用户盗用合法链接几个方面的问题。
You'll see an example of this approach later in the article, when you look at WS-Security encryption of a message.
本文后面介绍WS-Security消息加密时,您将看到一个这样的示例。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
This is especially true in the case of smaller messages, for which the WS-SecureConversation configuration was almost twice as fast as WS-Security encryption using certificates.
这对于较小的消息尤为明显,其WS -SecureConversation配置的运行速度几乎是使用证书的WS - Security加密的两倍。
While WS-Security encryption is the Web services security standard for encrypting SOAP messages, XML encryption is the standard that you can use to encrypt an XML message, or even just part of it.
WS - Security加密方法是加密soap消息的Web服务安全标准,而xml加密方法是可用于加密xml消息甚至其一部分的标准。
Based on the public key encryption, the elliptic curve cryptography (ECC) is the highest security encryption based on each bit and it is considered as the next multipurpose public cryptography.
基于公钥密码系统的椭圆曲线密码系统(ECC)是迄今为止每比特具有最高安全强度的密码系统,被认为是下一代通用的公钥密码系统。
We'll then slowly increase the complexity of the security requirements and explain the XML Encryption schema and the use of its different elements.
然后我们将慢慢地增加安全性需求的复杂程度,并解释xml加密模式及其不同元素的使用。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.
为了解决这些问题,我们需要一种具有灵活加密方案的端对端安全性模型以满足一系列不同的需求。
Defense in-depth is all about having redundant security measures in place — not only encryption but also smart handling of user-supplied data.
深层防御是将多余的安全方法都妥善保管——不仅包括加密,还包括用户所提供数据的智能处理。
With both security configurations, symmetric encryption is used for the messages exchanged between the client and the service.
通过这两种安全性配置,客户端和服务之间的消息交换使用了对称加密。
For now, you will not enable the message level security such as message encryption or digital signatures (for data integrity).
暂时不要启用消息级安全性,比如消息加密或数字签名(针对数据完整性)。
For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.
例如,处理电子商务、银行交易或金融的任何应用程序部分都需要所能提供的最高级别的安全性和加密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
However, using standard XML encryption, the security information doesn't get lost, because being embedded in the message's body means it's preserved and simply transformed into a JMS payload.
不过,使用标准xml加密,安全信息将不会丢失,这是因为嵌入消息的正文将意味着它将得到保留并只需转换为JMS负载。
They include patents on wireless data, speech coding, security, and encryption, according to Nokia.
按诺基亚的说法,它们包括无线数据、语音编码、安全和加密方面专利。
These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.
可用各种方式组合这些机制,以便用各种加密技术建立各种安全模型。
Setting security plays an important part in your GRUB configuration; setting a password and using MD5 encryption pays dividends to your overall system security.
在GRUB配置中,设置安全性非常重要;设置口令,并使用MD 5加密,可以保证整个系统的安全。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
At least two major credit card companies and four of the top ten U.S. banks have bought phone-encryption software, a security firm representative told Fortune.
至少有两家主要的信用卡公司,以及四家美国排名前十的银行都购买了手机加密软件。
As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.
正如在“Axis2WS - Security签名和加密”中所介绍的,您可以使用您的私钥对消息进行签名,并使用接收者的公钥对消息进行加密。
For WS-Security authentication, encryption and signing are supported.
对于WS - Security身份验证,支持加密和签名。
These results show that WS-Security symmetric encryption with client-generated keys is nearly as fast as WS-SecureConversation, especially for larger messages.
这些结果表明使用客户端生成的密钥进行WS - Security对称加密几乎和WS - SecureConversation一样快,特别是对于较大的消息。
You can import public keys created by other Encryption Expert security servers.
您可以导入由其他EncryptionExpert安全服务器创建的公共密匙。
Metro does even better with direct use of symmetric encryption with WS-Security, running about 30 percent faster.
Metro甚至比直接使用对称加密实现WS - Security还要快一些,大约快30%。
The sample application used for this article is the same one used in "Axis2 WS-Security basics" and "Axis2 WS-Security signing and encryption" - a simple library-management service.
本文使用的样例策略与“Axis2WS -Security基础”和“Axis2 WS - Security签名和加密”中的策略相同—一个简单的库管理服务。
To ensure the maximum performance, memcached does not provide any form of security, either in authentication or encryption.
为了确保最佳性能,memcached 并未提供任何形式的安全性,没有身份验证,也没有加密。
Next we need to create the keys and certificates for the Web services security signatures and encryption.
接下来,我们需要为Web服务安全性签名和加密创建密钥和证书。
Address XML security using XML encryption and signatures.
使用xml加密和签名解决XML安全。
Address XML security using XML encryption and signatures.
使用xml加密和签名解决XML安全。
应用推荐