• The security encryption technology prevents the users from illegally embezzling legal links.

    防止非法用户盗用合法链接几个方面的问题。

    youdao

  • You'll see an example of this approach later in the article, when you look at WS-Security encryption of a message.

    本文后面介绍WS-Security消息加密看到一个这样示例

    youdao

  • It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.

    研究功耗分析如何破解密码算法中的密钥的关键技术以此为基础提出防御功耗分析的安全密码算法非常必要的。

    youdao

  • This is especially true in the case of smaller messages, for which the WS-SecureConversation configuration was almost twice as fast as WS-Security encryption using certificates.

    对于较小消息尤为明显,WS -SecureConversation配置的运行速度几乎使用证书的WS - Security加密的两倍。

    youdao

  • While WS-Security encryption is the Web services security standard for encrypting SOAP messages, XML encryption is the standard that you can use to encrypt an XML message, or even just part of it.

    WS - Security加密方法加密soap消息Web服务安全标准,而xml加密方法是用于加密xml消息甚至其一部分的标准。

    youdao

  • Based on the public key encryption, the elliptic curve cryptography (ECC) is the highest security encryption based on each bit and it is considered as the next multipurpose public cryptography.

    基于公钥密码系统椭圆曲线密码系统(ECC)迄今为止比特具有最高安全强度的密码系统,被认为下一代通用的公钥密码系统。

    youdao

  • We'll then slowly increase the complexity of the security requirements and explain the XML Encryption schema and the use of its different elements.

    然后我们慢慢地增加安全性需求复杂程度解释xml加密模式及其不同元素使用

    youdao

  • We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.

    我们为认证授权通过加密保护数据这些方面的安全问题提供解决方案

    youdao

  • To resolve these issues, we need an end-to-end security model with flexible encryption schemes to meet a range of different requirements.

    为了解决这些问题我们需要一种具有灵活加密方案端对端安全性模型满足一系列不同需求

    youdao

  • Defense in-depth is all about having redundant security measures in place — not only encryption but also smart handling of user-supplied data.

    深层防御多余安全方法妥善保管——不仅包括加密包括用户提供数据智能处理

    youdao

  • With both security configurations, symmetric encryption is used for the messages exchanged between the client and the service.

    通过这两种安全性配置客户端服务之间消息交换使用对称加密

    youdao

  • For now, you will not enable the message level security such as message encryption or digital signatures (for data integrity).

    暂时不要启用消息安全性比如消息加密数字签名(针对数据完整性)。

    youdao

  • For example, any part of your application that deals with e-commerce, banking, or finances requires the heaviest data security and encryption you can get your hands on.

    例如处理电子商务银行交易金融任何应用程序部分都需要所能提供最高级别的安全性加密

    youdao

  • This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    安全策略使用非对称加密执行数字签名验证加密解密

    youdao

  • However, using standard XML encryption, the security information doesn't get lost, because being embedded in the message's body means it's preserved and simply transformed into a JMS payload.

    不过使用标准xml加密安全信息不会丢失是因为嵌入消息正文将意味着将得到保留只需转换JMS负载

    youdao

  • They include patents on wireless data, speech coding, security, and encryption, according to Nokia.

    诺基亚的说法,它们包括无线数据语音编码安全和加密方面专利

    youdao

  • These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.

    可用各种方式组合这些机制,以便各种加密技术建立各种安全模型

    youdao

  • Setting security plays an important part in your GRUB configuration; setting a password and using MD5 encryption pays dividends to your overall system security.

    GRUB配置中,设置安全性非常重要;设置口令使用MD 5加密,可以保证整个系统安全

    youdao

  • One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

    使用公用安全性系统之一PKI(公用密钥基础),一种用于PDA智能电话安全性的加密技术

    youdao

  • At least two major credit card companies and four of the top ten U.S. banks have bought phone-encryption software, a security firm representative told Fortune.

    至少有两主要信用卡公司以及美国排名银行购买了手机加密软件。

    youdao

  • As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.

    正如Axis2WS - Security签名加密”中所介绍的,可以使用消息进行签名使用接收者公钥对消息进行加密

    youdao

  • For WS-Security authentication, encryption and signing are supported.

    对于WS - Security身份验证支持加密签名

    youdao

  • These results show that WS-Security symmetric encryption with client-generated keys is nearly as fast as WS-SecureConversation, especially for larger messages.

    这些结果表明使用客户端生成的密钥进行WS - Security对称加密几乎WS - SecureConversation一样特别是对于较大的消息

    youdao

  • You can import public keys created by other Encryption Expert security servers.

    可以导入其他EncryptionExpert安全服务器创建公共密匙

    youdao

  • Metro does even better with direct use of symmetric encryption with WS-Security, running about 30 percent faster.

    Metro甚至直接使用对称加密实现WS - Security还要快一些,大约快30%。

    youdao

  • The sample application used for this article is the same one used in "Axis2 WS-Security basics" and "Axis2 WS-Security signing and encryption" - a simple library-management service.

    本文使用例策略与“Axis2WS -Security基础“Axis2 WS - Security签名加密”中的策略相同一个简单管理服务

    youdao

  • To ensure the maximum performance, memcached does not provide any form of security, either in authentication or encryption.

    为了确保最佳性能memcached 并未提供任何形式安全性,没有身份验证没有加密。

    youdao

  • Next we need to create the keys and certificates for the Web services security signatures and encryption.

    接下来我们需要Web服务安全性签名加密创建密钥证书

    youdao

  • Address XML security using XML encryption and signatures.

    使用xml加密签名解决XML安全

    youdao

  • Address XML security using XML encryption and signatures.

    使用xml加密签名解决XML安全

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定