It sets up encryption, integrity verification, and (optionally) compression and exposes to the upper layer an API for sending and receiving plain text packets.
它设置加密、完整性验证和(可选)压缩并向上层公开一个用于发送和接收纯文本数据包的API。
This raises an important question: Why do you need to come up with content encryption when the same can be accomplished using element encryption?
这就提出了一个重要问题:使用元素加密就可以实现同样的内容加密,那为什么还要提出内容加密呢?
Even the encryption can tie up the RFID Web services, as it must perform complex calculations to achieve desired results.
甚至加密也可能使RFIDWeb服务陷于停顿,因为必须执行复杂的计算才能获得希望的结果。
As a new student he quickly picked up on the challenge laid out by Boneh to tackle the problem of homomorphic encryption.
作为一个新生,他很快就熟悉了Boneh教授布置的挑战,即解决同态加密技术的难题。
In the grown-up world, you solve these problems through the use of public key-private key encryption.
在成年人的世界里,可以通过使用公钥—私钥加密来解决此类问题。
Since any required encryption keys and cryptosystems have to be in the source code as well, you've also just opened up your source data stream to the world.
由于任何加密密钥和密码系统都必须位于源代码中,因此同时还会将应用程序的源数据流公开出来。
The keys that you set up will be used for authentication, and the encryption will be handled automatically through the public/private key.
您设置的密匙将用于身份验证,加密将通过公共/私有密匙自动处理。
Prior to this the seemingly simple task of performing a TFS backup required backing up to eleven databases as well as an encryption key needed for reporting services.
之前,要执行这么一个看上去很简单的TFS备份,需要备份多个数据库,而且报表服务还需要密钥。
Even the encryption can tie-up the Web services, as it must perform complex calculations to achieve desired results.
甚至加密也可能使Web服务陷于停顿,因为必须执行复杂的计算才能获得希望的结果。
If you don't have a key to unlock or encrypt a message, you can set your encryption tool to look it up automatically.
如果你没有密钥加密或解密信息,你可以设置你的加密工具以便自动搜索它。
The method will make up for the defects of SSL/TLS, which can't do the implementation of multiparty and multilevel encryption.
这种方式可以弥补现在通行的SSL/TLS加密协议不能实现多方、多级重复加密的不足。
This paper introduces an optimization of Advanced Encryption Standard (AES) with 128-bit block length and key length. It can speed up execution on ARM microprocessor.
提出一种高级加密标准(aes)算法的优化方案,适合在ARM处理器上运行长度均为128位的明文和密钥。
Use this page to create an encryption key. It is recommended that you back up the encryption key after you create it.
使用此页面可创建加密键。建议在创建加密键后对其进行备份。
Use this page to create, back up, or restore the encryption key. It is recommended that you back up the encryption key after you create it.
使用此页面可创建、备份或恢复加密键。建议在创建加密键后对其进行备份。
The work of the paper is to perfect and set up a system of encryption and decryption algorithms based on composite nonlinear discrete chaotic dynamical systems.
补充并纠正了一些算法证明。本文改进后的算法具有以下特点:多种防御措施,用户拥有加密与解密的自主控制权,易于追踪;
However, because of the strength of the encryption technology, you should always back up your encryption keys.
但是,由于该加密技术十分强大,因此必须经常备份加密密钥。
In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods.
基于网络的数据传输安全问题是信息安全领域的重要课题之一,本文在分析现有数据加密方法的基础上,在数据传输系统中应用一种基于分组密码新概念的新算法—排列码加密算法。
Encryption can be authorized to set up a disk, so that even if people know the password, but as long as he did not authorize the plate, he still can not break it.
加密时可以设置一个授权盘,这样,即使密码被别人知道了,但只要他没有授权盘,他仍然无法破解该文件。
The RDP protocol USES the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.
RDP协议的使用对称加密算法rc4多达128位钥匙。rc4加密后所产生的一个初步的交流,其中的关键是使用RSA的非对称加密。
If you are using more advanced techniques (like public key encryption) you'll probably need to brush up on your math a little more.
如果您使用的是更先进的技术(如公共密钥加密)你可能会需要温习你的数学一点。
In this paper, a typical map of this kind, namely, the baker map, is further extended to be three-dimensional and then used to speed up image encryption while retaining its high degree of security.
本文对这种典型的地图,即贝克地图,进一步扩大到是立体式的,然后用于加速图像加密,同时保留其高度的安全性。
Simulation results of image encryption applied with the binary sequence also show that the binary sequence can cover up plaintext effectively and safely, and good encryption results are achieved.
将其应用于图像加密的仿真实验结果也表明,该二值序列能有效且安全地掩盖明文信息,取得了较好的加密效果。
Simulation results of image encryption applied with the binary sequence also show that the binary sequence can cover up plaintext effectively and safely, and good encryption results are achieved.
将其应用于图像加密的仿真实验结果也表明,该二值序列能有效且安全地掩盖明文信息,取得了较好的加密效果。
应用推荐