数据的不同部分可以利用基于指定给该存储的数据部分的预定安全等级的不同加密技术加密。
Different portions of the data may be encrypted with different encryption techniques based upon a predetermined level of security assigned to the portions of the stored data.
电脑空间中的加密的通道可能是通过SSL、SSH和其他技术加密的——更不必说拟虚专用网络。
Encrypted tunnels through cyberspace are possible via SSL, SSH, and other technologies — not to mention virtual private networks.
从美国出口这项加密技术在目前是违法的。
It is currently illegal to export this encryption technology from the U.S.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
需要用某种形式的加密技术保护数据的机密性和完整性。
Some form of encryption is needed to protect confidentiality and integrity of data.
在以色列的案例中,安全和加密技术一直是他们的强项,但这不是像它过去一样是个增长行业。
In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.
SSL使用加密技术、数字签名和数字证书,在客户端和服务器之间提供消息隐私、消息完整性和相互验证。
SSL USES encryption techniques, digital signatures and digital certificates to provide message privacy, message integrity and mutual authentication between clients and servers.
如果有一种理想的加密技术,将会有很多法律障碍来限制它的使用。
If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.
最后,策略规范可能要求加密订单的某些要素,指示要使用的加密技术、要使用的证书等等。
Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.
可用各种方式组合这些机制,以便用各种加密技术建立各种安全模型。
These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.
可以借助加密技术和云计算厂商的技能优势,确保信息安全。同时,可以设计一些新的方法,解决这个问题。
There may be cryptographic techniques, skill level of vendors' staff to ensure the security and some new methods may be devised to solve this issue.
清单6中的示例使用非对称加密技术签署所有消息,提供图书信息。
The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.
美将会投入更多精力于加密和频率跳变等技术,以保护卫星通讯。
More is also to be spent on protecting satellite communications through encryption and frequency hopping.
要更好地利用加密技术,用户还应该再使用ESP。
For the added benefit of encryption, users should additionally use ESP.
该设计旨在理解信息加密与隐藏技术在实际生活中的应用,从总体上阐述了它们的原理。
The purpose of this design is to make the application of information encryption and hiding in real life understood, as well as to describe the principles of the technology on the whole.
它具有高度定向能力,功耗低,采用加密技术适合秘密全频谱应急行动。
Highly directional, it USES low power and is encrypted for covert full-spectrum contingency operations.
阿联酋的监管官员称,黑莓的专用网络,和先进的加密技术使该手机经因特网发送的信息安全得过了头。
The UAE's regulators say the BlackBerry's proprietary network and tight encryption make messages the devices send over the Internet too secure.
但在被调查者中,除去正不断增多的远程用户,只有27%的人表示他们的公司目前使用了硬盘加密技术来保护企业终端的敏感数据。
Yet, regardless of the growth in remote users, just 27% of respondents say their companies currently use hard disk encryption to protect sensitive data on corporate endpoints.
第2部分说明了如何增强wsa存根类以及如何将其他技术组件(如加密和XML签名)集成到wsa存根类中。
Part 2 demonstrated how to enhance WSA stub classes and integrate other technology components such as cryptography and XML signatures into WSA stub classes.
其他性能包括高安全性、基于标准的加密技术、可同时单向和双向加密的加密密码、文本、数字和二进制文件。
Other features include high-security, standards-based encryption techniques, both for unidirectional and bidirectional encryption to encrypt passwords, texts, numbers and binaries.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
WebSphereCloudBurst还包含一个内置到设备中的映像库,该库利用了加密和碎片技术。
WebSphere CloudBurst also includes an image repository, built into the appliance, which leverages encryption and sharding technologies.
可以利用加密技术来使Web服务请求和响应中交换的信息不可读。
Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.
Harris公司的Sierra II加密技术为信息安全水平奠定了基础。
The Harris Sierra II? encryption technology provides the foundation for this level of information security.
NuCrypt公司专有的“AlphaEta”量子噪声随机物理层加密技术代表了超安全高数据速率光通信的新模式。
NuCrypt's proprietary "AlphaEta" quantum-noise randomized, physical-layer encryption technology represents a new paradigm in ultra-secure, high data-rate optical communications.
作为一个新生,他很快就熟悉了Boneh教授布置的挑战,即解决同态加密技术的难题。
As a new student he quickly picked up on the challenge laid out by Boneh to tackle the problem of homomorphic encryption.
“盗版者有无限的时间和资源”Ishikawa说,“你无法建立一个不能被破解的加密技术。”
"Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."
答:版本5.0为ws - security头提供了用户名令牌、x509证书、身份断言、数字签名和加密作为技术预览。
Answer: Version 5.0 provides WS-Security headers with username tokens, x509 certs, identity assertions, dig sigs, and encryption as a Tech Preview.
新的ltpa令牌使用以下强加密技术。
The new LTPA token USES the following strong cryptographic techniques.
新的ltpa令牌使用以下强加密技术。
The new LTPA token USES the following strong cryptographic techniques.
应用推荐