• 数据不同部分可以利用基于指定存储的数据部分预定安全等级的不同加密技术加密

    Different portions of the data may be encrypted with different encryption techniques based upon a predetermined level of security assigned to the portions of the stored data.

    youdao

  • 电脑空间中的加密通道可能通过SSLSSH其他技术加密的——更不必拟虚专用网络

    Encrypted tunnels through cyberspace are possible via SSL, SSH, and other technologiesnot to mention virtual private networks.

    youdao

  • 美国出口这项加密技术目前违法的。

    It is currently illegal to export this encryption technology from the U.S.

    《柯林斯英汉双解大词典》

  • 苹果公司这些问题立场斯诺登事件出现形成,在之后,公司开始采用一系列技术,这些技术默认情况下使用者的数据加密限制他人访问

    Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.

    youdao

  • 需要某种形式加密技术保护数据的机密性完整性

    Some form of encryption is needed to protect confidentiality and integrity of data.

    youdao

  • 以色列案例中,安全和加密技术一直是他们的强项不是过去一样是个增长行业

    In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.

    youdao

  • SSL使用加密技术数字签名数字证书,在客户端服务器之间提供消息隐私、消息完整性相互验证

    SSL USES encryption techniques, digital signatures and digital certificates to provide message privacy, message integrity and mutual authentication between clients and servers.

    youdao

  • 如果一种理想的加密技术会有很多法律障碍来限制使用

    If there were a perfect encryption technique, I'm sure there would be many legal barriers to its use.

    youdao

  • 最后策略规范可能要求加密订单某些要素指示使用加密技术、要使用证书等等

    Finally, a policy specification may require that certain elements of the order are to be encrypted, denoting the encryption techniques to be used, certificates to use, etc.

    youdao

  • 可用各种方式组合这些机制,以便各种加密技术建立各种安全模型

    These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.

    youdao

  • 可以借助加密技术和云计算厂商技能优势确保信息安全。同时,可以设计一些新的方法解决这个问题

    There may be cryptographic techniques, skill level of vendors' staff to ensure the security and some new methods may be devised to solve this issue.

    youdao

  • 清单6中的示例使用非对称加密技术签署所有消息提供图书信息

    The Listing 6 example USES asymmetric encryption to sign all the messages providing book information.

    youdao

  • 将会投入更多精力于加密频率变等技术,以保护卫星通讯

    More is also to be spent on protecting satellite communications through encryption and frequency hopping.

    youdao

  • 更好地利用加密技术用户应该使用ESP

    For the added benefit of encryption, users should additionally use ESP.

    youdao

  • 设计旨在理解信息加密隐藏技术实际生活中的应用,从总体阐述它们原理

    The purpose of this design is to make the application of information encryption and hiding in real life understood, as well as to describe the principles of the technology on the whole.

    youdao

  • 具有高度定向能力功耗,采用加密技术适合秘密全频谱应急行动

    Highly directional, it USES low power and is encrypted for covert full-spectrum contingency operations.

    youdao

  • 阿联酋监管官员莓的专用网络先进加密技术使该手机经因特网发送信息安全得过了头。

    The UAE's regulators say the BlackBerry's proprietary network and tight encryption make messages the devices send over the Internet too secure.

    youdao

  • 调查者中,除去正不断增多远程用户只有27%的人表示他们的公司目前使用硬盘加密技术保护企业终端敏感数据

    Yet, regardless of the growth in remote users, just 27% of respondents say their companies currently use hard disk encryption to protect sensitive data on corporate endpoints.

    youdao

  • 第2部分说明了如何增强wsa存根以及如何其他技术组件(加密XML签名)集成wsa存根类中。

    Part 2 demonstrated how to enhance WSA stub classes and integrate other technology components such as cryptography and XML signatures into WSA stub classes.

    youdao

  • 其他性能包括高安全性基于标准加密技术可同时单向双向加密加密密码文本数字二进制文件

    Other features include high-security, standards-based encryption techniques, both for unidirectional and bidirectional encryption to encrypt passwords, texts, numbers and binaries.

    youdao

  • 使用公用安全性系统之一PKI(公用密钥基础),一种用于PDA智能电话安全性的加密技术

    One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

    youdao

  • WebSphereCloudBurst包含一个内置设备中的映像利用了加密碎片技术

    WebSphere CloudBurst also includes an image repository, built into the appliance, which leverages encryption and sharding technologies.

    youdao

  • 可以利用加密技术来使Web服务请求响应交换信息不可读

    Encryption technology can be used to make the information exchanged in web services requests and responses unreadable.

    youdao

  • Harris公司的Sierra II加密技术信息安全水平奠定了基础

    The Harris Sierra II? encryption technology provides the foundation for this level of information security.

    youdao

  • NuCrypt公司专有的“AlphaEta”量子噪声随机物理层加密技术代表了超安全数据速率光通信模式

    NuCrypt's proprietary "AlphaEta" quantum-noise randomized, physical-layer encryption technology represents a new paradigm in ultra-secure, high data-rate optical communications.

    youdao

  • 作为一个新生很快就熟悉了Boneh教授布置挑战,即解决同态加密技术难题

    As a new student he quickly picked up on the challenge laid out by Boneh to tackle the problem of homomorphic encryption.

    youdao

  • 盗版者无限时间资源Ishikawa,“无法建立一个不能被破解的加密技术。”

    "Pirates have unlimited time and resources," BayTSP's Ishikawa says. "You can't build an encryption that can't be broken."

    youdao

  • 版本5.0ws - security提供了用户名令牌x509证书、身份断言、数字签名加密作为技术预览

    Answer: Version 5.0 provides WS-Security headers with username tokens, x509 certs, identity assertions, dig sigs, and encryption as a Tech Preview.

    youdao

  • 新的ltpa令牌使用以下加密技术

    The new LTPA token USES the following strong cryptographic techniques.

    youdao

  • 新的ltpa令牌使用以下加密技术

    The new LTPA token USES the following strong cryptographic techniques.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定