encryption

美 [ɪn'krɪpʃ(ə)n]英 [ɪn'krɪpʃ(ə)n]
  • n.〔计〕加密
  • 网络数据加密;加密技术;资料加密

encryptionencryption

encryption

加密

加密Encryption),就是在加解扰系统的发送端,将“与解扰相关的信息”用密码方式处理后传送,以防止非授权者直接利用该 …

数据加密

...,用以保障在Internet上数据传输之安全,利用数据加密(Encryption)技术,可确保数据在网络上之传输过程中不会被截取及窃 …

加密技术

加密技术encryption)亦可以将资讯加密,确保与不欢迎宣教士或是禁止宣教的创启地区的宣教士通讯资料不至轻易外泄。透 …

资料加密

相对於资料加密(encryption),资料隐 藏技术将资料隐藏在另一个媒体中再传输,如此可提高传输通讯上的安全性。 为了善用Y…

密码

安防系统_互动百科 ... 039 announciator( 示号器) 040 encryption密码) 041 access control system( 门禁管理系统) ...

密钥

...的无线路由器ID("SSID")、该路由器是否需要密钥("Encryption")以及信号强度("Signal Strength"),搜索到你所使用的无线路由 …

编密码

石油词汇英语翻译(EF) ... encryption description 编码术语 encryption 编密码;加密 encumbrance 妨害 ...

数据加密技术

数据加密技术(Encryption): 对于大容量的可移动的备份存储介质,例如磁带,会面临丢失和被盗的风险。数据缓冲技术(Staging)…

1
You did not select an encryption key for the recipient of this message; therefore, the message will not be encrypted. 您没有为此信件的收件人选择加密密钥;因此,无法加密此信件。
2
As should by now be obvious, appropriate key management procedures should be part of the core design of any encryption implementation. 现在您应该清楚了,恰当的密钥管理规程应该成为任何加密实现的核心设计部分。
3
We recommend using one of these encryption methods for the connections between computers in a replication topology. 建议对复制拓扑中各计算机之间的连接,使用这些加密方法之一。
4
Make sure that you use an encryption API that does not require the key to be stored somewhere and is not derived from the users password. 确保使用的加密API不需要在其他位置存储密钥,并且不是由用户的密码派生而来。
5
There is no form of data encryption used, given that this is intended to be used in a public setting. 只要用在公共场合,就不会使用数据加密的形式。
6
Adding encryption to a database application will almost certainly decrease performance, at least minimally . 在数据库应用程序中增加加密或多或少要降低性能。
7
Certificates are also used for authentication and encryption to help secure communications between a Client Access server and clients. 证书还可用于身份验证和加密,以帮助保护客户端访问服务器与客户端之间的通信。
8
You did not select an encryption key for any of the recipients of this message; therefore, the message will not be encrypted. 您没有为此信件的任何一个收件人选择加密密钥;因此,无法加密此信件。
9
Specify encryption algorithm (-ea) This option allows you to choose a strong encryption algorithm to encrypt your new database. 指定加密算法(-ea)此选项允许您选择用于加密您新数据库的高度加密算法。
10
You did not select an encryption key for yourself (encrypt to self). You will not be able to decrypt your own message if you encrypt it. 您没有为您自己选择加密金钥(对自己加密)。如果您对邮件加密的话,您自己将无法解密邮件。
11
Encryption has been used for thousands of years to secure data. 数千年来,人们长期使用加密来保护数据。
12
If the portion of traffic that requires encryption is relatively small, carving out a separate class of service for it might be appropriate. 如果需要加密的流量部分相对较小,则为其划出单独的服务分类也许是适当的。
13
I really like this feature, but after adding it to the installation the request to enter the encryption key is far from obvious. 我非常喜欢这个特性,但是在安装是勾选了这个设置后,输入加密密钥的请求却无从找寻。
14
Digital signatures require the use of two distinct but mathematically-related encryption keys known as a public key and a private key. 数字签名需要使用两个密钥一个是公钥一个是私钥。
15
No matter how much encryption you use, leaving that vulnerability open won't help a bit. 无论您使用多少个加密,公开弱点没有一点好处。
16
Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption. 由于使用了不同的密匙进行加密和解密消息,因此这种形式的加密被称为不对称加密。
17
You did not select encryption keys for some of the recipients; these persons will not be able to decrypt the message if you encrypt it. 您没有对此信件的其中几位收件者选择加密金钥,因此如果您加密此信件的话,这几位收件者可能无法解密。
18
Try to use built-in primitives instead of building your own construction out of an encryption algorithm and a hash function. 尝试使用内置原语而不是抛开加密演算法和杂凑函数去建构自己的构造。
19
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security. 使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
20
If it gets stolen or accidentally left somewhere, it can be accessed if it has no sort of encryption or locking device. 如果万一硬盘被盗或是被偶然落在别处,里面的数据就一览无余。
21
Encryption can be applied to files or to information exchanged over a network connection. 可以对通过网络连接交换的文件或信息进行加密。
22
Data encryption is of little use unless you apply it to specifically mitigate a risk or to address a legal requirement. 数据加密用处不大,除非你把它应用于特定减轻风险或定加密风险应用位法律要件。
23
They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one. 他们可以寻找密码算法中的缺陷,然后恶意修改它们,让强的加密算法变弱。
24
In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was. 在以色列的案例中,安全和加密技术一直是他们的强项,但这不是像它过去一样是个增长行业。
25
Encryption Even if intruders manage to break through a firewall, the data on a network can be made safe if it's encrypted. 加密即使入侵者设法突破了防火墙,如果网络上的数据是加密的,就能使其安全。
26
The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key (KEK). 所述KDC向所述ME提供密钥加密密钥(KEK)形式的单点登录证书。
27
Likewise, if you write down your pass phrase and stick it on a post-it note on your monitor you might as well not use encryption at all. 此外,如果您喜欢把密码写在便笺上,然后把它粘贴到您的显示器上,那么您还是干脆不要加密的好。
28
Standard PDF Encryption with owner and user passwords used to be the only PDF protection. 标准的PDF加密与用来保护PDF格式的唯一拥有者和用户密码。
29
Similarly, the encryption and validation keys and the encryption scheme and validation scheme used for cookie data must be exactly the same. 同样,用于Cookie数据的加密和验证密钥以及加密方案和验证方案也必须完全相同。
30
You might hear this referred to as "setting up the encryption domain" for the firewalls. 您可能会听到这被称之为防火墙“设置加密域”。