Data Encryption
美
英 
- un.數(shù)據(jù)加密
- 網(wǎng)絡(luò)資料加密;數(shù)據(jù)加密方式;資料加解密功能
英漢解釋
例句
There is no form of data encryption used, given that this is intended to be used in a public setting.
只要用在公共場(chǎng)合,就不會(huì)使用數(shù)據(jù)加密的形式。
Data encryption is of little use unless you apply it to specifically mitigate a risk or to address a legal requirement.
數(shù)據(jù)加密用處不大,除非你把它應(yīng)用于特定減輕風(fēng)險(xiǎn)或定加密風(fēng)險(xiǎn)應(yīng)用位法律要件。
While encoding is about changing the form of data, encryption suggests that recovering the plain text is intended to be difficult: It isn't.
有關(guān)更改數(shù)據(jù)的形式編碼時(shí),加密建議的恢復(fù)純文本用于很困難:不是這樣的。
DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.
即美國(guó)國(guó)家數(shù)據(jù)加密標(biāo)準(zhǔn)(theUnitedStatesDataEncryptionStandard),是一個(gè)塊密碼算法,塊長(zhǎng)8字節(jié),密鑰長(zhǎng)56位。
One of the most popular secret-key encryption schemes is IBM's Data Encryption System (DES), which became the U.
ibm的數(shù)據(jù)加密系統(tǒng)(des)是最流行的秘鑰加密方案之一。
American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms.
美國(guó)20世紀(jì)的數(shù)據(jù)加密標(biāo)準(zhǔn)DES是到目前為止使用最廣、討論最多的分組密碼算法之一。
In the transmitter of cryptosystems, the plaintext is encrypted by means of international data encryption algorithms (IDEA).
密碼系統(tǒng)之傳送端,明文信號(hào)以國(guó)際資料編碼演算法(IDEA)密碼器編碼。
Data encryption is an important tool to help application developers meet the need for greater security.
數(shù)據(jù)加密是幫助應(yīng)用程序開(kāi)發(fā)人員滿足更高安全性要求的重要工具。
Intrusion Detection is an important security technology of protecting information system as well as firewall and data encryption techniques.
入侵檢測(cè)是繼數(shù)據(jù)加密、防火墻等傳統(tǒng)安全保護(hù)技術(shù)后的又一種新的安全技術(shù)。
The chip, the algorithms are specific procedures may be read out key data encryption used to counter the logic analyser.
此芯片中存有特定的算法程序,可將讀出的密鑰數(shù)據(jù)進(jìn)行加密變換,以對(duì)抗邏輯分析儀。
The design proposal of the U-disk with identity authentication and data encryption is implemented in this thesis.
本文實(shí)現(xiàn)了一種具有身份認(rèn)證及數(shù)據(jù)加密U盤的設(shè)計(jì)方案。
Data encryption is one of the basic measures for computer system security defence .
數(shù)據(jù)加密是計(jì)算機(jī)系統(tǒng)安全防護(hù)的基本措施之一。
This combination refers to the name of the key that Imran uses for data encryption.
這個(gè)組合引用了Imran用于數(shù)據(jù)加密的密鑰名稱。
Developers that transmit sensitive information should add some additional data encryption-there are tools available to help here.
如果需要傳輸敏感數(shù)據(jù)的話,開(kāi)發(fā)者必須在GSM加密技術(shù)之外提供額外的數(shù)據(jù)加密-有很多工具可以幫助開(kāi)發(fā)者完成這項(xiàng)工作。
Creates an instance of a cryptographic object to perform the Data Encryption Standard (DES) algorithm .
創(chuàng)建加密對(duì)象的實(shí)例以執(zhí)行數(shù)據(jù)加密標(biāo)準(zhǔn)(DES)算法。
The SSL protocol provides authentication, data encryption, and data integrity, in a public-key infrastructure (PKI).
SSL協(xié)議在一個(gè)公共密鑰基礎(chǔ)設(shè)施中提供認(rèn)證、數(shù)據(jù)加密和數(shù)據(jù)完整性。
Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm .
定義訪問(wèn)數(shù)據(jù)加密標(biāo)準(zhǔn)(DES)算法的加密服務(wù)提供程序(CSP)版本的包裝對(duì)象。
Understanding of the data encryption methods used by the Angel Cartel and its allies.
關(guān)于天使企業(yè)和他的盟友使用的數(shù)據(jù)密碼技術(shù)方法的理解。
Data encryption is a popular and powerful tool to help address the data security problem.
數(shù)據(jù)加密是幫助解決數(shù)據(jù)安全問(wèn)題的流行而又強(qiáng)大的工具。
Part of the problem may be that many IT pros get their information about data encryption from security vendors.
一部分問(wèn)題可能是一些IT專家從安全供應(yīng)商獲取數(shù)據(jù)加密方面的信息。
Network data encryption occurs if you enable the encryption on either side of a network connection.
只要在網(wǎng)絡(luò)連接的某一端啟用了加密,就會(huì)進(jìn)行網(wǎng)絡(luò)數(shù)據(jù)加密。
To protect the communication on your wireless network, turn on data encryption on your AirPort Base Station.
要保護(hù)無(wú)線網(wǎng)絡(luò)上的通信,請(qǐng)在AirPort基站上啟用數(shù)據(jù)加密。
Have utilized and ensured the safety of sensitive information to transmit on the basis of the data encryption of the digital certificate.
利用基于數(shù)字證書的數(shù)據(jù)加密技術(shù)確保了敏感信息的安全傳輸。
Traditional static defense means such as firewall and data encryption have been unable to fully meet the requirements of network security.
傳統(tǒng)的防火墻、數(shù)據(jù)加密等靜態(tài)防御方式已不能完全滿足網(wǎng)絡(luò)安全的要求。
These authenticated stream classes support mutual authentication, data encryption, and data signing.
這些已驗(yàn)證身份的流類支持相互身份驗(yàn)證、數(shù)據(jù)加密和數(shù)據(jù)簽名。
Considering the market requirement, the data encryption technology is gradually apt to hardware encryption products.
從市場(chǎng)對(duì)密碼技術(shù)的需求來(lái)看,也逐漸傾向于基于硬件設(shè)備的密碼產(chǎn)品。
For sensitive information, data encryption renders captured packets unreadable to an intruder.
對(duì)于一個(gè)敏感信息,入侵者獲得卻不能解讀這些加過(guò)密的數(shù)據(jù)。
To configure identity authentication, data encryption, or terminal window and scripting options, click the Security tab.
要配置身份驗(yàn)證、數(shù)據(jù)加密或終端窗口和腳本選項(xiàng),請(qǐng)單擊安全性選項(xiàng)卡。
RIM uses stronger data encryption for business customers than many rivals, which complicates governments' efforts to access data.
一個(gè)是RIM為企業(yè)客戶提供比許多競(jìng)爭(zhēng)對(duì)手更牢固的數(shù)據(jù)加密服務(wù),這就不利于政府獲取數(shù)據(jù)。
In June, it bought PGP Corp and GuardianEdge, two privately held companies focusing on email and data encryption, for an undisclosed sum.
在6月,他們收購(gòu)了PGP和GuardianEdge公司,兩家專注于郵件及數(shù)據(jù)加密的私人所有公司,交易金額不詳。
With the background of remote Virtual Lab in this subject, the transmission technology of data encryption is researched.
本課題以遠(yuǎn)程虛擬實(shí)驗(yàn)室為背景,研究數(shù)據(jù)加密傳輸技術(shù)。
Two documents for encryption systems in the hope that the process of writing papers for data encryption, in the course of time deciphering.
二是用于加密文件系統(tǒng),希望在文件寫過(guò)程中對(duì)數(shù)據(jù)進(jìn)行加密,在讀的過(guò)程中進(jìn)行解密。三是設(shè)計(jì)透明的文件系統(tǒng)加速。
It also includes secure login, data encryption, and biometric authentication support.
它還包括安全注冊(cè),數(shù)據(jù)加密和身份驗(yàn)證支持。
A protocol that supplies secure data communication through data encryption and decryption.
通過(guò)數(shù)據(jù)加密和解密來(lái)保證數(shù)據(jù)通信安全的一種協(xié)議。
Chaotic key stream generators are of importance in re-entry telemeter data encryption systems.
混沌密鑰序列的實(shí)現(xiàn)對(duì)遙測(cè)數(shù)據(jù)加密系統(tǒng)有著極其重要的意義。
In this article, we investigate an implementation scheme of virtual-optics based data encryption system.
本文在虛擬光學(xué)數(shù)據(jù)加密理論模型的基礎(chǔ)上,研究一種并行電子系統(tǒng)實(shí)現(xiàn)方法。
The local expert subsystem adopt knowledge based on case, and data encryption is used for the data communication.
本地專家系統(tǒng)采用案例式的知識(shí)庫(kù),知識(shí)庫(kù)數(shù)據(jù)的遠(yuǎn)程更新采用加密體制。
VPN consists of three parts: the tunnel, the data encryption technology and user authentication.
VPN由三個(gè)部分組成:隧道技術(shù),數(shù)據(jù)加密和用戶認(rèn)證。
Key management manages the various keys used in the encryption system, including the user's personal key, data encryption key and so on.
密鑰管理是管理加脫密系統(tǒng)中使用到的各種密鑰,包括用戶的個(gè)人密鑰,用于對(duì)數(shù)據(jù)加密的數(shù)據(jù)類密鑰等,并通過(guò)轉(zhuǎn)換表來(lái)分配不同用戶的權(quán)限。
Cryptographic transform libraries in OpenBSD include Blowfish, Data Encryption Standard (DES), 3DES, and Cast.
OpenBSD中的加密轉(zhuǎn)換庫(kù)包括Blowfish、數(shù)據(jù)加密標(biāo)準(zhǔn)(DES)、3DES和Cast。