• Digital signature, data encryption and certificate storage.

    具备数字签名数据加解密证书储存的功能。

    youdao

  • Federal Information Processing (FIPS) 140-2 approved data encryption.

    联邦信息处理(FIPS) 140-2许可数据加密

    youdao

  • Data Encryption feature secures your most sensitive files and folders.

    数据加密特性使敏感文件文件夹

    youdao

  • In addition, HSP provides data security including authentication and data encryption.

    HSP协议还提供包括身份认证数据加密安全机制。

    youdao

  • Demonstrates how to encrypt and decrypt strings using the Data Encryption Standard algorithm.

    演示如何使用数据加密标准算法加密解密字符串

    youdao

  • Network data encryption occurs if you enable the encryption on either side of a network connection.

    只要网络连接一端启用加密,就会进行网络数据加密。

    youdao

  • For sensitive information, data encryption renders captured packets unreadable to an intruder.

    对于一个敏感信息,入侵者获得却不能解读这些加过密的数据

    youdao

  • The fundamental principles and methods of data encryption based on Complex-Rotary Code are presented.

    本文提出了利用复数旋转进行数据加密基本原理方法

    youdao

  • The main technical measures to keep computer data safe are user access management and data encryption.

    访问权限管理数据加密实现计算机数据安全主要技术手段

    youdao

  • I must stress that data encryption is only one of the tools in a comprehensive Internet security setup.

    必须强调数据加密只是英特网综合安全设置中的数据设置综合具。

    youdao

  • In this article, we investigate an implementation scheme of virtual-optics based data encryption system.

    本文在虚拟光学数据加密理论模型基础上,研究一种并行电子系统实现方法。

    youdao

  • Especially, the big prime and common big integers play an important part in the computer data encryption.

    特别是质数一般整数一个极为重要应用,就是关于计算机数据加密。

    youdao

  • The data encryption is an important technological means that ensures network data secure in the communication.

    数据加密保证网络数据通信安全一种重要技术手段

    youdao

  • The local expert subsystem adopt knowledge based on case, and data encryption is used for the data communication.

    本地专家系统采用案例知识库,知识库数据的远程更新采用加密体制。

    youdao

  • Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive.

    表示所有DES实现都必须从中派生数据加密标准(DES)算法

    youdao

  • DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.

    美国国家数据加密标准(the United States Data Encryption Standard),一个密码算法8字节密钥56位。

    youdao

  • The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.

    网络系统主要安全技术数据加密RSA算法密钥系统安全的一种体制

    youdao

  • Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm.

    定义访问数据加密标准(DES)算法加密服务提供程序(csp)版本包装对象

    youdao

  • In June, it bought PGP Corp and GuardianEdge, two privately held companies focusing on email and data encryption, for an undisclosed sum.

    6月,他们收购了PGPGuardianEdge公司,专注邮件数据加密的私人所有公司,交易金额不详

    youdao

  • This is because RFB depends on Data Encryption Standard DES encoding, and us export restrictions effectively prevent Tcl from bundling DES.

    是因为RF B依赖数据加密标准(Data Encryption Standard,DES)编码并且美国出口限制有效地阻止Tcl捆绑DES。

    youdao

  • Cryptography is sent by the general approach to data encryption to protect digital content before, the key given only to those legitimate users.

    密码学一般方式发送受维护数字内容之前数据加密密钥给予那些合法用户

    youdao

  • Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.

    RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可数据加密规则,支持改善的安全性能。

    youdao

  • The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.

    用于数字加密密钥可能最初请求传送同一密钥,可能是另一个随机生成的密钥,后者更具代表性。

    youdao

  • For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode.

    这个基于J2MEKerberos客户机支持一种加密算法CBC(密码分组链接cipher block chaining)模式下的DES(数据加密标准)。

    youdao

  • Several encryption methods mentioned above, the location of data encryption is gradually close to the user, the protection ability is gradually enhanced.

    以上所述几种加密方式数据加密的位置用户逐步靠近防护能力也是逐步提升的。

    youdao

  • Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.

    步骤4:利用数据加密密钥个密钥加密密钥、与这两个密钥相关联算法以及将来包含输出信息中的密钥信息,根据它们创建一个Encryptor对象

    youdao

  • Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.

    步骤4:利用数据加密密钥个密钥加密密钥、与这两个密钥相关联算法以及将来包含输出信息中的密钥信息,根据它们创建一个Encryptor对象

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定