The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.
加密可以保证有关某个主题的数据机密性,原因是只有拥有正确私钥的服务提供者才能正确执行解密,因此也能读懂该数据。
The most expensive operations in terms of performance are usually the serialization and deserialization of the data and return values, and the encryption and decryption of the request and response.
从性能而言,开销最大的操作通常是数据和返回值的序列化和反序列化以及请求和响应的加密与解密。
Make sure the contents stay secure after decryption because encrypted messages normally tend to contain sensitive data.
请确保解密后内容的安全,因为在通常情况下,加密消息中会包含一些敏感数据。
The pass phrase is used only for client-side encryption and decryption of your browser data.
该短语仅用于客户端的浏览器数据加解密。
You can also use AES_ENCRYPT and AES_DECRYPT functions for encryption and decryption of column data.
还可以使用AES_ENCRYPT和AES_DECRYPT函数对列数据进行加密和解密。
Step 4: Create the Decryptor object with decryption key and the location of the encrypted data that is to be decrypted.
步骤4:用解密密钥和需要解密的加密数据所在的位置创建Decryptor对象。
You can use the encryption and decryption built-in functions encrypt, DECRYPT_BIN, DECRYPT_CHAR, and GETHINT to encrypt your data within database tables.
可以使用内置的加密和解密函数encrypt、DECRYPT _ BIN、DECRYPT_CHAR和GETHINT加密数据库表中的数据。
Why not see if the scheme could handle its own decryption function, even while keeping the data secret, to remove enough noise to let the whole process continue?
为何不试试这种方案能否操作其自身的加密函数呢,即便数据是被加密过的,进而消除足够的噪声以使整个流程持续运转?
If you can't read the data when you have accessed it, the decryption keys are corrupted, or the server rejects it because the vendor is using its own encryption algorithm.
如果试图访问数据时无法读取数据,原因之一是解密密钥无效,原因之二是遭服务器拒绝,因为此提供商使用的是自己的加密算法。
All the information necessary for decryption is present within the XML encryption tags: the name of the encryption algorithm, the type of data that was encrypted, and the name of the encryption key.
XML加密标记中存在着解密需要的所有信息:加密算法的名称、加密的数据类型以及加密密钥的名称。
Transparent database encryption refers to the encryption and decryption of data in the database, the database access program is completely unaware.
数据库透明加密是指对库内数据的加密和解密,对数据库的访问程序是完全无感知的。
Note that changing an encryption key may require a significant maintenance window; all existing encrypted data will require decryption with the old key and encryption with the new key.
注意,更改加密密钥时可能需要一个有效的维护窗口。所有已经被加密的数据需要用旧的密钥进行解密,然后用新的密钥加密。
The data is then decoded at the receiving end (decryption).
数据然后在接收端解码(解密)。
Another advantage of being embedded is that you no longer need to deal with SSL decryption as the web server handles that pre-processing and passes the data off to ModSecurity decrypted.
嵌入式部署的另一个好处是无需再去处理SSL解码了,因为Web服务器会进行预处理并将数据回传给ModSecurity。
In the scheme, the data supplier can dynamically revoke the traitor 's decryption ability.
在方案中,数据发行商可以动态地废除叛逆者的解密能力。
MD5 encryption is one-way encryption algorithm, the so-called one-way encryption is only for data encryption, In other words, there is no way to encrypt the data after decryption.
MD 5就是采用单向加密的加密算法,所谓单向加密就是只能对数据进行加密,也就是说,没有办法对加密以后的数据进行解密。
While in decryption, scrambled data is turned back into the original text by using a cryptographic key.
解密时,通过使用加密密钥将经过编码的数据转换为原始文本。
If the receiver of the encrypted data wants to read the original data, the receiver must convert it back to the original through a process called decryption.
如果接收到加密数据的人要看原来的数据,就必须把数据转换为原来的形式,这个过程称为解密。
The encryption and decryption algorithm of data processing for our new generation meteorological satellites is introduced, and the decryption process realized by software is described.
本文介绍了应用在新一代气象卫星数据传输过程中的加解密算法,并讲述了应用软件实现地面解密的过程。
When the piracy occurring, the data supplier not only can trace the traitor but also can revoke the decryption ability of the traitor's private key by updating the code vectors of the users.
当发生盗版时,数据发行商不但可以追踪到叛逆者,而且可以通过更新用户的码向量来废除叛逆者的秘密钥的解密能力。
In this paper, a data encryption and decryption system-DEADS is presented.
本文介绍了一个数据加密和解密体制DEADS。
Software can help to carry out authentication or data encryption/decryption operations, but hardware has advantages in better performance and higher level security.
软件当然可以实现身份认证和数据加密解密的功能,但是硬件具有更好的性能和更高的安全等级。
Then analyzing based on the format of data transmission, encryption-decryption basic algorithm and work mode, algorithm is realized by software.
随后在分析理解数据传输格式、具体的加解密算法和工作模式的基础上,通过软件进行了算法的实现。
The hopping code technology is an encryption and decryption technique that data transfer is of high security, and the hopping code mechanism makes each transmission unique.
滚动码技术是一种使数据传输具有极高保密性加解密技术,且每次传输的代码都是唯一的。
RSA algorithm realized the generation of public key and private key, and the function of data encryption and decryption.
RSA算法的编程实现了公开密钥、私有密钥的生成,数据加密,解密功能。
In this paper, LIU's high intensity public encryption algorithm is studied, and a multimedia data encryption & decryption software system is designed.
研究了刘氏高强度密码体制算法,并且设计一个基于此密码机制的多媒体数据加解密软件系统。
So the problems of embedded system's data soft encryption and decryption are resolved.
解决了一般嵌入式系统数据软加解密的问题。
With the In System Programming technique(ISP), the system reconfiguration, the encryption and decryption for data communication are realized.
采用在系统可编程技术(ISP)实现系统重构和传输数据加密、解密编码。
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.
该系统能有效的防止网络内部的重要数据通过网络泄露出去,无需用户进行手动的加密解密操作。
The system can effectively prevent important data from leaking out through the network without manual encryption and decryption operations.
该系统能有效的防止网络内部的重要数据通过网络泄露出去,无需用户进行手动的加密解密操作。
应用推荐