• Among these, data encryption technology is said to be the critical one.

    其中数据加密技术被誉为信息安全核心技术

    youdao

  • The data encryption technology is one of the key skills to ensure the network security.

    数据加密技术实现网络安全关键技术之一

    youdao

  • Considering the market requirement, the data encryption technology is gradually apt to hardware encryption products.

    市场密码技术需求来看,逐渐倾向于基于硬件设备的密码产品。

    youdao

  • Safe measures and data encryption technology are applied to ensure that the cooperative product's data is secure in the terminal, the server, the CNC machine tool and transmission lines between them.

    结合嵌入式终端软硬件结构特点外协产品数据的泄密环节,采取服务器、终端与数控机床以及它们之间传输线路处采取安全措施和数据加密技术保证外协产品的数据安全。

    youdao

  • The Secure Ether Network Card, which is a sort of safety, integrates the data encryption technology into the network card and provides the encryption and the authentication services to the link layer.

    保密以太网卡数据加密技术集成网卡上,链路数据提供加密认证服务安全设备。

    youdao

  • The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.

    网络系统主要安全技术数据加密RSA算法密钥系统安全的一种体制

    youdao

  • NuCrypt's proprietary "AlphaEta" quantum-noise randomized, physical-layer encryption technology represents a new paradigm in ultra-secure, high data-rate optical communications.

    NuCrypt公司专有的“AlphaEta”量子噪声随机物理层加密技术代表了超安全高数据速率光通信的模式

    youdao

  • Data encryption is a pivotal technology of net security.

    数据加密实现网络安全关键技术之一。

    youdao

  • With the background of remote Virtual Lab in this subject, the transmission technology of data encryption is researched.

    课题远程虚拟实验室背景,研究数据加密传输技术

    youdao

  • This paper presents a scheme of electronic press issuing system, based on the technology of digital water-mark and data encryption.

    该文基于数字水印技术数据加密技术提出了一个电子报刊发行方案

    youdao

  • For example, they study human-computer interaction, telecommunications, data encryption, and Internet technology.

    例如人机交互电信学数据加密互联网技术

    youdao

  • According to the thorough analysis about the technology of HOOK PE, network connection monitoring and encryption transmission for the sharing data are realized with NDIS-HOOK.

    在对内核hookPE技术深入分析基础上NDIS - HOOK实现了网络连接监控文件共享数据加密传输

    youdao

  • The data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee.

    传输方面,采用通过国家密码管理委员会认证的硬件芯片加密算法的数据加密传输技术实现硬件加密。

    youdao

  • Secondly we introduce these key technology when develop mobile enterprise application such as J2ME, J2EE, XML and data encryption in details.

    然后详细介绍了实现移动企业级应用关键技术J2MEJ2EEXML以及数据加密技术

    youdao

  • Since then, encryption technology—which allows consumers and companies to secure their data and devices from outside eyes—has grown ever more popular.

    那时起保护消费者公司数据设备免受他人窥探的加密技术变得愈加流行。

    youdao

  • Image data protection has been noticed in the society, that causes the image encryption technology also becomes very important.

    图像数据保护日益受到社会普遍重视,使图像信息加密技术变得至关重要

    youdao

  • Because of high security, high speed, and good performance advantages, such as hardware-based encryption technology to protect disk data has become the mainstream of current trends and research focus.

    由于安全性速度快性能等优势硬件加密技术成为当前保护磁盘数据主流趋势研究热点

    youdao

  • The hopping code technology is an encryption and decryption technique that data transfer is of high security, and the hopping code mechanism makes each transmission unique.

    滚动技术一种使数据传输具有极高保密性解密技术每次传输代码都是唯一的。

    youdao

  • Encryption technology allows secure transmittal of information along the Internet by encoding the transmitted data using a mathematical formula that scrambles the data.

    加密技术通过数学公式传输数据进行编码加密,从而使信息能够安全地网上传输

    youdao

  • Based on data partitioning idea and multi-threading technology, a database encryption and decryption method is proposed and its effectiveness is verified by experiments.

    利用数据划分思想多线程技术提出一种解密数据库数据的方法并用实验来检验方法的有效性

    youdao

  • Based on data partitioning idea and multi-threading technology, a database encryption and decryption method is proposed and its effectiveness is verified by experiments.

    利用数据划分思想多线程技术提出一种解密数据库数据的方法并用实验来检验方法的有效性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定