When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
Requesters can authenticate recipients using network and transport-provided security, claims proven in messages, and encryption of the request using a key known to the recipient.
通过网络和由传输提供的安全性、消息中已批准的声明,以及用收件人已知的密钥对请求进行加密,请求者可以对收件人进行身份验证。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
ADFS USES a set of secure protocols like SSL and Public Key encryption to provide Single Sign on to applications that are not hosted inside your network.
ADFS使用SSL和公开密钥加密等一组安全协议,提供了单次登录访问没有放在内部网络上的应用程序这个便利。
When a computer is disconnected from the network, the node it formed ceases to exist and any encryption-key data stored there are lost.
一旦计算机断开对等网络,网络形成的节点随即不复存在,储存在节点上的密钥数据也随之消失。
File service is provided that encrypts data of file transparently for users. Each user has a different key for encryption, users access the storage system by network driver mapping.
系统为用户提供了透明的文件加解密服务,用户通过映射网络驱动器的方式访问自己的存储空间。
The processes for key creating and managing in radar network are given based on common key encryption method.
用户控制权管理方面,本文根据项目实践经验,给出一种高效的用户控制权管理结构及方式。
The processes for key creating and managing in radar network are given based on common key encryption method.
用户控制权管理方面,本文根据项目实践经验,给出一种高效的用户控制权管理结构及方式。
应用推荐