单词 | data encryption |
释义 | 例句释义: 数据加密,资料加密,数据加密方式,资料加解密功能 1. There is no form of data encryption used, given that this is intended to be used in a public setting. 只要用在公共场合,就不会使用数据加密的形式。 www-128.ibm.com 2. Data encryption is of little use unless you apply it to specifically mitigate a risk or to address a legal requirement. 数据加密用处不大,除非你把它应用于特定减轻风险或定加密风险应用位法律要件。 www.cto360.com 3. While encoding is about changing the form of data, encryption suggests that recovering the plain text is intended to be difficult: It isn't. 有关更改数据的形式编码时,加密建议的恢复纯文本用于很困难:不是这样的。 technet.microsoft.com 4. DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits. 即美国国家数据加密标准(theUnitedStatesDataEncryptionStandard),是一个块密码算法,块长8字节,密钥长56位。 www.ibm.com 5. One of the most popular secret-key encryption schemes is IBM's Data Encryption System (DES), which became the U. ibm的数据加密系统(des)是最流行的秘钥加密方案之一。 www.1stenglish.com 6. American 20th century data encryption standard DES is so far usesbroadly, discusses one of most block cipher algorithms. 美国20世纪的数据加密标准DES是到目前为止使用最广、讨论最多的分组密码算法之一。 www.fabiao.net 7. In the transmitter of cryptosystems, the plaintext is encrypted by means of international data encryption algorithms (IDEA). 密码系统之传送端,明文信号以国际资料编码演算法(IDEA)密码器编码。 www.etop.org.tw 8. Data encryption is an important tool to help application developers meet the need for greater security. 数据加密是帮助应用程序开发人员满足更高安全性要求的重要工具。 www-128.ibm.com 9. Intrusion Detection is an important security technology of protecting information system as well as firewall and data encryption techniques. 入侵检测是继数据加密、防火墙等传统安全保护技术后的又一种新的安全技术。 www.fabiao.net 10. The chip, the algorithms are specific procedures may be read out key data encryption used to counter the logic analyser. 此芯片中存有特定的算法程序,可将读出的密钥数据进行加密变换,以对抗逻辑分析仪。 ks.cn.yahoo.com 1. The design proposal of the U-disk with identity authentication and data encryption is implemented in this thesis. 本文实现了一种具有身份认证及数据加密U盘的设计方案。 www.13191.com 2. Data encryption is one of the basic measures for computer system security defence . 数据加密是计算机系统安全防护的基本措施之一。 dict.kekenet.com 3. This combination refers to the name of the key that Imran uses for data encryption. 这个组合引用了Imran用于数据加密的密钥名称。 www.ibm.com 4. Developers that transmit sensitive information should add some additional data encryption-there are tools available to help here. 如果需要传输敏感数据的话,开发者必须在GSM加密技术之外提供额外的数据加密-有很多工具可以帮助开发者完成这项工作。 www.infoq.com 5. Creates an instance of a cryptographic object to perform the Data Encryption Standard (DES) algorithm . 创建加密对象的实例以执行数据加密标准(DES)算法。 www.bing.com 6. The SSL protocol provides authentication, data encryption, and data integrity, in a public-key infrastructure (PKI). SSL协议在一个公共密钥基础设施中提供认证、数据加密和数据完整性。 www.ibm.com 7. Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm . 定义访问数据加密标准(DES)算法的加密服务提供程序(CSP)版本的包装对象。 www.bing.com 8. Understanding of the data encryption methods used by the Angel Cartel and its allies. 关于天使企业和他的盟友使用的数据密码技术方法的理解。 dx.xlmagic.com 9. Data encryption is a popular and powerful tool to help address the data security problem. 数据加密是帮助解决数据安全问题的流行而又强大的工具。 www-128.ibm.com 10. Part of the problem may be that many IT pros get their information about data encryption from security vendors. 一部分问题可能是一些IT专家从安全供应商获取数据加密方面的信息。 blog.sina.com.cn 1. Network data encryption occurs if you enable the encryption on either side of a network connection. 只要在网络连接的某一端启用了加密,就会进行网络数据加密。 www.ibm.com 2. To protect the communication on your wireless network, turn on data encryption on your AirPort Base Station. 要保护无线网络上的通信,请在AirPort基站上启用数据加密。 docs.info.apple.com 3. Have utilized and ensured the safety of sensitive information to transmit on the basis of the data encryption of the digital certificate. 利用基于数字证书的数据加密技术确保了敏感信息的安全传输。 zhidao.baidu.com 4. Traditional static defense means such as firewall and data encryption have been unable to fully meet the requirements of network security. 传统的防火墙、数据加密等静态防御方式已不能完全满足网络安全的要求。 www.fabiao.net 5. These authenticated stream classes support mutual authentication, data encryption, and data signing. 这些已验证身份的流类支持相互身份验证、数据加密和数据签名。 msdn2.microsoft.com 6. Considering the market requirement, the data encryption technology is gradually apt to hardware encryption products. 从市场对密码技术的需求来看,也逐渐倾向于基于硬件设备的密码产品。 www.fabiao.net 7. For sensitive information, data encryption renders captured packets unreadable to an intruder. 对于一个敏感信息,入侵者获得却不能解读这些加过密的数据。 dictsearch.appspot.com 8. To configure identity authentication, data encryption, or terminal window and scripting options, click the Security tab. 要配置身份验证、数据加密或终端窗口和脚本选项,请单击安全性选项卡。 support.microsoft.com 9. RIM uses stronger data encryption for business customers than many rivals, which complicates governments' efforts to access data. 一个是RIM为企业客户提供比许多竞争对手更牢固的数据加密服务,这就不利于政府获取数据。 c.wsj.com 10. In June, it bought PGP Corp and GuardianEdge, two privately held companies focusing on email and data encryption, for an undisclosed sum. 在6月,他们收购了PGP和GuardianEdge公司,两家专注于邮件及数据加密的私人所有公司,交易金额不详。 www.bing.com 1. With the background of remote Virtual Lab in this subject, the transmission technology of data encryption is researched. 本课题以远程虚拟实验室为背景,研究数据加密传输技术。 www.fabiao.net 2. Two documents for encryption systems in the hope that the process of writing papers for data encryption, in the course of time deciphering. 二是用于加密文件系统,希望在文件写过程中对数据进行加密,在读的过程中进行解密。三是设计透明的文件系统加速。 www.pudn.com 3. It also includes secure login, data encryption, and biometric authentication support. 它还包括安全注册,数据加密和身份验证支持。 www.21csp.com.cn 4. A protocol that supplies secure data communication through data encryption and decryption. 通过数据加密和解密来保证数据通信安全的一种协议。 technet.microsoft.com 5. Chaotic key stream generators are of importance in re-entry telemeter data encryption systems. 混沌密钥序列的实现对遥测数据加密系统有着极其重要的意义。 www.ceps.com.tw 6. In this article, we investigate an implementation scheme of virtual-optics based data encryption system. 本文在虚拟光学数据加密理论模型的基础上,研究一种并行电子系统实现方法。 www.dictall.com 7. The local expert subsystem adopt knowledge based on case, and data encryption is used for the data communication. 本地专家系统采用案例式的知识库,知识库数据的远程更新采用加密体制。 kns50.chkd.cnki.net 8. VPN consists of three parts: the tunnel, the data encryption technology and user authentication. VPN由三个部分组成:隧道技术,数据加密和用户认证。 goabroad.zhishi.sohu.com 9. Key management manages the various keys used in the encryption system, including the user's personal key, data encryption key and so on. 密钥管理是管理加脱密系统中使用到的各种密钥,包括用户的个人密钥,用于对数据加密的数据类密钥等,并通过转换表来分配不同用户的权限。 kns50.chkd.cnki.net 10. Cryptographic transform libraries in OpenBSD include Blowfish, Data Encryption Standard (DES), 3DES, and Cast. OpenBSD中的加密转换库包括Blowfish、数据加密标准(DES)、3DES和Cast。 www.ibm.com 1. Data encryption is the most core techniques for the safety of the information. 数据加密技术是保障信息安全的最核心的技术。 www.fabiao.net 2. Represents the base class for Triple Data Encryption Standard algorithms from which all. 表示三重数据加密标准算法的基类。 www.kuenglish.info 3. Remote Assistance disconnected because of a general outgoing-data encryption error. 由于一个一般性传出数据加密错误,远程协助被断开。 www.drados.com 4. The data encryption algorithm based on chaos and its FPGA implement are mainly discussed in this dissertation. 本文主要论述了基于混沌的数据加密算法的设计及其FPGA实现过程。 www.fabiao.net 5. The application of cryptography has infiltrated all the fields of social life, as in data encryption, web security, digital cash and so on. 密码学的应用已经渗透到了社会生活的各个领域,如数据加密、网络安全、电子现金等。 www.fabiao.net 6. From a data-encryption standpoint, JSSE encompasses many of the same concepts and algorithms as those in the JCE. 从数据加密的角度看,JSSE结合了许多与JCE中使用的同样的概念和算法。 www.ibm.com 7. Data encryption is provided through digital envelopes. 数据加密通过数字信封提供。 msdn2.microsoft.com 8. It is used to confirm the identity of the Report Server Web service when performing data encryption operations. 该帐户可以在执行数据加密操作时用于确认报表服务器Web服务的标识。 msdn2.microsoft.com 9. These databases protect local data through data encryption. 这些数据库通过数据加密保护本地数据。 www.ibm.com 10. in addition , the data encryption techniques provide a security of the voice transmission. 另外,数据加密选项可以为语音传输提供安全性保障。 www.ichacha.net 1. The key of digital anti-counterfeiting is data encryption. 数码防伪的关键在于数据加密。 www.ceps.com.tw 2. sometimes you don't need to use data encryption at all. 有时你完全不需要使用数据加密。 www.cto360.com 3. What is its relationship with the existed Data Encryption Standard (DES)? 它和现有的数据加密标准(DES)是什么关系?。 www.bing.com 4. Data encryption is an electronic lock that uses algorithms to scramble the data, and it is more secure. 数据编码是一个电子锁,它利用运算法则来扰乱数据,所以较为安全。 www.hotdic.com 5. A. program data encryption. 对节目数据加密。 blog.sina.com.cn 6. There are specific cases where it makes sense to use data encryption. 存在一些使用数据加密讲得通的特别情况。 www.cto360.com 7. Demonstrates how to encrypt and decrypt strings using the Data Encryption Standard algorithm. 演示如何使用数据加密标准算法来加密和解密字符串。 www.kuenglish.info 8. For example, they study human-computer interaction, telecommunications, data encryption, and internet technology. 例如,人机交互,电信学,数据加密和互联网技术。 college.strong-study.com 9. On the other hand, for sensitive data, additional security may be required - such as data encryption or two-factor authentication. 在另一方面,对于敏感的数据,额外的安全可能需要-如数据加密或双因素认证。 www.360doc.com 10. Above all, traditional data encryption can not solve the data leakage behavior which is from internal staff within enterprise. 重要的是传统的加密方式并不能解决企业内部人员泄露数据的行为。 www.lunwenchina.net.cn 1. DES use 56 to 64 key pieces of data encryption, as well as 64 pieces of data for 16 coding. DES使用56位密钥对64位的数据块进行加密,并对64位的数据块进行16轮编码。 www.hackchina.com 2. This paper described the office network, the main threat to network security, and secondly, from data encryption; 本文首先阐述了办公网络中的网络安全的主要威胁,其次,从数据加密; www.lunwenxlx.com 3. Why data encryption is no substitute for comprehensive security 为什么数据加密不能代替综合安全 binglan.blog.yesky.com 4. The Application of a Genetic-Based Algorithm in Computer Data Encryption 一个基于遗传算法在计算机数据加密的应用 www.ilib.cn 5. Application of Technology of Compounding Data Encryption in Government Capital Management System 组合数据加密技术在资金管理系统中的应用 www.ilib.cn 6. Design of Hard Disk Data Encryption System and Its Implementation Using FPGA 硬盘数据加密系统的设计及其FPGA实现 www.ilib.com.cn 7. A Property of the Integer and Its Application in Data Encryption 整数的一条性质及其在数据加密中的应用 service.ilib.cn 8. A Brief Analysis on Data Encryption's Application in Electronic Business Transaction Security 浅析数据加密技术在电子商务交易安全中的应用 ilib.cn 9. Data Encryption Technology and Its Trend of Development 数据加密技术及其发展趋势 www.ilib.cn 10. Implementing Data Encryption and Decryption Methods for. Net Framework 下数据加解密方法的实现 service.ilib.cn 1. Application of Data Encryption Technology in Electronic Commerce 数据加密技术在电子商务中的应用 ilib.cn 2. Implementation of embedded VPN gateway based hardware data encryption 基于硬件加密的嵌入式VPN网关实现 service.ilib.cn 3. Discussion on Asymmetric RSA Algorithm Application in Data Encryption 非对称RSA算法用于数据加密的相关技术探讨 www.ilib.cn 4. Data Encryption Algorithm and The Generation and Operation of Great Primes 数据加密算法与大素数的生成及运算 service.ilib.cn 5. An Analysis of Data Encryption Technology of Network Information Security 网络信息安全的数据加密技术 ilib.cn 6. Talking about Application of Data Encryption Technology 浅析数据加密技术的应用 ilib.cn 7. Data Encryption Technology in Electronic Commerce 电子商务中的数据加密技术 buyerinfo.cn 8. Data Encryption and Network Transmission with Public Key Algorithm 用公开密钥算法实现数据的网上加密传输 ilib.cn 9. Application of Coupled Toggle Cellular Automata in Data Encryption 耦合触发元胞自动机在数据加密中的应用 kimberye.bokee.com 10. Design and Implementation of Hard Disk Data Encryption Using FPGA Technology 基于FPGA芯片的硬盘数据加密设计与实现 qianliemao.cn 1. An Implementation Scheme of Virtual-Optics Based Data Encryption System 一种虚拟光学数据加密的系统实现 www.ilib.cn 2. Data Encryption and Decryption of Synergetic Cognitive Model 协同认知模型数据加密和解密方法 www.ilib.cn 3. Design and Implement of a Data Encryption Algorithm Based on Chaotic Sequence 基于混沌序列的数据加密算法设计与实现 www.ilib.cn 4. DES Data Encryption and Decryption Technology in Computer Network 计算机网络中DES数据加密和解密技术 www.ilib.cn 5. Data Encryption Applied in Banks'Online Transaction Systems 数据加密技术在银行联机交易交换处理系统中的应用 service.ilib.cn 6. The Application of Data Encryption in the Electronic Commerce Security 数据加密技术在电子商务安全中的应用 ilib.cn 7. Application of Data Encryption Standard in Management of Invoice 数据加密标准在发票管理中的应用 www.ilib.cn 8. Data encryption standard ( DES ) is the most widely used encryption system 数据加密标准(DES)是使用最广泛的加密体制, zhidao.baidu.com 9. Method, technique and application of data encryption 数据加密的方法、技术与应用 ilib.cn 10. The Application of Data Encryption in Missile's Telemetering System 信息保密技术在导弹遥测系统中的应用 www.ilib.cn 1. Research on data encryption and decipher techniques in network game 网络游戏中数据加密与解密技术的研究 www.ilib.cn 2. Brief Commentary on 21st Century European Data Encryption Stand ard Candidate Algorithms 欧洲21世纪数据加密标准候选算法简评 service.ilib.cn 3. Data encryption technology for character data in dataBase 数据库中字符型数据的加密技术 service.ilib.cn 4. A Data Encryption Storage Strategy of Office Automation System 一个办公自动化系统的数据加密存储策略 www.ilib.cn 5. The Research of a New Data Encryption Method Based on Network Transmission 一种基于网络传输数据加密新方法的研究 www.ilib.cn 6. The Public-key Cryptography of Data Encryption 数据加密中的公开密钥算法 www.ilib.cn 7. Technology of Key Management And Exchange in Data Encryption 数据加密中的密钥管理和协商技术 www.ilib.cn 8. Data Encryption Techniques and E-commerce Security 数据加密技术与电子商务安全 ilib.cn 9. Overview of Transparent Data Encryption 透明数据加密概述 www.zw1840.com 10. Data encryption technology in databases 数据库中的数据加密技术 www.ilib.cn 1. The Application of Data Encryption in the Network Security Center 数据加密在网络安全中的应用 www.ilib.cn 2. The Security Defence of Network and Technique of Data Encryption 网络安全防御中数据加密技术的研究 ilib.cn 3. Analysis on the Data Encryption Method and Calculation 数据加密方法及算法简析 www.ilib.cn 4. Realization of the Method of Data Encryption in ATM Network ATM网络中数据加密方法研究与实现 service.ilib.cn 5. Discussion on Data Encryption of Computer Network 计算机网络数据加密的探讨 service.ilib.cn 6. Analysis of Data Encryption Techniques 数据加密技术分析 ilib.cn 7. Application of Data Encryption and Compression Technology Based on Java in Secure File Cryptosystem 基于Java的数据加密压缩技术在安全文件系统中的应用 www.ilib.cn 8. The research of data encryption in interactive cable TV system 交互式有线电视系统中数据加密的研究 ilib.cn 9. The Comparison of some Commonly- used Data Encryption Algorithms 几种常用数据加密算法的比较 www.ilib.cn 10. Statistical analysis on S-box of data encryption standard 关于数据加密标准中S-盒的统计分析 www.ilib.cn 1. Hardware and Driver Design of a Data-encryption Card Based on PCI 基于PCI总线的数据加密卡及驱动程序设计方法 unixhosting.cn 2. Data Encryption Standard for Cipher Block 密码块链接的数据加密标准 edocs.bea.com.cn 3. Discussion of ENC data encryption system 电子海图数据加密体系的探讨 www.ilib.cn 4. Design and implement of network communication system based on data encryption 基于数据加密的网络通信系统的设计与实现 www.ilib.cn 5. Study on Data Encryption Technology of WMAN 无线城域网数据加密技术研究 www.ilib.cn 6. Data Encryption Scheme of Network Based on RSA and Advanced Encryption Standard 基于RSA和高级数据加密标准的网络数据加密方案 service.ilib.cn 7. A Study on Data Encryption in Network Security 网络安全中的数据加密技术研究 ilib.cn 8. Brief Analysis on Data Encryption 数据加密技术浅析 www.ilib.cn 9. Realization and Design of Data Encryption for IC Card Based on Chaotic Stream Ciphers 基于混沌密码流的IC卡数据加密算法设计与实现 service.ilib.cn 10. On The Technology of Data Encryption 浅谈数据加密技术 www.ilib.cn 1. Implement for Key Exchange Agreement in Data Encryption Based on JCE 基于JCE的数据加密密钥交换实现技术 www.ilib.cn 2. A High -speed Method of RSA Algorithm in Data Encryption RSA数据加密的一种快速实现算法 www.ilib.cn 3. Data Encryption Technology and Comparison among Kinds of Encryption Systems 数据加密技术及几种加密体制的比较 www.ilib.cn 4. Research and realization of data encryption based on Java 基于Java的信息加密技术的研究与实现 scholar.ilib.cn 5. Design of Data Encryption Card Based on RSA Algorithm 基于RSA算法的数据加密卡的设计 ilib.cn 6. A data encryption scheme based on hyperelliptic curve 一种基于超椭圆曲线的数据加密方案 www.ilib.cn 7. A Kind of Data Encryption Scheme Based on the Tensor Product of Matrices 基于矩阵张量积的数据加密方案 scholar.ilib.cn |
随便看 |
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。