Database encryption technology is a good method of realizing database information security.
数据库加密技术是实现数据库信息安全的一种有效方法.
互联网
This paper researches database encryption technologies, and the database encryption technology that generates subkey is disussed.
文章研究了数据库加密技术, 着重探讨了生成子密钥的数据库加密技术.
互联网
This paper presents a Micro - payment protocol used for Mobile Electronic Trade with symmetry encryption technology.
文章用对称密码技术给出一套较完整的移动电子商务中安全微支付方案.
互联网
In addition the 2 - dimensional barcode also may use encryption technology, which enables the counterfeit goods.
此外,二维条形码洋还可拔存加密技艺, 使商品的防伪本能机能不小幅调矮.
互联网
When authenticating, introduction key encryption technology in LASA , satisfactorily solve security of transmitting user's encryption key.
在验证过程中, LASA又引入公钥加密技术, 圆满解决了用户加密密钥传递的安全性.
互联网
VPN consists of three parts: the tunnel, the data encryption technology and user authentication.
VPN由三个部分组成: 隧道技术, 数据加密和用户认证.
互联网
This Paper focuses on the research of encryption technology and adaptive adjusting mechanism of data communication.
该文研究了视频数据加密技术以及数据传输速率动态调整机制.
互联网
The All - in - One Journal uses an advanced encryption technology for the security of your Journal entries.
所有在 - 一本杂志采用了一种先进的加密技术,为您的安全日志项目.
互联网
Encryption technology can be divided into two categories: symmetric and asymmetric encryption technology , encryption technology.
加密技术可以分为两类: 对称加密技术和非对称加密技术.
互联网
XML encryption technology is an important guarantee for the security of XML technology.
XML加密技术是保证XML安全的一种重要技术.
互联网