单词 | Data encryption |
例句 | 1. Preventive measures include data encryption using various cryptographic methods. 2. Data encryption ensures the privacy and confidentiality of email messages. 3. DES algorithm is a data encryption algorithm. 4. Propose a synthetical method of data encryption. 5. VPN consists of three parts: the tunnel, the data encryption technology and user authentication. 6. Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output. 7. There are specific cases where It'sense to use data encryption. 8. What is itsrelationship with the existed Data Encryption Standard ( DES )? 9. Debit card bundled safe password, data encryption transmission prevention track card being copied. 10. Cryptographic transform libraries in OpenBSD include Blowfish, Data Encryption Standard (DES), 3DES, and Cast. 11. Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive. 12. The data encryption transmission technology realized by hardware chip was adopted to realize hardware encryption, which was authenticated by the national cryptogram management committee. 13. The data encryption and digital signature based on encryption technique can overcome factors mentioned above. 14. DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits. 15. DES(Data Encryption Standard) encryption arithmetic has stood the long test from when it became the encryption standard to now. 16. For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode. 17. The Clinton administration last week made a new offer to the computer industry on the issue of data encryption. 18. This project adds the module of real - time data encryption on existing security protection system. 19. It uses public-key encryption algorithms for authentication and private-key for data encryption. This solution can provide reliable system security and avoid the deny of service of users. 20. DPU BES benchmark with hardware supported acceleration to deliver blazing data encryption performance. 21. Another popular secret - key cryptosystem is the International Data Encryption Algorithm ( IDEA ). 22. Finally, the parallel interface in EPP mode is designed and the whole data encryption system designing between FPGA and PC is given to carry out the verification of data encryption results. 23. This paper first researches the principle of encryption - decryption and the basic algorithm - Data Encryption Standard ( DES ). 24. One of the strongest encryption algorithms used by remote access authentication products is the widely tested and implemented industry-standard Data Encryption Standard (DES). 25. RSA is the most influential public-key encryption algorithm, it can resist all known password attack so far[/data encryption.html], has been recommended for ISO public key data encryption standard. 26. A private key encryption-decryption algorithm that uses a key that is twice the length of a Data Encryption Standard (DES) key. 27. Defines a wrapper object to access the cryptographic service provider (CSP) version of the Data Encryption Standard (DES) algorithm. 28. Demonstrates how to encrypt and decrypt strings using the Data Encryption Standard algorithm. 29. In some detail, the paper expounds the principle about simple power analysis(SPA) attacks against the general cryptography and a particular theory against data encryption standard (DES) algorithm. 30. In this paper, the safeness of data bank system, distributed bata bank and statistical data bank is studied. And the data encryption is also studied. 31. By considering data encryption standard algorithm, an improved method of the digital image encryption based on DES is proposed in this paper. 32. The module of data encryption adopts Advantaged Encryption Standerd ( AES ). 33. By comparison with Data Encryption Standard (DES), the concept to design new key generation algorithm of block ciphers was analyzed. 34. In this article, it was adopt symmetric encryption DES (data encryption standard, DES) algorithm, To achieve higher security, we have developed triple DES algorithm, 3-DES is an upgrading of DES. 35. This paper introduces the data encryption standard algorithm briefly, and discusses an IP-CORE design and the FPGA implementation of the algorithm. 36. Proposing a new data encryption algorithm based on multilayer feed forward neural networks. 37. Represents the base class for Triple Data Encryption Standard algorithms from which all. 38. Liberty offers Data Encryption Standard (DES) and Advanced Encryption Standard (AES) encryption with Over-the-air Rekeying (OTAR) and all of the typical features that are available in LMRs today. 39. Data encryption is one of the basic measures for computer system security defence. 40. Network security techniques include the authentication authorization, data encryption, access control, safe audit and so on. 41. The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus. 42. SSL is a protocol that supports authentication and data encryption. 43. This paper presents a scheme of electronic press issuing system, based on the technology of digital water-mark and data encryption. 44. A complete data encryption system must consists of a reliable authentication mechanism and an encryption algorithm. 45. Another popular secret - key cryptosystem is International Data Encryption Algorithm ( IDEA ). 46. Data encryption is one of the key technologies in network security. 47. American 20th century data encryption standard DES is so far usesbroadly,(http:///data encryption.html) discusses one of most block cipher algorithms. 48. The team also used its design to perform a mathematical operation that underlies to the algorithm with which a quantum computer might crack complex data encryption. 49. According to ATA protocol, PHES used hardware encryption method in FPGA to achieve the transparent data encryption and high data throughput rate by pipeline operation. 50. The Enterprise edition adds more security through advanced auditing and transparent data encryption, and data warehousing with ColumnStore, compression, and partitioning. 51. It also includes secure login, data encryption, and biometric authentication support. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。