单词 | Encryption |
例句 | (1) It is currently illegal to export this encryption technology from the US. (2) Encryption systems and their ilk are technologies of disconnection. (3) Preventive measures include data encryption using various cryptographic methods. (4) Encryption is vitally important to on-line commerce. (5) This means that multiple encryption / decryption need not be done at every intermediate point. (6) A smart card computes a password or encryption key and furnishes it directly to the computer for the logon procedure. (7) They warned that commercially available encryption software would be easily overcome by intelligence services. (8) Several implementations of these popular encryption techniques are currently employed. (9) Encryption and digital signatures are techniques to expand the dynamics of trust into a new territory. (10) Data encryption ensures the privacy and confidentiality of email messages. (11) The Leahy-Goodlatte Bills proposed easing export controls on encryption software to satisfy industry and civil libertarians. (12) Now encryption will cause the erosion of the current corporate monopoly on expertise and proprietary knowledge. (13) There have been many cases in which encryption has thwarted us big time. (14) Imagine the problems if all employees routinely used encryption and changed their passwords regularly-both are considered good practice in security-minded organizations. (15) But I also fear that this encryption stuff is so powerful it could blow up in my face. (16) Encryption techniques are used to verify digital signatures on business contracts. (17) The final deterrent to widespread acceptance of encryption is its difficulty to use. (18) Encryption technology is seen as a prerequisite for widespread commercial use of computer networks. (19) The broadcasting of a pay channel requires the encryption or scrambling of the signal on emission and the unscrambling on reception. (20) Unlike encryption, digital signatures are a recent development[http:///encryption.html], the need for which has arisen with the proliferation of electronic commerce. (21) People whose appetite for encryption may be thwarted righteously, effectively, and harshly. (22) Designed for hardware implementation, its operation is relatively fast and works well for large bulk documents or encryption. (23) Arthur Abraham, dressed in heavy studded black leather, reviews a recent technical paper on encryption. (24) A couple of years ago May wrote a manifesto to alert the world to the advent of widespread encryption. (25) The Clinton administration last week made a new offer to the computer industry on the issue of data encryption. (26) The need for securing the communications link between computers via encryption is expected to rise. (27) This second token is doubly encrypted, and users pass it along after peeling off one layer of encryption. (28) Secret-Key Cryptography Secret-key cryptography involves the use of a shared key for both encryption by the transmitter and decryption by the receiver. (29) As part of the registration process, you're provided with a unique encryption key. (30) Thus, banks suggest that each private key password also be used as an integral part of the encryption algorithm. (31) PGP is not the only encryption freeware. (32) The disk partition does not support file encryption. (33) A written Yulgang delphi encryption and decryption code. (34) Propose a synthetical method of data encryption. (35) The service most commonly used seems to offer good encryption of data in transit and at rest, but weak password security. (36) The direct file encryption system is realized based on OPENSSL including three major modules: user interface module, interface module, base encryption module. (37) The numerical data hideaway is the multimedia service one kind of effective encryption authorization technology. (38) VPN consists of three parts: the tunnel, the data encryption technology and user authentication. (39) Describes symmetric and asymmetric algorithms used for encryption and decryption. (40) The RDP protocol uses the RC4 symmetric encryption algorithm with up to 128 bit keys. The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used. (41) BOINC protects against several types of attacks. For example, digital signatures based on public-key encryption protect against the distribution of viruses. (42) PKI is an infrastructure that provides a full set of security toe-commerce and e-government obeying the standard public key encryption technique. (43) The BIG-IP LTM proxy server handled the caching, GZIP compression, and SSL encryption during these tests. (44) Public-key encryption solves the problem of managing several keys, but encryption is slow compared to conventional encryption. (45) End - to - End encryption is offered by TETRA to protect data during the entire transmission. (46) By using the well-known RSA public key encryption algorithm, this paper gives a newauthenticated encryption scheme based on the division of digital image. (46) try its best to gather and create good sentences. (47) There are specific cases where It'sense to use data encryption. (48) The transparent encryption is a kind of document encryption technology, which emerge in recent years because of the demand of the file security of the enterprise. (49) According to the above study, Chaos-based image array disturbed algorithm has been improved and a new image encryption system has been developed based on the improved algorithm. (50) Another popular secret - key cryptosystem is the International Data Encryption Algorithm ( IDEA ). (51) Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest. (52) Group encryption and decryption, group signatures such as multisignature etc. (53) Combining advantages of the RSA public-key encryption and pseudorandom generator technology, a privacy preserving distributed mining algorithm of association rules, PPD-ARBSM is proposed. (54) What is itsrelationship with the existed Data Encryption Standard ( DES )? (55) Finally, the parallel interface in EPP mode is designed and the whole data encryption system designing between FPGA and PC is given to carry out the verification of data encryption results. (56) Debit card bundled safe password, data encryption transmission prevention track card being copied. (57) RSA is the most influential public-key encryption algorithm, it can resist all known password attack so far, has been recommended for ISO public key data encryption standard. (58) The number of characters in your key depends on the encryption key length. (59) The difference is that the conversations are scrambled from end to end, using a special form of encryption called SCIP (secure communications interoperability protocol). (60) BlackBerry's nearly air-tight encryption has come under scrutiny in several overseas markets recently. (61) It also introduces the safety of programs including decompilation and code encryption. Moreover, it presents the codes of enciphered files based on VB program. (62) The machine has encryption functions. By pressing the locking key, it enters the machine into a protection status. Any key you press is ineffective. (63) It is also possible to use block analysis to determine the encryption key. (64) Encryption is a tool a black box solution to protecting your privacy. (65) The other one is to analyze Address Resolution Protocol(ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology. (66) Use this page to create, back up, or restore the encryption key. (67) An authenticated encryption scheme based on self certified of public key from bilinear pairings is proposed. (68) In the paper, public key encryption algorithm-RSA and the application in digital signature are mainly discussed and analysed. (69) Represents the base class for the Data Encryption Standard (DES) algorithm from which all DES implementations must derive. (70) IDEA encryption algorithm is data block encryption algorithm ( Cipher Block ) category. (71) Support file encryption, if you use encryption format, the saved file will be only accessed by your BB. (72) For symmetric encryption (see Resources), you need an encryption key in addition to the clear data being encrypted. (73) It then calls the encryption method getEncryptedData, which returns a Base 64 encoded cipher text string. (74) Practical design of a complete set of documents RSA encryption solution to achieve specific coding. (75) If you're so devil-may-care as to omit encryption, the suite warns you that your network isn't secure. (76) The first part gives with the encryption and decryption technology - related knowledge. (76) try its best to gather and build good sentences. (77) In the paper first the encryption algorithm is introduced based on the mathematical and theoretical introduction of the RSA algorithm theory, RSA algorithm and the parameter choices. (78) In terms of the difference between encryption key and decryption key, it can divide into symmetry cryptogram and public key cryptogram. (79) Utilizing the stretch and fold mechanism, an invertible map set based image encryption algorithm is proposed. (80) PKI is a basic platform for safe internet corresponding . It obeys the standard key encryption technique. (81) The short form of the cypherpunk's obsession with encryption can be summarized as: Pretty good privacy means pretty good society. (82) It has strongpoint of symmetry encryption scheme such as encryption speed and encrypt intensity, but also has advantage of public key encryption scheme on key distribution and key management. (83) Rijndael encryption algorithm is the grouping variable length block cipher. (84) The document then bounces between Tor servers in a random manner, using layers of encryption to obfuscate its source address. (85) Knapsack public-key cryptosystem is characterized by fast encryption and decryption. (86) Lastly, the mixed cryptogram arithmetic was implemented and applied into the application of email encryption. (87) In this paper, the safeness of data bank system, distributed bata bank and statistical data bank is studied. And the data encryption is also studied. (88) There is no valid encryption recovery policy configured for this system. (89) For example, the .Net MQ client does not have support SSL channel encryption, XA transactions, and channel compression. (90) For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode. (91) A new optical encryption technique based on double random phase computer-generated hologram of asymmetry fractional Fourier transform is presented. (92) As a new student he quickly picked up on the challenge laid out by Boneh to tackle the problem of homomorphic encryption. (93) The module of data encryption adopts Advantaged Encryption Standerd ( AES ). (94) Based on the features of initial value sensitivity, parameter sensitivity, ergodicity and random similarity, chaotic maps are now widely used in information encryption. (95) Traditional cryptographic encryption can achieve provable security but is unfortunately sensitive to a single bit error, which will cause an unreliable packet to be dropped creating packet loss. (96) Second, loop Chua's circuits has two regulated bifurcation parameter resistors, they play a part in encryption key parameters and increase the difficulty of unmasking signals. (97) If No. Why do you use encryption wireless local area network(WLAN)? (98) One concern with encrypting data on a tape cartridge is maintaining and managing copies of encryption keys for numerous tape cartridges encrypted with different encryption keys. (99) A new optical image encryption method using dissymmetrical fractional Fourier transform and double random phase encoding was presented. (100) Meanwhile, it is easy to discover cryptograph by traditional encryption technology by attacker and it affects security of information. (101) To construct the encryption mechanism of SS 7 signaling system , to improve transmission confidentiality. (102) Then, based on the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides. (103) Computer security technology includes mainly: Authentication, Encryption, Access Control, Auditing and so on. (104) In this article, it was adopt symmetric encryption DES (data encryption standard, DES) algorithm, To achieve higher security, we have developed triple DES algorithm, 3-DES is an upgrading of DES. (105) Privacy can be combated with encryption, but due diligence is required when selecting a cloud computing service. (106) In this paper, a permutation code security algorithm based on the block cipher that is widely used in the data transmission system is put up after carefully studied the current encryption methods. (106) Wish you can benefit from our online sentence dictionary and make progress every day! (107) Those critical of encryption might suggest that law-abiding citizens have nothing to hide, but that simply isn't true. (108) Represents the base class for Triple Data Encryption Standard algorithms from which all. (109) At last an implementation project of database encryption system and its main module are given. (110) Public-key encryption The key distribution problem has always been the weak link in the secret-key systems. (111) Some of these customers are charged by cycle consumption on the zSeries and have seen their chargeback accounts significantly increase as a result of the extra encryption work. (112) DES encryption and decryption system, including avalanche effect Differential analysis of the contents. (113) Cryptograph of block encryption appear one bit error, whole block cannot comeback. (114) Introduce the SSL protocol based on encryption algorithms and encryption protocol. (115) MPEG 2 encoding and decoding the encryption of C source files. (116) It is the symbol sequence controlling the operation of encryption transformation. (117) NET remote processing does not do authentication or encryption by default. (118) Shows whether the user - defined function was created with an optional encryption parameter. (119) I use a block cipher algorithm for encryption that requires the clear data bytes to be in blocks of 8 bytes, so I pad the last incomplete block with some characters. (120) It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols. (121) Hardware encryption has high security because this method can relieve burden of MPU and has physical protection layer. (122) The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus. (123) RSA algorithm analysis application , appraisal document RSA encryption algorithm application of the feasibility and significance. (124) Encrypted cryptographic key, which need to be saved in the extern media, was encrypted with Password-Based Encryption technology and was saved in the computer file system. (125) Such juggling is required in order to have good encryption response time without the need to send the shared secret out of band. (126) SSL is a protocol that supports authentication and data encryption. (127) And the result has all-important guidable meaning for us to use these sequences as keys for data multiple encryption based on simple XOR operation. (128) Cryptography curriculum design to achieve DES encryption and decryption functions. (129) Encryptor understands XPath expressions in order to identify the XML element for encryption. (130) A complete data encryption system must consists of a reliable authentication mechanism and an encryption algorithm. (131) Removable media protection Secures data on removable media such as USB connected storage devices and disks by encryption and password protection. (132) Combining logic encryption card for children immunity and inoculability with COS for social security is meaningful to improve the using rate of smart card and Information resource. (133) As a common storage management technology, encryption technology which attached in backup and recovery technology is also in rapid progress, and produced a large number of new research results. (134) Double - click encryption has been declassified as long as the target easily get input a password. (135) Another popular secret - key cryptosystem is International Data Encryption Algorithm ( IDEA ). (136) In order to protect the security of VoIP transmission, it is necessary to encrypt the voice data and voice compression at low bit rate is chosen for decreasing the large computation of encryption. (137) The security services provided by JSSE consist of the transport-level message integrity and confidentiality (encryption), server authentication, and optional client authentication. (138) ASP.NET 2.0 is slated to support XML encryption for sensitive sections of configuration files—a really handy feature for the connection string section in machine.config. (139) Aiming at thee-mail security requirement in the OA system the article proposes the method of encryption and data signature. This method is based on the widely used email encryption software PGP. (140) Data encryption is one of the key technologies in network security. (141) The proposed method includes two processes of encryption and decryption. (142) Both devices have a hardware encryption engine for data security. (143) Publicly revealing an encryption key does not thereby reveal the correspongding decryption decryption. (144) However, authentication, encryption and encapsulation can be performed by many different technologies. (145) Such as the use of parallel computing, hardware redundancy, fail to deal with, and information encryption and firewall technology to meet this demand. (146) As application field of cryptography, nonreversible algorithm and hardware encryption technique will also be the essential technology in future. (147) The results of experiment specify the security of the scheme, which is the linkup of Digital Signature technology, Digital Encryption technology and Digital Watermark technology. (148) Based on the DSP hardware, a novel encryption algorithm is designed, which can penetrate through RPE-LTP vocoder in GSM voice channel. (149) We are no longer using the IANA type; instead, we are using the type that XML Encryption has specified. (150) If an eavesdropper captures messages moving through the network, the encryption makes it impossible (or at least prohibitively expensive) to convert the data to usable plain text. (151) This paper also introduces Remote Authentication Dial In User Service(RADIUS) protocol and data packet encryption in detail. (152) Unconditionally secure asymmetric encryption schemes based on polynomials and cover free family ( CFF ) . (153) Smooth processing is very helpful for completion of encryption or decryption of speech signal. (154) This paper introduces the working principle of logic encryption card SLE4442 and its concrete application at spirometer, and also the design of a general IC card interface circuit. (155) Design a simple XML encryption mechanism and using it into SOAP message to make sure transmission security of SOAP. (156) The FCT is a file encryption tool designed by us for XENIX system. (157) They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one. (158) By studying and improving on ECC mainly, this article deals with the design and encryption algorithm implementation of a hybrid cryptosystem based on elliptic curve. (159) To structure frame, operation principle, CA of system, with dense, how dense work pattern and encryption algorithm and security , CA of system of system carry on research. |
随便看 |
|
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。