encryption

[ɪn'krɪpʃn]
  • encryption
  • n.

    编密码;加密;

纠错 数据更新时间:2025-11-24 20:51:49
  • 近义词
1、

Computer security technology includes mainly: Authentication, Encryption, Access Control, Auditing and so on.

计算机网络安全技术主要有:认证授权、数据加密、访问控制、安全审计等。

互联网摘选

2、

Conventional network security techniques such as firewall and encryption technique have limited defense effects, and all of them belong to the category of static security techniques whose implementation and maintenance need manual work.

虽然传统的防火墙、加密等信息安全技术有一定的防御作用,但都属于静态安全技术范畴,需要人工来实施和维护。

互联网摘选

3、

It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.

密码技术主要包括对称密码算法和非对称密码算法及协议.

互联网摘选

4、

He explains that such a move is needed for homomorphic encryption and cloud security.

他解释说这样一个动态之所以被需要是出于单态加密(homomorphic encryption)和云安全性的考虑。

互联网摘选

5、

Encryption systems and their ilk are technologies of disconnection.

加密系统还有它们的同类都是隔离的技术.

互联网摘选

6、

It explores the essential technique of key management in security encryption.

探讨了安全加密系统中必须的密钥管理技术.

互联网摘选

7、

Drop rate of Encryption Method skills has been increased.

加密技术的技能书掉率增加.

互联网摘选

8、

The order essentially asks Apple to hack its own devices, and once it is in place, the precedent could be used to justify law enforcement efforts to get around encryption technologies in other investigations far removed from national security threats.

这项命令本质上是要求苹果公司入侵自己的设备,一旦这样做了,那么在那些并未涉及国家安全威胁的调查中,这个先例就会绕过加密技术的执法行动提供正当理由。

六级真题- 2017年 12月 3卷 信息匹配

9、

Key management is critical technic of realizing database encryption.

密钥管理是实现数据库加密的关键技术.

互联网摘选

10、

During compression process, the ciphertext's quality is controlled by the encryption quality factor.

在压缩编码过程中,通过加密质量因子控制对多媒体敏感参数的加密强度,从而实现对密文质量的控制。

互联网摘选

11、

TRNG can be a element of the SoC ( System-on-Chip) design by developing it as a IP ( Intellectual Property) which is used by the encryption modules.

将真随机数发生器开发成IP(Intellectual property),就可以使得它作为SoC(System-on-Chip)信息安全设计的一个设计元素,为各加密模块所用。

互联网摘选

12、

Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.

苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司采用了一系列的技术,这些技术在默认情况下将使用者的薮据加密,限制他人访问。

六级真题- 2017年 12月 3卷 信息匹配

13、

Secondly, it introduces XML Encryption , XML Signature, WS-Security and WS-License specifications.

然后介绍XML Encryption 和XMLSignature技术, 以及WS -Security 和WS-License规范.

互联网摘选

14、

Shows whether the user-defined function was created with an optional encryption parameter.

显示用户定义函数是否是用可选加密参数创建的.

互联网摘选

15、

SMIME is an encryption and digital-signature standard for e-mail .

SMIME是 电子邮件 的加密和数字签名标准.

互联网摘选

16、

"A comparison point is in the 1990s battles over encryption," said Kurt Opsahl, general counsel of the Electronic Frontier Foundation, a privacy watchdog group.

“可与之相比的就是,20世纪90年代有关加密的争夺战,”库尔特·奥普萨尔说道,他是隐私监督组织电子前沿基金会的法律总顾问。

六级真题- 2017年 12月 3卷 信息匹配

17、

So-called perfect secret system means that when translator occupy all encryption technologies and own the infinite calculation resources, he can't still calculate out the true key.

所谓的完善保密是指破译者在占有全部密码算法且拥有无限计算资源的前提下也不能有效地求出密钥。

互联网摘选

18、

Call signs , code words , today's encryption keys!

呼叫代号、暗语 、 还有今天的密钥!

电影对白

19、
20、

The former symmetric encryption algorithms use substitution and transposition techniques.

原有对称加密算法采用置换与替换技术.

互联网摘选

21、

Encryption technique is the key technology of the ear of information.

加密技术是信息时代的关键技术.

互联网摘选

22、

Conventional network security techniques ( such as firewall, encryption technique etc) have limited defense effects, but all of them belong to the category of static security techniques, their main drawback is that their implementation and maintenance need manual work, and cannot actively follow intruder.

虽然传统的网络安全技术(如防火墙、加密技术等)有一定的防卫作用,但都属于静态安全技术范畴,静态安全技术的缺点是需要人工来实施和维护,不能主动追踪侵入者。

互联网摘选

23、

The Study of Encryption Mechanism in Digital Trunking Communication System

数字集群通信系统加密机制的研究

互联网摘选

24、

Described the architecture design, module partition, theory of system work of SATA ⅱ interface encryption and decryption chip.

介绍了SATAⅡ加解密接口芯片的系统总体设计、模块划分、系统工作原理。

互联网摘选

25、

MPEG 2 encoding and decoding the encryption of C source files.

本代码是MPEG2的编码的加密和解码的C源程序!

互联网摘选

26、

Research of the Security of Iris Recognition Based on Composite Chaos Encryption

基于复合混沌加密的虹膜识别安全性研究

互联网摘选

27、

Encryption can be found almost everywhere in the operating system, from file transfers to file systems to networking.

几乎可以在该操作系统的任何地方找到加密处理,从文件传输到文件系统,乃至网络。

互联网摘选

28、

Software encryption has been realized by using EEPROM in the paper.

本文采用EEPROM串行存储器 件设计软件狗来实现软件加密.

互联网摘选

29、

This paper discusses a algorithm of file encryption based on random factor.

本文提出一种基于随机码数列的文件加密算法.

互联网摘选

30、

Traditional network security technologies are data encryption, access control, firewall and intrusion detection system, but these methods have some disadvantages.

传统的计算机网络安全方案主要有数据加密、访问控制、防火墙和入侵检测系统等,上述方法都存在着一些不足之处。

互联网摘选

  • 相关词组
  • 今日热词
  • 热门搜索

纳米英语英语词典(dict.nm3.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈