encryption

encryption

美 [ɪn'krɪpʃ(ə)n]  英 [ɪn'krɪpʃ(ə)n]

  • n.〔计〕加密
  • 网络数据加密;加密技术;资料加密

英汉解释

n.
1.
〔计〕加密

例句

You did not select an encryption key for the recipient of this message; therefore, the message will not be encrypted.

没有为此信件收件人选择密密因此无法加密信件

As should by now be obvious, appropriate key management procedures should be part of the core design of any encryption implementation.

现在应该清楚恰当管理规程应该成为任何加密实现核心设计部分

We recommend using one of these encryption methods for the connections between computers in a replication topology.

建议复制拓扑计算机之间连接使用这些加密方法之一

Make sure that you use an encryption API that does not require the key to be stored somewhere and is not derived from the users password.

确保使用加密API需要其他位置存储密钥并且不是用户密码派生

There is no form of data encryption used, given that this is intended to be used in a public setting.

只要公共场合不会使用数据加密形式

Adding encryption to a database application will almost certainly decrease performance, at least minimally .

数据库应用程序增加加密或多或少降低性能

Certificates are also used for authentication and encryption to help secure communications between a Client Access server and clients.

证书用于身份验证加密帮助保护客户端访问服务器客户端之间通信

You did not select an encryption key for any of the recipients of this message; therefore, the message will not be encrypted.

没有为此信件任何一个收件人选择密密因此无法加密信件

Specify encryption algorithm (-ea) This option allows you to choose a strong encryption algorithm to encrypt your new database.

指定加密算法(-ea)选项允许选择用于加密数据库高度加密算法

You did not select an encryption key for yourself (encrypt to self). You will not be able to decrypt your own message if you encrypt it.

没有自己选择加密自己加密)。如果邮件加密的话自己无法解密邮件

Encryption has been used for thousands of years to secure data.

数千人们长期使用加密保护数据

If the portion of traffic that requires encryption is relatively small, carving out a separate class of service for it might be appropriate.

如果需要加密流量部分相对较小划出单独服务分类也许适当

I really like this feature, but after adding it to the installation the request to enter the encryption key is far from obvious.

非常喜欢这个特性但是安装这个设置输入密密请求无从找寻

Digital signatures require the use of two distinct but mathematically-related encryption keys known as a public key and a private key.

数字签名需要使用两个一个公钥一个私钥

No matter how much encryption you use, leaving that vulnerability open won't help a bit.

无论使用多少加密公开弱点没有一点好处

Because separate keys are used for encrypting and decrypting messages, this form of cryptography is called asymmetric encryption.

由于使用不同密匙进行加密解密消息因此这种形式加密称为对称加密

You did not select encryption keys for some of the recipients; these persons will not be able to decrypt the message if you encrypt it.

没有信件其中几位选择加密因此如果加密信件的话几位可能无法解密

Try to use built-in primitives instead of building your own construction out of an encryption algorithm and a hash function.

尝试使用内置原语而不是加密算法杂凑函数建构自己构造

One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

使用公用安全性系统之一PKI公用密钥基础),一种用于PDA智能电话安全性加密技术

If it gets stolen or accidentally left somewhere, it can be accessed if it has no sort of encryption or locking device.

如果万一硬盘或是偶然别处里面数据一览无余

Encryption can be applied to files or to information exchanged over a network connection.

可以通过网络连接交换文件信息进行加密

Data encryption is of little use unless you apply it to specifically mitigate a risk or to address a legal requirement.

数据加密用处不大除非应用特定减轻风险加密风险应用法律要件

They can probe for flaws in a cryptographic algorithm before maliciously modifying them to turn a strong encryption into a weaker one.

他们可以寻找密码算法缺陷然后恶意修改它们加密算法

In the case of Israel, security and encryption was always a strength, but that's not the growth industry that it was.

以色列案例安全加密技术一直他们强项不是过去一样增长行业

Encryption Even if intruders manage to break through a firewall, the data on a network can be made safe if it's encrypted.

加密即使入侵者设法突破防火墙如果网络数据加密就能使安全

The KDC supplies the ME with single-sign-on credentials in the form of a Key Encryption Key (KEK).

KDCME提供密密KEK形式登录证书

Likewise, if you write down your pass phrase and stick it on a post-it note on your monitor you might as well not use encryption at all.

此外如果喜欢密码便笺然后粘贴显示器那么干脆不要加密

Standard PDF Encryption with owner and user passwords used to be the only PDF protection.

标准PDF加密用来保护PDF格式唯一拥有用户密码

Similarly, the encryption and validation keys and the encryption scheme and validation scheme used for cookie data must be exactly the same.

同样用于Cookie数据加密验证密钥以及加密方案验证方案必须完全相同

You might hear this referred to as "setting up the encryption domain" for the firewalls.

可能听到称之为防火墙设置加密”。

Because nonrepudiation is a direct result of authentication, message encryption also does not provide nonrepudiation.

由于认可身份验证直接结果因此邮件加密提供认可

Determines whether the content of this partition should be overwritten with random data before setting up the encryption.

决定建立加密是否使用随机数据覆盖分区内容

Outlook does not allow you to use Basic authentication when connecting to your RPC proxy server without using SSL encryption.

使用SSL加密连接RPC代理服务器Outlook禁止使用基本身份验证

The associated username value identifies the key (for signing) or certificate (for encryption) within that store to be used for processing.

关联用户指定存储使用密钥用于处理签名证书用于处理加密)。

Thomas, passive RFID tags is very easy to counterfeit, because they do not contain the traditional encryption and security protocols.

Thomas教授RFID标签容易伪造因为它们含有传统加密算法安全协议

Disk Encryption's easy-to-use interface makes selecting and encrypting a drive, a breeze.

磁盘加密易于使用界面使选择加密驱动器一个轻而易举

The government has no legal instrument to compel the manufacturer of the American encryption system or Dantas to give the access codes.

政府没有可以迫使美国加密系统生产商或者Dantas本人交出密码法律文书

This means that it's at least theoretically possible to specify encryption or signing on a per-message basis.

意味至少理论上可以消息基础指定加密签名

Encryption strength is no longer restricted by the United States government.

加密力度不再美国政府限制

Encrypting view state data can affect the performance of your application, so do not use encryption unless you need it.

对视状态数据进行加密影响应用程序性能因此除非确实需要否则不要使用加密