快好知 kuaihz


encryption造句
(121) Hardware encryption has high security because this method can relieve burden of MPU and has physical protection layer. (122) The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus. (123) RSA algorithm analysis application , appraisal document RSA encryption algorithm application of the feasibility and significance. (124) Encrypted cryptographic key, which need to be saved in the extern media, was encrypted with Password-Based Encryption technology and was saved in the computer file system. (125) Such juggling is required in order to have good encryption response time without the need to send the shared secret out of band. (126) SSL is a protocol that supports authentication and data encryption. (127) And the result has all-important guidable meaning for us to use these sequences as keys for data multiple encryption based on simple XOR operation. (128) Cryptography curriculum design to achieve DES encryption and decryption functions. (129) Encryptor understands XPath expressions in order to identify the XML element for encryption. (130) A complete data encryption system must consists of a reliable authentication mechanism and an encryption algorithm. (131) Removable media protection Secures data on removable media such as USB connected storage devices and disks by encryption and password protection. (132) Combining logic encryption card for children immunity and inoculability with COS for social security is meaningful to improve the using rate of smart card and Information resource. (133) As a common storage management technology, encryption technology which attached in backup and recovery technology is also in rapid progress, and produced a large number of new research results. (134) Double - click encryption has been declassified as long as the target easily get input a password. (135) Another popular secret - key cryptosystem is International Data Encryption Algorithm ( IDEA ). (136) In order to protect the security of VoIP transmission, it is necessary to encrypt the voice data and voice compression at low bit rate is chosen for decreasing the large computation of encryption. (137) The security services provided by JSSE consist of the transport-level message integrity and confidentiality (encryption), server authentication, and optional client authentication. (138) ASP.NET 2.0 is slated to support XML encryption for sensitive sections of configuration files—a really handy feature for the connection string section in machine.config. (139) Aiming at thee-mail security requirement in the OA system the article proposes the method of encryption and data signature. This method is based on the widely used email encryption software PGP. (140) Data encryption is one of the key technologies in network security. (141) The proposed method includes two processes of encryption and decryption. (142) Both devices have a hardware encryption engine for data security. (143) Publicly revealing an encryption key does not thereby reveal the correspongding decryption decryption. (144) However, authentication, encryption and encapsulation can be performed by many different technologies. (145) Such as the use of parallel computing, hardware redundancy, fail to deal with, and information encryption and firewall technology to meet this demand. (146) As application field of cryptography, nonreversible algorithm and hardware encryption technique will also be the essential technology in future. (147) The results of experiment specify the security of the scheme, which is the linkup of Digital Signature technology, Digital Encryption technology and Digital Watermark technology. (148) Based on the DSP hardware, a novel encryption algorithm is designed, which can penetrate through RPE-LTP vocoder in GSM voice channel. (149) We are no longer using the IANA type; instead, we are using the type that XML Encryption has specified. (150) If an eavesdropper captures messages moving through the network, the encryption makes it impossible (or at least prohibitively expensive) to convert the data to usable plain text.