Communications are made secure the moment they leave the BlackBerry device through encryption.
信息经过黑莓设备加密后从黑莓手机传送出去是安全的。
In addition, the grid application must handle both symmetric and asymmetric encryption schemes.
此外,网格应用程序必须处理对称及非对称的加密方案。
Conventional algorithms are symmetrical and rely on the same key for encryption and decryption.
常规算法是对称的,对于加密和解密都依赖于同一钥匙。
The security properties of this connection have been reset to the available encryption strengths.
此连接的安全属性被重设为使用可用的加密强度。
This paper introduces a number of encryption and decryption technologies on commonly used software.
介绍常用软件加密和软件破解的一些方法。
Bulk Encryption Simultaneous encryption of all channels of a multichannel telecommunications trunk.
集中加密多信道电信中继线中所有信道同时加密。
At present, the encryption technology is maturer and maturer, and new algorithm is created every day.
当前的加密技术日趋成熟,加密算法层出不穷。
Defined by the application and used in conjunction with connector applications or message encryption.
数据库镜像可与复制一起使用以确保发布数据库可用。
Lock encryption software for encryption and decryption, the protection of software system procedures.
加密锁用于软件加密和解密,保护软件系统程序。
Article 10 The State Encryption Administration shall distribute projects in the form of task document.
第十条国家密码管理局采用任务书得形式下达项目。
A couple of years ago May wrote a manifesto to alert the world to the advent of widespread encryption.
几年前,梅曾经写过一个宣言,让世界警惕广泛加密的到来。
Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption.
公钥加密湜使苚弌对非对称菂密钥加密或解密菂技术。
The combination of encryption algorithm and the key length governs the strength of the encryption type.
加密算法和密钥长度的组合决定加密类型的强度。
There are also software encryption packages which are available either commercially or as free software.
也可买到软件加密程序包或作为自由软件免费获得。
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
密码技术主要包括对称密码算法和非对称密码算法及协议。
The assembly language programming uses in the document content encryption and the decipher procedure, Asm.
汇编语言程序编写的用于文件内容的加密和解密程序。
Actually, program is a shell for freely distributed encryption library from Legion of the Bouncy Castle.
其实,程序是一个免费分发从充气城堡军团加密库外壳。
Adding encryption to a database application will almost certainly decrease performance, at least minimally.
在数据库应用程序中增加加密或多或少要降低性能。
An authenticated encryption scheme based on self certified of public key from bilinear pairings is proposed.
提出了一种基于双线性对和公钥自证明得认证加密方案。
A mutual authentication protocol based on public key encryption is presented for mobile communication system.
给出了一个基于公开密钥加密得认证协议。
File content was encrypted with fast symmetrical encryption algorithm, and every file had one encryption key.
文件内容用快速得对称算法加密,并且一文件一密钥。
Its realization foundation is encryption algorithm which using publickey encryption algorithm and hash function.
其实现基础是加密算法技术,使用公钥加密算法和散列函数。
The combination of algorithm and the key length results in having stronger encryption, medium encryption, and weak encryption.
算法和密钥长度的组合产生强加密、中等加密和弱加密。
Encryption technology can be divided into two categories symmetric and asymmetric encryption technology, encryption technology.
加密技术可以分为两类对称加密技术和非对称加密技术。
Canadians who have signed up for a free Internet postbox can get their mail through any computer that has an Internet browser equipped with 128-bit encryption.
那些注册了一个免费互联网邮箱的加拿大人,可以在任何一台装置有互联网浏览器配有128节的编码器的电脑上接收他们的邮件。
英文例句大全为您提供encryption英文例句大全,encryption英文造句,关于encryption的英语句子,单词encryption怎么造句,encryption英文例句大全有哪些,哪些英语句子是关于encryption,英语单词encryption的句子,单词encryption如何造句,encryption怎么造句等。