Call signs , code words , today's encryption keys!
呼叫代号、暗语 、 还有今天的密钥!
电影对白
Secondly, it introduces XML Encryption , XML Signature, WS - Security and WS - License specifications.
然后介绍XML Encryption 和XMLSignature技术, 以及WS -Security 和WS-License规范.
互联网
Computer security technology includes mainly: Authentication, Encryption, Access Control, Auditing and so on.
计算机网络安全技术主要有: 认证授权(Authentication) 、 数据加密(Encryption) 、 访问控制(AccessControl) 、 安全审计(Auditing)等.
互联网
MPEG 2 encoding and decoding the encryption of C source files.
本代码是MPEG2的编码的加密和解码的C源程序!
互联网
Key management is critical technic of realizing database encryption.
密钥管理是实现数据库加密的关键技术.
互联网
Encryption systems and their ilk are technologies of disconnection.
加密系统还有它们的同类都是隔离的技术.
互联网
It explores the essential technique of key management in security encryption.
探讨了安全加密系统中必须的密钥管理技术.
互联网
It mainly includes symmetric encryption algorithms and asymmetric cryptographic algorithms and protocols.
密码技术主要包括对称密码算法和非对称密码算法及协议.
互联网
Encryption technique is the key technology of the ear of information.
加密技术是信息时代的关键技术.
互联网
This paper discusses a algorithm of file encryption based on random factor.
本文提出一种基于随机码数列的文件加密算法.
互联网
Drop rate of Encryption Method skills has been increased.
加密技术的技能书掉率增加.
互联网
Software encryption has been realized by using EEPROM in the paper.
本文采用EEPROM串行存储器 件设计软件狗来实现软件加密.
互联网
Shows whether the user - defined function was created with an optional encryption parameter.
显示用户定义函数是否是用可选加密参数创建的.
互联网
The former symmetric encryption algorithms use substitution and transposition techniques.
原有对称加密算法采用置换与替换技术.
互联网
SMIME is an encryption and digital - signature standard for e - mail .
SMIME是 电子邮件 的加密和数字签名标准.
互联网
"A comparison point is in the 1990s battles over encryption," said Kurt Opsahl, general counsel of the Electronic Frontier Foundation, a privacy watchdog group.
2017年12月六级真题(第三套)阅读 Section BApple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
2017年12月六级真题(第三套)阅读 Section BThe order essentially asks Apple to hack its own devices, and once it is in place, the precedent could be used to justify law enforcement efforts to get around encryption technologies in other investigations far removed from national security threats.
2017年12月六级真题(第三套)阅读 Section B