encryption

美 [ɛnˈkrɪpʃən]英 [ɪnˈkrɪpʃ(ə)n]
  • n.加密;加密(技)术
encryptionencryption

noun

1
the activity of converting data or information into code
Synonym: encoding

数据来源:WordNet

  1. " This is a brand-new salvo in the war against encryption , " Mr. Opsahl said .

    “这是反加密方发起的一场全新的攻击,”奥普萨尔说。

  2. " A comparison point is in the 1990s battles over encryption , " said Kurt Opsahl , general counsel of the Electronic Frontier Foundation , a privacy watchdog group .

    “可与之相比的就是,20世纪90年代有关加密的争夺战,”库尔特·奥普萨尔说道,他是隐私监督组织电子前沿基金会的法律总顾问。

  3. Apple 's stance on these issues emerged post-Snowden , when the company started putting in place a series of technologies that , by default , make use of encryption to limit access to people 's data .

    苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司采用了一系列的技术,这些技术在默认情况下将使用者的薮据加密,限制他人访问。

  4. The order essentially asks Apple to hack its own devices , and once it is in place , the precedent could be used to justify law enforcement efforts to get around encryption technologies in other investigations far removed from national security threats .

    这项命令本质上是要求苹果公司入侵自己的设备,一旦这样做了,那么在那些并未涉及国家安全威胁的调查中,这个先例就会绕过加密技术的执法行动提供正当理由。

  5. Computer security technology includes mainly : Authentication , Encryption , Access Control , Auditing and so on .

    计算机网络安全技术主要有:认证授权、数据加密、访问控制、安全审计等。

  6. The software used for Siemens S7-300 encryption logic block declassified .

    此软件用于对西门子S7-300加密逻辑块解密。

  7. The Research of a New Data Encryption Method Based on Network Transmission

    一种基于网络传输数据加密新方法的研究

  8. Security Model of Transmission and Encryption in Mobile Agent System

    移动代理系统中的传输加密安全模型

  9. An Audio Based Information Encryption Method and Its Implementation

    一种基于声音的信息隐藏方法及其实现

  10. Security property of a class of digital chaotic encryption system

    一类数字混沌加密系统的安全性分析

  11. A New Encryption Algorithm for Digital Video Based on Pseudo-Random Sequence

    基于伪随机序列的视频图像加密新算法

  12. Data Encryption Research in Distributed Computer Network

    分布式计算机网络数据加密研究

  13. The first test shows the impact of port encryption on server performance .

    第一个测试显示端口加密对服务器性能的影响。

  14. The encryption certificate could not be found on this machine .

    在这台计算机上找不到加密证书。

  15. So pivotal information encryption becomes the nuclear problem of information security .

    因此,对关键信息进行加密成为了信息安全的核心问题。

  16. But , shared key encryption has a small problem .

    但是,共享密钥加密存在一个小问题。

  17. Application on Key Management in Database Encryption

    密钥管理在数据库加密中的应用

  18. The Design and Implementation of a Practical Facsimile Encryption System

    一种实用传真加密系统的设计与实现

  19. Optical Hierarchical Image Encryption by Use of Iterative Fourier Transform Algorithm

    用迭代傅里叶变换算法实现光学分级图像加密

  20. Research on Chaos Encryption Theory and Key Technology for Wireless Micro-Sensor Network

    无线微传感器网络混沌加密理论及其关键技术研究

  21. Image Encryption and Security Verification A Brief Review on Security of Digital Image

    光学图像的保密和安全检查数字图像安全技术研究进展

  22. Study on the Application of Chaotic Sequence Encryption

    混沌序列加密算法应用研究

  23. The methods of encryption techniques and their applications

    浅谈加密技术的方法及应用

  24. O Computer encryption will continue to expand as a major trend .

    o计算机加密将依然是主流趋势。

  25. Discussed the application of the DES encryption system in the military communication station .

    探讨了DES加密系统在军事通信总站内的应用。

  26. Chaotic encryption system of real-time voice signal based on DSP / BIOS

    基于DSP/BIOS的实时语音混沌加密系统

  27. It puts forward an available means based on analyzing the encryption of CD data .

    在综合分析光盘数据加密方法的基础上提出了一种有效的加密方法。

  28. The security encryption level is not known .

    安全加密级别是未知的。

  29. Data encryption is a standard feature .

    数据加密是一个标准功能。

  30. Encryption transference of image is one important branch in computation encryption communication .

    图像加密传递是计算加密通讯中的一个重要研究分支。