文件加密 的英文怎麼說

中文拼音 [wénjiànjiā]
文件加密 英文
html password lock
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  1. The encryption method is n ' t considered the characteristic of the video signal, regard the image data file as the general binary scale data file to encrypt

    一是用純碼演算法技術,將圖像數據當作一般的二進制數據進行
  2. This study is a post - cruise study of this leg, calcareous nannofossil samples from sites 1146, 1147 and 1148 of leg 184 were analyzed to provide a high - resolution biostratigraphy for this leg and to investigate morphological variation of coccolith genus gephyrocapsa. the main results of this study are : 1. 12 late pliocene to pleistocene bio - events were recognized and 6 zones of martini ( 1971 ) were determined for the upper sediment sequences of sites 1146 and 1148

    作為大洋鉆探項目船下后續研究的一部分,對184航次中的1146站位和1147 、 1148站位的樣品進行了分析和研究,在船上科學家已經建立起的地層框架的基礎上進一步采樣,對生物事標志化石類別進行數量統計,進一步確定了12個生物事在鉆孔中的深度,建立起了兩個站位的高解析度的鈣質超微化石生物地層框架。
  3. Be especially cautious before encrypting data in files close to maximum file size

    所以在已經接近最大大小的中的數據時,要特別小心。
  4. The paper discussed the following four points : the security of java, the implemention of mvc pattern and the principle and implemention of the send and incept of e - mail based on java ; the principles and implemention of smtp, pop3 and imap, and the characteristic of the e - mail server sendmail, qmail and postfix ; the principles and implemention of symmetrical encryption and unsymmetrical encryption technology, and the advantages and disadvantages of them ; the characteristic of rubbish e - mail, and the principles and implemention of anti - rubbish e - mail technology

    研究的主要內容包括: java技術安全性, java對mvc模式的實現,以及java技術解決電子郵發送和接收問題的原理和實現方法;電子郵相關協議smtp , pop3和imap的原理和實現方法,以及電子郵服務器sendmail 、 qmail和postfix的特點;對稱與非對稱技術的原理和實現方法,以及兩者的優點和缺點;典型垃圾郵的特徵,以及反垃圾郵技術的原理和實現方法。
  5. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條下,保護數據和信息最行之有效的方法就是將它們后再存儲在數據庫中,因為的數據和信息,即使被竊取、被拷貝、被截獲,獲取者因無法破解竊取的而無從知曉它們對應的機數據。
  6. In the end, quick implementation of kasumi, f8 and f9 are simulated under the condition of windows 98 with celeron 633 and 128m memory, the simulation data show that the f8 algorithm is capable of achieving the encryption rate up to 1. 9mbit / s, while f9 algorithm only takes 20ms to compute the mac with the length of 5114 bits, both of which can reach the basica requirement of 3g

    在本的最後我們對kasumi , f8演算法和f9演算法的快速實現進行了具體的模擬, f8演算法的具體實現是在windows98 ,賽揚633mhz和128m內存的環境下其速率可以達到1 . 9mbps ,而f9演算法在同樣的條下計算5114比特的字元串的消息認證碼所需時間僅為20毫秒,這些速率基本上可以滿足3g中高速率傳輸的要求。
  7. Encrypts the whole package by using a key based on the user profile

    使用基於用戶配置整個包。
  8. File encryption, which greatly enhances security.

    文件加密,它極大地增強了安全性。
  9. Enforced file encryption for transmission

    強制工作站文件加密傳輸
  10. Design and implementation of encryption for programs based on keeloq technology

    技術的文件加密設計與實現
  11. This paper discusses a algorithm of file encryption based on random factor

    提出一種基於隨機碼數列的文件加密演算法。
  12. Encrypts a file so that only the account used to encrypt the file can decrypt it

    將某個文件加密,使得只有的帳戶才能將其解
  13. Plugged in the expansion slot, it can be used to encrypt executable documents of dos, win16 and win32

    插於計算機的擴展槽,能對dos win16位win32位可執行文件加密
  14. File to produce an xml - encrypted file, which can then be sent to the publisher s sales department

    文件加密,以產生xml,這樣就可以發送到出版社的銷售部門。
  15. Encryption level can be divided into software level, hardware level, soft - hardware level, user can select encryption level

    文件加密的安全程度有軟體級,硬體級,軟硬雙重級,安全級別可以自行選擇
  16. How can i view my encrypted e - supplementary form if i have chosen to encrypt it using the " encrypt " function

    如曾經使用電子表格程式的功能把文件加密儲存,我應該怎樣做才可開啟該份已
  17. The ntfs file system includes many performance enhancements and new features such as per - user disk quotas and file encryption

    Ntfs系統也包含許多增強性能和新功能,例如對每個用戶的磁盤限額、文件加密等。
  18. Benefit from the digital lock ' s ability for multiple encryption of selected files - encrypt a file more than once and use different combinations of passwords and encryption algorithms for added control

    受益於數字鎖定的執政能力,對于多重選定的-一個多於一次,並用不同的組合,碼和演算法,用於新增的控制。
  19. Sparkey usb dongle based on usb port, it is very small and elegant, plug and play, offers multiple envelopes protection with strong anti - dump function, offers api, user define algorithm, file protection, encode and decode function etc

    鎖基於usb介面,體積小巧,即插即用,強度高,提供高強度多層殼外殼,各類型文件加密,提供api函數調用介面和碼解碼等功能。
  20. Spark pc lock is special designed to protect your individual information security of your pc. it offers encrypted disk protection, log on function and files folders encryption etc. it is cost - low and very ease of use for everybody

    Spark pc lock是一種基於硬體身份認證方式的桌面數據安全保護系統,它提供鎖機器,保險箱,網路屏蔽,網站過濾,文件加密等功能。
分享友人