| 1. | Varying use of multiple encryption techniques on the network 使用网络上多种不同的加密技术 |
| 2. | Uniform use of available encryption technique 统一使用已有的加密技术 |
| 3. | Application of encryption technique in security login of mis system 系统安全登录中加密技术的应用研究 |
| 4. | In addition , the data encryption techniques provide a security of the voice transmission 另外,数据加密选项可以为语音传输提供安全性保障。 |
| 5. | Apply encryption techniques to protect sensitive data transmitted over public networks and the internet 要先以加密技术保护敏感的数据,然后才透过公共网络及互联网进行传送。 |
| 6. | Encryption techniques have been applied to ensure secured data transmission in certain cases as specified in our website 在某些于我们网站明示之情况下,保密技术将被使用以确保资料传送之安全。 |
| 7. | In order to ensure the security and confidentiality of personal data we collect , encryption techniques have been applied for data transmission 为了确保个人资料的保安及保密,我们采用了加密法传输所收集的资料。 |
| 8. | For this purpose , after deeply researched encryption and comparison , we use combination encryption technique to optimize cryptography 为此,我们深入研究加密算法,对多种算法进行了优劣性比较,用组合密码技术来优化和强化加密算法。 |
| 9. | These problems major included problems of the encryption techniques in the process of data transmission , numerical underwrite and safety in the partially component j2ee 这些安全问题主要包括数据加密传输问题、数字签名问题和部分j2ee组件的安全问题。 |
| 10. | After analysis of protecting and cracking encryption technique of software , the paper presents a software protection technique using cpld ( complex programmable logic device ) 本文在分析软件保护技术与破解技术的基础上,研究了用cpld来实现软件保护技术。 |