Consider the need for authentication , authorization , data privacy , and data integrity requirements 考虑身份验证、授权、数据保密和数据集成的需求。
We take the issue of confidentiality and data protection extremely seriously and the chosen outsourcer is contractually obliged to do likewise 我们会严肃地对待这些信息并遵循数据保密准则。而且被我们选中的外包服务公司也将依据合同负有此义务。
In real wireless network application environment , these technologies must be combined to integral secure transport protocol to implement data encryption and authentication 而在真正的无线网络应用环境中,需要把两者结合起来,形成完整的安全传输协议,以实现数据保密、身份认证等功能。
Security needs are also driven by the marked rise in identity theft , by increased concerns about the privacy of personal data , and simply by general demand from customers and vendors 身份窃取事件的显著增多,人们对个人数据保密的日益关注,以及客户和供应商的普遍需要,都导致了对安全性的需要。
All our employees who have access to , and are associated with the processing of personal data , are obliged to respect the confidentiality of official business matters , including personal data 责成能存取个人数据以及与处理个人数据有关的所有雇员遵守官方公务的保密原则,包括对个人数据保密。
With the development of the internet , the security of computer security is playing an important role . one means of providing security in communications is though encryption 随着计算机联网的逐步普及,计算机信息的保密问题显得越来越重要。数据保密变换,或密码技术,是对计算机信息进行保护的最实用和最可靠的方法。
The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm , md5 one - way hash function and permutation code at the same time 保密散列数字签名算法利用rsa公钥密码体制的原理、 md5单向散列函数和排列码加密的思想,构造了一种能够快速实现数据保密、数字签名的签名方案。
In this paper , the encrypted intensity and digital verify capacity of secrecy transfers system has promoted a lot compared to wep . comparing to tkip , the speed is faster and also the agility is better 本文数据保密传输系统的加密强度和数据校验能力相比wep来说有了很大提高,同tkip比,它的速度要快于tkip ,且它灵活性要优于tkip 。
Finally , chaotic digital sequences were applied to secrecy comrnunication among ic card system . the system model was designed and a simulation analysis for the secrecy coininunication with computer was also given 最后,从安全通信的角度考虑,提出将混沌数字序列应用于读卡器系统的数据保密通信中去,并设计了实现模型,进行了计算机保密通信模拟仿真。