「ENCRYPTION」の共起表現(2語左で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > ENCRYPTIONの意味・解説 > ENCRYPTIONに関連した共起表現

「ENCRYPTION」の共起表現一覧(2語左で並び替え)

該当件数 : 200



ate, then uses this state to perform a block encryption using part of the key, and uses the result o
wer trace from a smart card performing a DES encryption, the sixteen rounds can be seen clearly.
ission, which is to encrypt, using a digital encryption key, all the files it finds on computer driv
on of the RSA Secret-Key Challenge, a 56-bit encryption algorithm that had a $10,000 USD prize avail
In addition the encryption using the AES 128 standard has been introduc
140-2 compliant security model using AES 256 Encryption
compliance and regulatory agencies requiring encryption for data at rest including, Health Insurance
ion uses a 64-bit block cipher algorithm for encryption and a proprietary compression algorithm.
They also handled encryption and decryption.
, 2010: Acquired Mobile Armor; an innovative encryption specialist based in St. Louis, Missouri, USA
PGP Virtual Disk is an on-the-fly encryption (OTFE) system that allows one to create a vi
also claims to have written an "unbreakable" encryption program, and made predictions for the year 2
It is an authenticated encryption algorithm designed to provide both data auth
esented in the paper Fast Hashing and Stream Encryption with PANAMA on the Fast Software Encryption
torage features such as backup and recovery, encryption, deduplication and provisioning.
TLS, OpenPGP and end-to-end encryption support (OpenPGP not available under Windows
10.6) with software tools for email and file encryption (similar to Gpg4win for Windows).
servers receives another share of K and the encryption result of M using the key K , E(M,K).
ased access control to information, and full encryption of stored information and communications bet
ion, WS-Security Signatures, and WS-Security Encryption and included Windows Keystore, Java Keystore
ection, intrusion prevention, email and file encryption, firewalls, VPNs, vulnerability, and scannin
s, distributed link tracking, and file-level encryption, also known as the Encrypting File System (E
mbines features of Trinoo with TFN, and adds encryption.
GPGServices: A services menu (text and file encryption).
plained that once the extension and filename encryption tables are known, restoration is possible.
ications, client-side authentication and AES encryption.
inations of XML Digital Signature and/or XML Encryption
at avoids DHS monitoring using anonymity and encryption.
Internet users to trust one another through encryption and authentication.
password being examined (including both the encryption algorithm and key), and comparing the output
Building in Big Brother: The Encryption Policy Debate (Editor), Springer-Verlag, New
rted features include resultset caching, SSL encryption, custom data source, dbShield
e wiretapper, on the other hand, can disrupt encryption negotiation to force an unencrypted channel.
sp supports image checksumming, compression, encryption as well as integration with Splashy.
in obscuring information about the choice of encryption algorithm if that information is freely avai
BestCrypt is a commercial disk encryption program for Windows and Linux, developed by
8 contained sophisticated communications and encryption technology, and because portions of the debr
Compression and Encryption Support.
I, and cloud storage), data compression, and encryption, with specific support for Microsoft SharePo
tary of Defense for Policy, concentrating on encryption and information assurance issues.
d its receiver and then attempt to crack the encryption key being used to secure wireless communicat
obtaining a password (either by cracking the encryption, or through social engineering).
his smart card, various cryptographic tasks ( encryption, decryption, digital signing/verification, a
Triple DES strong encryption)
ion with Andrew Viterbi to develop satellite encryption devices.
ing down a computer will usually discard the encryption keys from memory.
hat two advanced features, disk-spanning and encryption, still require PKZIP.
For coding for DRGs first encryption to the valid version of the ICD-10-GM is (cu
the Data Protection API can enable symmetric encryption of any kind of data; in practice, its primar
ing all the processing, mixing, encoding and encryption on the clients, relieving the servers and in
SubRosaSoft Encryptor, file/folder encryption.
rates with Nautilus, gedit and Evolution for encryption, decryption and other operations.
GpgEX: a plugin for Windows Explorer (file encryption).
it was first presented at the Fast Software Encryption workshop in Leuven in 1994, and first publis
virus control), personal firewall, antispam, encryption, antispyware, and parental control.
You may choose from five different encryption algorithms (DES-64bit, 3DES-192bit, AES-256b
rcial software program for "on the fly" disk encryption (OTFE) for PC and PDA.
ddy is a simple software application for the encryption and compression of computer files to make th
premium version of CRT with support for SSH encryption, SecureCRT later replaced the CRT product en
Alix proposed a controversial scheme for DRM encryption of BBC content, which was the subject of a 4
imprinted with the programming code for RSA encryption, boasting "This shirt is a controlled muniti
Native support for PGP/GPG encryption
of operation specifically designed for disk encryption (see disk encryption theory).
Psi has built in GnuPG support for message encryption.
upports a unique type of system for wireless encryption using the powerful wpa supplicant.
the legal and technical aspects of full disk encryption.
les comprise logging functionality, Blowfish encryption, user and channel management, away functiona
Enigma - German message encryption equipment.
browser component, and OpenSSL or GnuTLS for encryption.
IBM - IBM Database Encryption Expert uses Vormetric encryption technology
ernet with computers aiding the users in the encryption of their interactions.
PDF support includes transparency, encryption and a large set of the PDF 1.4 spec as well
ned by aspects of WS-Security, including XML Encryption and XML Digital Signatures.
novated in a variety of areas, including RSA encryption, the spreadsheet, the NuBus, the X Window Sy
d 31 of the NLFSR state as its inputs during encryption and bits 0, 8, 19, 25 and 30 during decrypti
Instant messaging encryption with Off-the-Record Messaging
3) was a Swedish businessman and inventor of encryption machines.
If there is end-to-end encryption between the sender and the recipient, then n
SecureIM is an encryption system built into the Trillian Instant Messe
where E is the encryption function (cipher), and K1 and K2 are the two
The channel also dropped its Videoguard encryption on Sky Digital on 1 July 2005, switching to
As of June/2007, OpenPGP encryption is being implemented.
r Apple Mail that provides public key e-mail encryption and signing.
using the oracle's key, without knowing the encryption key.
GPGMail: A plugin for OS X Mail (email encryption).
Yet, it does make the encryption of most internet traffic easy to implement,
quipment such as network management systems, encryption and networking solutions for internet connec
This weakness affected many disk encryption programs, including older versions of BestCr
rch areas including mathematics, statistics, encryption algorithms, neural networks, geophysics and
Voodoo's method of encryption encrypts all transfers of data from the prog
er Areas, and A Discussion About Modern Disk Encryption Systems.
While most disk encryption software implements different and incompatib
Most disk encryption systems overwrite their cached encryption ke
er, which was a finalist for NIST's Advanced Encryption Standard competition (with Bruce Schneier, J
ng attacks are practical against a number of encryption algorithms, including RSA, ElGamal, and the
oftware development to security, a number of encryption implementations and early static analysis to
Message Obfuscating and Encryption (incl.
It is also known for a series of high-speed encryption co-processors, offloading this processor-int
nformation which reduces the security of the encryption scheme.
ark Washburn that used a form of polymorphic encryption.
n scrambling system was a form of television encryption developed by Oak Industries in the early 198
cts (e.g. it only allows the use of AES-256 encryption.)
It is a form of disk encryption software similar to Microsoft's Encrypting F
City, and he is a proponent of opportunistic encryption.
The service makes use of AES encryption for security, and uses data compression and
It specifically targets the weaknesses of LM encryption, and includes pre-computed data sufficient t
eta-documents include: posting of asymmetric encryption public keys, posting tokens that would be re
nearly impossible to stop the use of strong encryption for telephone communications.
er's logon secrets, or in the case of system encryption, using the system's domain authentication se
overy requirements for the use of asymmetric encryption keys for security and authenticated transact
ouble Latte, Stock Options, Sea of Cubicles, Encryption, Firewall, El Camino Real, The Sysadmin, and
he US government allows the export of 56-bit encryption software, and stronger encryption software f
mpany announced that it would soon offer SSL encryption for search (although not enabled by default)
All protocols offer OpenSSL encryption for additional security.
FOPE also offers policy-based encryption of email messages.
, a watermarking attack is an attack on disk encryption methods where the presence of a specially cr
FreeOTFE is an open source on-the-fly disk encryption (OTFE) computer program for PCs running Micr
g the theory that the code is a One-time pad encryption algorithm.
easiest way to enable opportunistic website encryption is by using self-signed certificates, but th
Optional archive encryption using AES (Advanced Encryption Standard) wit
FreeOTFE originally offered encryption using cipher-block chaining (CBC) with encry
Scramdisk is a free OTFE (On-The-Fly Encryption) program for Windows 95, Windows 98 and Wind
It is similar in function to other disk encryption programs including Microsoft's BitLocker.
Unlike other Linux encryption solutions such as dm-crypt, eCryptfs uses Fi
phers that support single pass authenticated encryption and can operate as collision-resistant hash
gmail: The Mozilla Thunderbird plugin (email encryption).
pts of the sounds of cleartext printing from encryption machines.
DirecTV transmits programming with encryption to mitigate signal piracy.
ng, instead teaching himself programming and encryption.
r private or public anonymous proxy servers, encryption or even spoofing, diversion and obfuscation
SHA-1, SHA-256/392/512 etc.) and public key encryption algorithms.
the government for permission to publish his encryption software, Snuffle, and a paper describing it
ess keys can be protected by a wide range of encryption and hashing algorithms provided by the libgc
crypt files with a strong, readily available encryption algorithm such that a low percentage (1% - 0
published articles on Export Restrictions on Encryption became required reading at Harvard Law Schoo
This information might then reveal the encryption method used, some information about the encr
CLEARAID automatically reversed the encryption without having to contact the extortionist.
Reversing password encryption (e.g., to obtain a password to try against a
hoosing the key length of the RSA public-key encryption scheme.
atible with containers used by SecuBox (disk encryption software by Aiko Solutions)
Secure File Encryption
In fact, certain artificial signature and encryption schemes are known which are proven secure in
XML Digital Signature and encryption of Atom documents
GP SDK which provides signing, verification, encryption, and decryption of files.
SMEG is an acronym for Simulated Metamorphic Encryption Generator.
Palcrypt is an open source single file encryption and decryption program.
ted using what was then the standard default encryption mode, CBC.
ryffen manages to alter Starkey's Department encryption code, so Starkey is no longer on the run, an
RSA standard that governs the storage and encryption of private keys.
Support for encryption algorithm AES, Twofish, Serpent, including t
branch added support for encryption, peer exchange, binary prefix, and UPnP.
TextCrypt, text encryption.
This is not the only attack that allows encryption keys to be read from memory-for example, a D
a product, typically a device that performs encryption or secure transactions, is tampered with dur
The Advanced Encryption Standard algorithm (AES - derived from the R
ware is also used as part of the CryptoStick encryption device from Research Triangle Software, Inc.
In cryptography, the Tiny Encryption Algorithm (TEA) is a block cipher notable fo
cryptographic library that has all the usual encryption algorithms needed by information security so
to the development process for the Advanced Encryption Standard (AES)."
d, in 1973, what has become known as the RSA encryption algorithm, realising Ellis' idea.
ng several ways to circumvent the VideoCrypt encryption system, most notably the Season7 smartcard e
on of cryptsetup, using dm-crypt as the disk encryption backend.
It was revealed that the Xtraview Encryption System used to encrypt Red Hot could be bypa
gn of LOKI and the cryptanalysis of the Data Encryption Standard.
s such that each block depends on the proper encryption of the previous block.
He worked for Network Associates on the PGP encryption software, is a member of the Shmoo Group, a
ipher which was a candidate for the Advanced Encryption Standard, and he is one of the designers of
grapher at GCHQ who invented the widely-used encryption algorithm now commonly known as RSA, about t
Cryptophane is a GUI frontend for the GnuPG encryption software.
GnuPG: the core; this is the actual encryption tool
Control over the SSH encryption key and protocol version.
Shamir and Leonard Adleman developed the RSA encryption algorithm in 1977.
FileVault-On the fly encryption and decryption of a user's home folder
If there's additional encryption by SYSKEY in the imported SAM file (it's on
rs/software developers and new users to file encryption by combining strong encryption methods and a
eBook publishers, Baen flatly refused to use encryption or even Adobe's Portable Document Format (PD
example, required security tokens, supported encryption algorithms, and privacy rules) and how to as
acking, budget management and tracking, file encryption, and investment portfolio management.
dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and l
t was the first open source transparent disk encryption system to support Windows Vista and PDAs.
4344, The Secure Shell (SSH) Transport Layer Encryption Modes
tates S1, S2 and S3) is generally unsafe, as encryption keys will remain in the computer's memory, a
If two parties use an encryption system, which encrypts a message M of length
blic Key Infrastructure (PKI) and the use of encryption, Internet governance, intellectual property
Some users of GmailFS use filesystem-level encryption to protect the information they store with i
However, the key used for encryption is established using a Diffie-Hellmann Key E
urce to the general public which used strong encryption.
This is used when encryption is not a practical solution or in tandem wit
tions, keeps no logs and uses military-grade encryption to protect sources and other confidential in
, Blowfish, Twofish, CAST, and various other encryption methods.
The Pro version uses encryption and optional password protection to keep doc
wn as web optimization or fast web viewing), encryption, and decryption of PDF files.
the first cryptanalyses of the WEP wireless encryption protocol together with Ian Goldberg and Davi
f who downloads or shares files, with strong encryption to resist traffic sniffing.
only available to authorised users with the encryption keys.
rotect PDF files during creation with 128/40 encryption.
ntext file is created and encrypted with the encryption method under attack, such that the first cip
vides great flexibility to the user with its encryption options.
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS