「ENCRYPTION」の共起表現(2語右で並び替え) - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > ENCRYPTIONの意味・解説 > ENCRYPTIONに関連した共起表現

「ENCRYPTION」の共起表現一覧(2語右で並び替え)

該当件数 : 171



PDF support includes transparency, encryption and a large set of the PDF 1.4 spec as well
End-to-end encryption using a combination of Blowfish and RSA algo
ion uses a 64-bit block cipher algorithm for encryption and a proprietary compression algorithm.
All protocols offer OpenSSL encryption for additional security.
Optional archive encryption using AES (Advanced Encryption Standard) wit
communication encryption with AES, serpent, CAST-256, IDEA or Blowfis
Support for encryption algorithm AES, Twofish, Serpent, including t
The Advanced Encryption Standard algorithm (AES - derived from the R
Voodoo's method of encryption encrypts all transfers of data from the prog
ission, which is to encrypt, using a digital encryption key, all the files it finds on computer driv
torage features such as backup and recovery, encryption, deduplication and provisioning.
les comprise logging functionality, Blowfish encryption, user and channel management, away functiona
virus control), personal firewall, antispam, encryption, antispyware, and parental control.
oftware development to security, a number of encryption implementations and early static analysis to
also claims to have written an "unbreakable" encryption program, and made predictions for the year 2
ipher which was a candidate for the Advanced Encryption Standard, and he is one of the designers of
8 contained sophisticated communications and encryption technology, and because portions of the debr
password being examined (including both the encryption algorithm and key), and comparing the output
example, required security tokens, supported encryption algorithms, and privacy rules) and how to as
Control over the SSH encryption key and protocol version.
he US government allows the export of 56-bit encryption software, and stronger encryption software f
rates with Nautilus, gedit and Evolution for encryption, decryption and other operations.
the Data Protection API can enable symmetric encryption of any kind of data; in practice, its primar
In fact, certain artificial signature and encryption schemes are known which are proven secure in
plained that once the extension and filename encryption tables are known, restoration is possible.
XML Digital Signature and encryption of Atom documents
Internet users to trust one another through encryption and authentication.
, 2010: Acquired Mobile Armor; an innovative encryption specialist based in St. Louis, Missouri, USA
Alix proposed a controversial scheme for DRM encryption of BBC content, which was the subject of a 4
Opportunistic encryption can be used to combat passive wiretapping.
d its receiver and then attempt to crack the encryption key being used to secure wireless communicat
As of June/2007, OpenPGP encryption is being implemented.
d 31 of the NLFSR state as its inputs during encryption and bits 0, 8, 19, 25 and 30 during decrypti
he bits of the NLFSR state (bits 0 and 16 on encryption and bits 31 and 15 on decryption) and with a
SecureIM is an encryption system built into the Trillian Instant Messe
n scrambling system was a form of television encryption developed by Oak Industries in the early 198
atible with containers used by SecuBox (disk encryption software by Aiko Solutions)
easiest way to enable opportunistic website encryption is by using self-signed certificates, but th
phers that support single pass authenticated encryption and can operate as collision-resistant hash
ted using what was then the standard default encryption mode, CBC.
Fileystem encryption has certain advantages and disadvantages ove
FreeOTFE originally offered encryption using cipher-block chaining (CBC) with encry
rs/software developers and new users to file encryption by combining strong encryption methods and a
er, which was a finalist for NIST's Advanced Encryption Standard competition (with Bruce Schneier, J
ddy is a simple software application for the encryption and compression of computer files to make th
FreeOTFE is an open source on-the-fly disk encryption (OTFE) computer program for PCs running Micr
encryption of credit card information
compliance and regulatory agencies requiring encryption for data at rest including, Health Insurance
Encryption - Data stored by the service is encrypted.
rted features include resultset caching, SSL encryption, custom data source, dbShield
Building in Big Brother: The Encryption Policy Debate (Editor), Springer-Verlag, New
GP SDK which provides signing, verification, encryption, and decryption of files.
wn as web optimization or fast web viewing), encryption, and decryption of PDF files.
Palcrypt is an open source single file encryption and decryption program.
FileVault-On the fly encryption and decryption of a user's home folder
They also handled encryption and decryption.
It is an authenticated encryption algorithm designed to provide both data auth
his smart card, various cryptographic tasks ( encryption, decryption, digital signing/verification, a
of operation specifically designed for disk encryption (see disk encryption theory).
ouble Latte, Stock Options, Sea of Cubicles, Encryption, Firewall, El Camino Real, The Sysadmin, and
FOPE also offers policy-based encryption of email messages.
, which uses cloud computing and 128-bit SSL encryption to enable users to send and receive large da
However, the key used for encryption is established using a Diffie-Hellmann Key E
r private or public anonymous proxy servers, encryption or even spoofing, diversion and obfuscation
eBook publishers, Baen flatly refused to use encryption or even Adobe's Portable Document Format (PD
branch added support for encryption, peer exchange, binary prefix, and UPnP.
File Encryption encrypts files and folders to secure from un
rcial software program for "on the fly" disk encryption (OTFE) for PC and PDA.
Scramdisk is a free OTFE (On-The-Fly Encryption) program for Windows 95, Windows 98 and Wind
overy requirements for the use of asymmetric encryption keys for security and authenticated transact
BestCrypt is a commercial disk encryption program for Windows and Linux, developed by
ware is also used as part of the CryptoStick encryption device from Research Triangle Software, Inc.
ing down a computer will usually discard the encryption keys from memory.
blic Key Infrastructure (PKI) and the use of encryption, Internet governance, intellectual property
ess keys can be protected by a wide range of encryption and hashing algorithms provided by the libgc
CLEARAID automatically reversed the encryption without having to contact the extortionist.
in obscuring information about the choice of encryption algorithm if that information is freely avai
While most disk encryption software implements different and incompatib
dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and l
it was first presented at the Fast Software Encryption workshop in Leuven in 1994, and first publis
ration, such as XTS, LRW and ESSIV (see disk encryption theory), in order to avoid watermarking atta
Shamir and Leonard Adleman developed the RSA encryption algorithm in 1977.
ion, WS-Security Signatures, and WS-Security Encryption and included Windows Keystore, Java Keystore
It specifically targets the weaknesses of LM encryption, and includes pre-computed data sufficient t
It is similar in function to other disk encryption programs including Microsoft's BitLocker.
This weakness affected many disk encryption programs, including older versions of BestCr
ng attacks are practical against a number of encryption algorithms, including RSA, ElGamal, and the
tary of Defense for Policy, concentrating on encryption and information assurance issues.
acking, budget management and tracking, file encryption, and investment portfolio management.
He worked for Network Associates on the PGP encryption software, is a member of the Shmoo Group, a
eta-documents include: posting of asymmetric encryption public keys, posting tokens that would be re
s, distributed link tracking, and file-level encryption, also known as the Encrypting File System (E
GPG Encryption with Kryptonite plugin
premium version of CRT with support for SSH encryption, SecureCRT later replaced the CRT product en
DirecTV transmits programming with encryption to mitigate signal piracy.
ng several ways to circumvent the VideoCrypt encryption system, most notably the Season7 smartcard e
Yet, it does make the encryption of most internet traffic easy to implement,
cryptographic library that has all the usual encryption algorithms needed by information security so
quipment such as network management systems, encryption and networking solutions for internet connec
rch areas including mathematics, statistics, encryption algorithms, neural networks, geophysics and
This is used when encryption is not a practical solution or in tandem wit
grapher at GCHQ who invented the widely-used encryption algorithm now commonly known as RSA, about t
servers receives another share of K and the encryption result of M using the key K , E(M,K).
Instant messaging encryption with Off-the-Record Messaging
It is also known for a series of high-speed encryption co-processors, offloading this processor-int
1960s-era encryption systems often included a punched card reader
The Pro version uses encryption and optional password protection to keep doc
It uses 256-bits AES encryption in order to encrypt messages, thus ensuring
Most disk encryption systems overwrite their cached encryption ke
esented in the paper Fast Hashing and Stream Encryption with PANAMA on the Fast Software Encryption
ate, then uses this state to perform a block encryption using part of the key, and uses the result o
RSA standard that governs the storage and encryption of private keys.
tions, keeps no logs and uses military-grade encryption to protect sources and other confidential in
Some users of GmailFS use filesystem-level encryption to protect the information they store with i
d, in 1973, what has become known as the RSA encryption algorithm, realising Ellis' idea.
Opportunistic Encryption (OE) refers to any system that, when connect
Protecting the stored values (e.g., using encryption and replicated storage).
hat two advanced features, disk-spanning and encryption, still require PKZIP.
published articles on Export Restrictions on Encryption became required reading at Harvard Law Schoo
f who downloads or shares files, with strong encryption to resist traffic sniffing.
Many "home grown" encryption algorithms reveal the key quite easily when
mpany announced that it would soon offer SSL encryption for search (although not enabled by default)
a product, typically a device that performs encryption or secure transactions, is tampered with dur
The service makes use of AES encryption for security, and uses data compression and
r Apple Mail that provides public key e-mail encryption and signing.
It is a form of disk encryption software similar to Microsoft's Encrypting F
wer trace from a smart card performing a DES encryption, the sixteen rounds can be seen clearly.
The channel also dropped its Videoguard encryption on Sky Digital on 1 July 2005, switching to
the government for permission to publish his encryption software, Snuffle, and a paper describing it
ryffen manages to alter Starkey's Department encryption code, so Starkey is no longer on the run, an
I, and cloud storage), data compression, and encryption, with specific support for Microsoft SharePo
novated in a variety of areas, including RSA encryption, the spreadsheet, the NuBus, the X Window Sy
ased access control to information, and full encryption of stored information and communications bet
crypt files with a strong, readily available encryption algorithm such that a low percentage (1% - 0
Mechanical encryption devices such as Enigma made these attacks mu
Unlike other Linux encryption solutions such as dm-crypt, eCryptfs uses Fi
If there's additional encryption by SYSKEY in the imported SAM file (it's on
PGP Virtual Disk is an on-the-fly encryption (OTFE) system that allows one to create a vi
Encryption of system and bootable partitions with pre-b
nearly impossible to stop the use of strong encryption for telephone communications.
on of the RSA Secret-Key Challenge, a 56-bit encryption algorithm that had a $10,000 USD prize avail
For coding for DRGs first encryption to the valid version of the ICD-10-GM is (cu
In addition the encryption using the AES 128 standard has been introduc
ing all the processing, mixing, encoding and encryption on the clients, relieving the servers and in
s such that each block depends on the proper encryption of the previous block.
If there is end-to-end encryption between the sender and the recipient, then n
er's logon secrets, or in the case of system encryption, using the system's domain authentication se
Encryption for the Masses (E4M) is a free disk encrypti
Ciright platform incorporates 512 bit encryption at the device level.
upports a unique type of system for wireless encryption using the powerful wpa supplicant.
ernet with computers aiding the users in the encryption of their interactions.
obtaining a password (either by cracking the encryption, or through social engineering).
Reversing password encryption (e.g., to obtain a password to try against a
10.6) with software tools for email and file encryption (similar to Gpg4win for Windows).
This is not the only attack that allows encryption keys to be read from memory-for example, a D
e wiretapper, on the other hand, can disrupt encryption negotiation to force an unencrypted channel.
t was the first open source transparent disk encryption system to support Windows Vista and PDAs.
the first cryptanalyses of the WEP wireless encryption protocol together with Ian Goldberg and Davi
ntext file is created and encrypted with the encryption method under attack, such that the first cip
It was revealed that the Xtraview Encryption System used to encrypt Red Hot could be bypa
This information might then reveal the encryption method used, some information about the encr
cure communication improvements (signing and encryption of user-defined SOAP headers, Kerberos Secur
IBM - IBM Database Encryption Expert uses Vormetric encryption technology
ection, intrusion prevention, email and file encryption, firewalls, VPNs, vulnerability, and scannin
This encryption system was discontinued by the mid-1990s in
sp supports image checksumming, compression, encryption as well as integration with Splashy.
, a watermarking attack is an attack on disk encryption methods where the presence of a specially cr
If two parties use an encryption system, which encrypts a message M of length
tates S1, S2 and S3) is generally unsafe, as encryption keys will remain in the computer's memory, a
ned by aspects of WS-Security, including XML Encryption and XML Digital Signatures.
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS