Examples of using Encryption technology in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Similarly, because it is unable to acquire the encryption technology necessary for electronic commerce, Cuba is prevented from fully participating in the programme carried out by the International Telecommunication Union.
We use advanced encryption technology(SSL) to securely transmit your personal and credit card information.
Several of the companies also are introducing more encryption technology to shield their users' data from government spies and other prying eyes.
However, because of the impact of hacker attacks is very difficult to eliminate completely, you must know that there is no permanent security encryption technology.
Most people's knowledge of fingerprints is limited to the encryption technology used to identify the identity.
Most people's knowledge of fingerprints is limited to the encryption technology used to identify identity.
BitFlyer claim to use higher strength encryption technology than major financial institutions in its communications with customers.
BitFlyer uses higher strength encryption technology than major financial institutions in its communications with customers.
In terms of security, the luxury smartphone has an encryption technology that“prevents SMS and call records from leaking”.
In a statement, Google said it had taken pains to build custom encryption technology that ensures the data the company receives remains private and anonymous.
XyKey is a simple and easy to use password management tool, it uses secure encryption technology helps you encrypt and manage critical account data.
Nevertheless, we assure you that all these are constantly monitored and protected by our advanced encryption technology, the kind used by banks and financial companies.
Al Qaeda's use of advanced encryption technology dates to 2007, when the Global Islamic Media Front released the Asrar al-Mujahedeen, or so-called“Mujahedeen Secrets,” software.
Silicon Labs' wireless devices and MCUs also come with software to efficiently use advanced encryption technology, enabling secure communications, firmware updates and many other benefits.
All strong encryption technologies are subject to export regulations.
The comments highlight law enforcement's frustration with encryption technologies that protect data so that neither Apple nor law enforcement can easily read it.
While some encryption technologies are purpose-built to offer security options to AV professionals, sometimes they are also used to simply reduce openness.
Penetration testing, encryption technologies, the rapid issue of firmware updates and dispelling fears of“back doors” became the norm.
You could create and possess encryption technologies within the USA but not export them to other countries.
Use encryption technologies and secure containers(protected areas on mobile devices used to isolate sensitive information) to protect the data;