Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
There are a few ways to tell if a site is using a data encryption scheme.
The response is more pervasive use of data encryption technologies.
In fact, a strenuous debate is under way over which data encryption standard to support.
Data encryption keys should be updated on a regular basis.
This can be achieved with data encryption and proper media handling policies.
I just wish there were better local data encryption options available for mobile devices.
Data encryption is a higher level of security.
"There are real issues we'll have to deal with," among them hearings on Internet privacy, data encryption and support for basic research.
Very large Fermat primes are of particular interest in data encryption for this reason.
The next few screens offer up various options for data encryption:
The most effective measures for reducing this risk include data encryption and a firewall.
One of the more commonly used techniques to defeat computer forensics is data encryption.
Data encryption alone cannot be used to prevent this as the authorities have the right to demand decrypted information.
The White House and several foreign governments are restricting the use of private data encryption software.
The cards can also contain data encryption programs to help foil telephone eavesdropping.
These creeps would never get past the password protections and data encryption routines.
IN terms of its ability to raise the nation's blood pressure, the debate over data encryption has not yet reached the same levels as gun control.
Most of it appears to be a remarkably complex form of data encryption."
"Is he using a dictionary or has he actually reversed the data encryption algorithm?"
It was privacy protected with 40-bit data encryption.
The data encryption keys are randomly generated at dataset creation time.
The program looks for repeated sequences of numbers or letters and replaces them with an icon, a process similar to data encryption.
It was meant to be a replacement for the Data Encryption Standard.
Industry standard data encryption is also used.
There is also data encryption and the use of indirect connections to exchange data between peers.