Примеры использования Encrypted data на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
Encrypted data on what?
It's used for extracting encrypted data.
Encrypted data and access only on a password basis.
Global Regulation on Encrypted Data Protection.
Encrypted data like this is gonna take at least two minutes.
Люди также переводят
H' TPI CG:Tag for encrypted data cryptogram.
The encrypted data becomes unverifiable by network nodes.
I have been spending hours trying to crack the last wall in this encrypted data code.
He can route encrypted data and stay anonymous with no IP address.
Create an HTTPS binding for the site that will host the encrypted data.
To manipulate encrypted data, enter the application PIN code.
The connection fails if the VPN server does not support encrypted data.
Your encrypted data is passed on to the VPN server you're connected to.
The representatives of Antista AS do not have any access to the respective encrypted data.
We need the encrypted data from Captain Holland's flight the night he died.
Anyway, the briefcase with Simon's bible and Barrett's encrypted data-- it's missing.
Encrypted data and the key used to encrypt data are both unintelligible.
MMh' LPI CG: length of returned encrypted data different of original Le of the command due to padding.
Encrypted data can be stored both locally, on the user's device, or synchronized across the network.
The unlock process is the part of the drive's power-on activity that enables access to the encrypted data.
All encrypted data can usually be cracked with enough computing resources.
There's even a double encryption option which sends encrypted data to not only one but two separate servers.
The encrypted data returned contain a first byte indicating the used padding mode.
GhostBear: Helps avoid firewall detection by making encrypted data appear as regular data. .
Compressing encrypted data can increase the data file size instead of decreasing it.
The construction starts from a somewhat homomorphic encryption scheme,which is limited to evaluating low-degree polynomials over encrypted data.
Encryption for Security Encrypted data is routed through a crypto unit into the synchronous DTE port of the RM4.
FreeOTFE can be used in"portable"(or"traveller") mode, which allows it to be kept on a USB drive orother portable media, together with its encrypted data.
For maximum privacy of user's encrypted data VIPole servers are strongly protected by a sophisticated access system.
It is possible to create a one-way strong RNG that will allow for a person, knowing a certain secret, to recover all the keys that weregenerated by it and to consequently compromise encrypted data.