Examples of using Secure key in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Intel Secure Key.
A secure key management is essential to protect cloud data.
(a) AFISM-CAR will conduct expansion operations to secure key areas;
One is secure key storage.
IKEv2 on its own is just a tunneling protocol,providing a secure key exchange session.
Secure key management is essential to protecting data in the cloud.
All rooms are fitted with secure key card systems and can be reached by elevator.
SoftLayer recently released a product called Cloud HSM for secure key management in the cloud.
The hostel uses a secure key card system and offers large lockers for every guest.
If you simplify PKI- which serves as the infrastructure for the entire SSL/TLS ecosystem-it's really about secure key exchange.
A mechanism for secure key exchange allows keys to be refreshed and kept secure. .
Most organizations do nothave adequate IT security staff to maintain and secure keys and certificates, especially in the deployment of PKI.
However, conventional encryption alone as a means for transmitting secure data can bequite expensive simply due to the difficulty of secure key distribution.
Moreover, even with plenty of secure keys, the communications between sub and base are extremely slow.
Other Keystore features(as part of Keymaster 4)include Keyguard-bound keys, Secure Key Import, 3DES support, and version binding.
Intel Secure Key is Intel's name for both the RDRAND instruction and the underlying random number generator(RNG) hardware implementation, which was codenamed"Bull Mountain" during development.
In addition, the mandate required UNMIL to secure key Government installations and infrastructure.
They have invested in leading-edge security and implemented data privacy best practices such as file-and volume-level data-at-rest encryption, secure key management and access controls.
Etihad Aviation training first in mid-east to secure key European approval to train 777, 787 pilots.
With secure key generation/management, secure booting,secure updates, secure memory access, and secure debugging, these so-called CSS security solutions extend beyond traditional encryption technologies.
The blockchain would simply provide cryptographically secure keys to unlock that information and share it with other trusted providers.
HW-TLS is a comprehensive solution pre-loaded with unique keys andcertificates designed to eliminate the complexities of generating secure keys in the manufacturing supply chain.
As enterprises move to the public cloud environment, secure key management has become an essential aspect to the security of businesses and customers.
See Figure 3- a board or secured box,protected by tamper and intrusion detection that contains secure key storage and a trusted, often hardware-based crypto engine.
In a bid to bolster its position as a maritime powerhouse, secure key supply chains, enhance its international trade capacities, and build up geo-economic….
The AMISOM troops from Burundi andUganda were doing crucial work in securing key infrastructure and allowing the delivery of humanitarian aid.
In addition, UNAMID continues to face difficulties in securing key enablers and transportation assets for use in a particularly harsh environment.
Person days securing key installations(20 troops per key installation, x 10 installations per sector, x 4 sectors, x 365 days).
Person days securing key installations(20 troops per key installation x 10 installations per sector x 4 sectors x 365 days).
The spokesman said that the warship was deployed in RasLanuf as a part of a“training mission” aimed at securing key oil ports.