Examples of using Cryptographic methods in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
State-of-the-art cryptographic methods and standards.
Cryptographic methods and their practical application.
Qualitative assessment of all cryptographic methods.
Cryptographic methods can thus prevent cyber attacks.
IT security expert Prof.Jörn Müller-Quade recommends the use of cryptographic methods.
The cryptographic methods ensure sufficient security in this respect.
The webinar provides an overview of the available cryptographic methods in the CodeMeter API.
Hash Chaining: Use cryptographic methods to protect the integrity of log records, once they are stored.
This is a type of digital currency whose issue and control is based on cryptographic methods.
Password Safe also uses the following cryptographic methods to achieve maximum security.
MIFARE DESFire EV1 is based on open global standards for both air interface and cryptographic methods.
Our platforms support a vast number of cryptographic methods to span the full multi-application spectrum.
In the future, operators of critical infrastructures will need to communicate using integrated cryptographic methods and tools.
Cryptographic methods, such as encoding or digital signatures, guarantee security also in case of big data volumes.
Security risk:the storage of digital assets is done based on cryptographic methods private/ public keys.
New cryptographic methods make it possible to treat sensitive data confidentially by revealing only the minimum necessary information to the other party.
We point out that the transmission of your data is on the Internet unencrypted, if not cryptographic methods are used.
The chips that we and other brands use are based on cryptographic methods one can use to authenticate, but not copy them.
Although you can only access instance metadata and user data from within the instance itself,the data is not protected by cryptographic methods.
Few successful software applications don't use cryptographic methods as they protect code and data from predatory attacks.
As access to the MSSQL server is otherwise secured via access permissions, this process enables the maximum possible working speed with a unchangedhigh level of security through the use of sophisticated, cryptographic methods.
For this purpose, HTTPS uses asymmetrical cryptographic methods for authentication and symmetrical cryptographic methods to encrypt exchanges.
Scientists from the University's Chair of IT Security involved in the PRISMACLOUD researchproject have successfully developed innovative cryptographic methods to ensure greater security and data protection for cloud users. One such method is a form of digital redacting, or'blacking-out', of sensitive data that have already been digitally signed.
The OS establishes a chain of trust and utilizes cryptographic methods to ensure the hardware and platform have not been compromised with verification available through the SafetyNet API.
PRISMACLOUD is therefore primarily focused on cryptographic methods to enhance security and data privacy for cloud users and the implementation of these methods in the software.
Careful design, skilful task distribution and the use of cryptographic methods and protocols provide an acceptable level of protection and compatibility with established and standards, for even the smallest of systems.
The first world war had demonstrated that traditional cryptographic methods manual, were now impractical, while a machine free from human error, guaranteed fast the infallibility and security to the processes of encryption and decryption of the dispatches.
The data storage itself can be divided into up to 8 memorysegments, the contents of which can be protected using different keys with a cryptographic method.
In collaboration with the ZKM Karlsruhe, the cryptographic method should be made playfully tangible and experienceable to visitors.