Examples of using Encryption keys in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Unusable Encryption Keys.
Monitoring during transport and during the allocation of encryption keys.
Multiple encryption keys per address.
True random numbers are the foundation of strong, unique encryption keys.
Network name or encryption keys are forgotten.
Encryption keys provide data protection so that only you can access your files.
Where and how are the encryption keys stored?
Choose Encryption keys in the navigation pane.
How do you make sure that the encryption keys are not re-used?
Cell phone encryption keys are in the hands of outsiders or have been stolen.
Sensitive customer data is secured with encryption keys that are set in meta fields.
Input 26-digit Hex values(in the“A-F”,“a-f” and“0-9” range)or 13-digit ASCII characters as the encryption keys.
This job rotates the encryption keys used by the system.
Secure encryption keys in a Trusted Platform Module(TPM) integrated directly into the chipset.
This job rotates the encryption keys used by the system.
A security processor provides a tamper-proof environment for the cryptographic algorithm and the encryption keys.
The key ID is displayed in the Encryption keys section of the IAM console.
Encryption keys are managed with the AWS Key Management Service(KMS), and they are never sent to, or stored on the device.
The cryptocontroller is the safest repository for encryption keys and software license details.
SecureCom secret encryption keys are manufactured on your own device, and that's where they stay.
Only if you know the secret phrase can you decrypt the encryption keys and restore data to its original state.
The card holds the encryption keys along with digital signatures, certificates, and entitlement rights securely in a smart card chip.
Encrypt log files with AWS Key Management Service(SSE-KMS)instead of the default encryption Amazon S3-managed encryption keys SSE-S3.
Using AWS KMS, you can create encryption keys and define the policies that control how these keys can be used.
Dell Encryption Key Manager(EKM)secures the data stored on LTO tape cartridges by managing encryption keys for Dell tape automation solutions.
To prevent a situation like this, encryption keys should be stored on a dedicated device known as a hardware security module HSM.
RFID multi-protocol card, different frequency RFID chips follow different communication protocols, achieve identification,data storage, encryption keys and other different purposes.
Designed to serve as a strongbox for the storage of encryption keys and certificates, these solutions guarantee the protection of the most sensitive link of cryptographic solutions.
Because you manage encryption keys on the client side, you manage any additional safeguards, such as key rotation, on the client side.
You can also protect different backups with different passwords,while actual encryption keys are generated randomly within each session for added backup encryption security.