Examples of using Encryption techniques in English and their translations into Portuguese
{-}
-
Official
-
Colloquial
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Skype reportedly uses publicly documented,widely trusted encryption techniques.
In this context, encryption techniques must be guaranteed by independent bodies.
The cybersecurity industry considers this as one of the most secure encryption techniques out there.
Disk encryption techniques can provide protection against such loss or theft- if properly chosen and used.
Our secure servers protect your information using advanced encryption techniques and firewall technology.
We use state-of-the-art encryption techniques(e.g. SSL) via HTTPS to guarantee the security of your data during transmission.
SSL encryption To protect the security of your data during transmission,we use state-of-the-art encryption techniques(such as SSL) over HTTPS.
In this sense, the literature reports the use of encryption techniques that allow calculations and comparisons be performed directly over encrypted data.
Let me repeat: at the plenary meeting on 2 and3 December the Wassenaar contracting states decided to review the export control rules on encryption techniques.
SecretService enables the use of strong encryption techniques in all mac OSX aware applications including Mail and iChat ensuring your privacy and peace of mind.
To prevent disclosure of private information,VPNs typically allow only authenticated remote access using tunneling protocols and encryption techniques.
The objective of this virus is to infect as many computers as possible and use sophisticated encryption techniques in order to render the files encoded by it unable to be opened.
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest andmost widely known encryption techniques.
In the context of multimedia applications security, digital video encryption techniques have been developed to assure the confidentiality of information contained in such media type.
Trapdoor functions came to prominence in cryptography in the mid-1970s with the publication of asymmetric(or public-key) encryption techniques by Diffie, Hellman, and Merkle.
Through encryption techniques, which encode a signal so as to make it impossible to receive it without installing a decoder in the TV set, DBS pay-TV is perfectly practical.
All communication that is done with this technology is seamless andtraded securely because of our powerful data encryption techniques and the use of digital certificates.
Designed primarily for Ultra HD 4K devices,it employs advanced encryption techniques to create a secure connection between source and display, preventing the unlicensed copying of copyrighted content.
Why did Europe go along with the so-called amendment of the Wassenaar Convention which makes it more difficult for us to export encryption techniques, and what part did the Commission play in this?
Bitcoin is a type of digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.
Modern deniable encryption techniques exploit the fact that without the key, it is infeasible to distinguish between ciphertext from block ciphers and data generated by a cryptographically secure pseudorandom number generator the cipher's pseudorandom permutation properties.
If the OST files are confined with password,encrypted using superior encryption techniques or compressed later when they get corrupted then also this software repairs that files attributes with few clicks of mouse.
However, different VPNs use different encryption techniques, and may be required by law in some countries to follow certain rules about networking- which might mean that the VPN isn't as secure as you are led to believe.
They needed to use leased lines, because their encryption technique were not compatible with use of packetswitched networks.
TLS uses a public key encryption technique based on a pair of asymmetric keys for encryption and decryption.
A digital signature is an encryption technique used to verify the source of transferred data for example., messages, installation packages, etc.
Fast encryption and compression,using strong AES 256 bits encryption technique, and at least 50% compress rate to double your storage capacity.
The most important improvement of the new one is that it no longer uses the AES-256 cypher as its main encryption technique.
Lexar Jumpdrive P10 64GB also offers EncryptStick Lite software,which gives data security with 256-bit AES encryption technique and protects your confidential data from unauthorized persons.
Was an English scientist and inventor of many scientific breakthroughs of the Victorian era, including the English concertina, the stereoscope(a device for displaying three-dimensional images), andthe Playfair cipher an encryption technique.