释义 |
Definition of encryption in English: encryptionnoun ɪŋˈkrɪpʃ(ə)nɛŋˈkrɪpʃ(ə)n mass nounThe process of converting information or data into a code, especially to prevent unauthorized access. I use encryption to protect sensitive information transmitted online Example sentencesExamples - But encryption is also provided as an option, just in case you're still worried about intruders.
- The flash drive offers built-in hardware-based data encryption in 1 GB and 2 GB capacities.
- Computer security experts increasingly recommend encryption for protecting stored data.
- If encryption is not enabled, hackers can easily use a sniffer to listen in on wireless network traffic.
- Security and privacy technologies such as encryption, digital signatures, and biometric identification systems are evolving rapidly.
- To join a mesh, a member exchanges encryption keys with someone in the network.
- The lack of wireless encryption protocol does not in itself indicate an insecure network.
- The same computer power that yields strong encryption can be used to break weak encryption schemes.
- To prevent prying eyes from seeing your personal email, consider using encryption software.
- Both restoration and backups take no time at all, even with encryption and compression.
Rhymes ascription, circumscription, conscription, decryption, description, Egyptian, inscription, misdescription, prescription, subscription, superscription, transcription Definition of encryption in US English: encryptionnoun The process of converting information or data into a code, especially to prevent unauthorized access. I use encryption to protect sensitive information transmitted online Example sentencesExamples - If encryption is not enabled, hackers can easily use a sniffer to listen in on wireless network traffic.
- The lack of wireless encryption protocol does not in itself indicate an insecure network.
- The flash drive offers built-in hardware-based data encryption in 1 GB and 2 GB capacities.
- Computer security experts increasingly recommend encryption for protecting stored data.
- Security and privacy technologies such as encryption, digital signatures, and biometric identification systems are evolving rapidly.
- The same computer power that yields strong encryption can be used to break weak encryption schemes.
- To prevent prying eyes from seeing your personal email, consider using encryption software.
- Both restoration and backups take no time at all, even with encryption and compression.
- But encryption is also provided as an option, just in case you're still worried about intruders.
- To join a mesh, a member exchanges encryption keys with someone in the network.
|