encrypt


Also found in: Dictionary, Thesaurus, Financial, Acronyms, Encyclopedia, Wikipedia.

encrypt

(ĕn-krĭpt′) [″ + Gr. kryptos, hidden]
To disguise; to shield from view by representing one symbolic character with another.
References in periodicals archive ?
The ENCRYPT Act will protect these vital interests by ensuring that this important component of information security will not be eroded on a state-by-state basis.
The left inverse matrix of [P.sub.2] is calculated and denoted as [P.sup.-1.sub.2], and the speech plaintext matrices [M.sub.f] are encrypted using the key [P.sub.1] and [P.sup.-1.sub.2], obtaining the speech cipher-text matrices [C.sub.f] as follows:
RDH in the encrypted domain has emerged as a new and challenging research field.
To encrypt your entire USB flash drive, select Encrypt a non-system partition/drive and click Next.
Go back to Email Security -> under Encrypted E-mail, check the Add digital signature to outgoing messages and then Send clear text signed messages when sending signed messages.
* We introduce NLP(Natural Language Processing) and Word Net Tool to achieve efficient MultiKeyword search over encrypted cloud data.
The survey shows that companies are moving in a positive direction, three quarters of organizations acknowledge that they need to improve how they encrypt and secure employee, customer and company information.
You can now have several encrypted volumes open at the same time within a single window.
Three-quarters of organizations acknowledge that they need to improve how they encrypt and secure employee, customer and company information.
This will make it much easier to encrypt email messages that contain sensitive and/or PII information.
Users can access the new Office 365 by selecting the action to apply or remove encryption for whatever types of messages in the Exchange admin center and all the outgoing communication will get encrypted before it is delivered to the outside mail server.
The application-acceleration device should also have the ability to encrypt data within its databases to further secure the content from local breaches.