Secure Encryption Technology

Views Updated: Dec 15, 2025

Key Facts

Abbreviation
SET
Pronunciation
/sɪˈkjʊr ɛnˈkrɪpʃən tɛkˈnɑləʤi/
Category
Computing
Related Field
Cyber & Security

Examples in Context

  1. This new scheme has some disadvantages, but the author expects that it can be a propeller for the development of the XML's secure encryption technology.
  2. In a variety of secure communication protocols and encryption technology based on the theory, This paper presents a custom security design model of communication protocol from the security, scalability, reusability perspective in the TCP / IP application layer.
  3. The results show that 3-D secure protocol reduces complex encryption technology used in SET protocol, so it is weaker in security, thus a scheme is proposed to strengthen it.
  4. In addition to using frequency hopping to ensure secure transmission of information, encryption technology is used to ensure the secure storage.
  5. PKI is a kind of secure infrastructure that based on the asymmetric encryption technology. CA ( Certification Authority ) is the core of this system.

Other meanings of SET