![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
Research Home
Tools Art & Architecture Thesaurus Full Record Display
|
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![Art & Architecture Thesaurus Full Record Display](/research/tools/vocabularies/images/header_aat_record_display.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![Previous Page](/research/tools/vocabularies/images/previous_page.gif) |
![Help](/global/images/global_help.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
Click the icon to view the hierarchy. |
|
![](/global/images/global_hierarchy.gif) |
encryption (computer-use functions, information handling functions, ... Functions (hierarchy name)) |
|
Note: The process of converting data into code, to conceal information or prevent unauthorized access. May be used to refer to schemes for this purpose in print or electronically transmitted, but is increasingly used to refer to digitized, or computer data. |
Terms: |
|
encryption (preferred,C,U,English-P,D,U,VN)
|
encrypt (C,U,English,UF,U,U)
|
encrypting (C,U,English,UF,U,U)
|
encrypted (C,U,English,UF,U,U)
|
資料加密 (C,U,Chinese (traditional)-P,D,U,U)
|
加密 (C,U,Chinese (traditional),UF,U,U)
|
zī liào jiā mì (C,U,Chinese (transliterated Hanyu Pinyin)-P,UF,U,U)
|
zi liao jia mi (C,U,Chinese (transliterated Pinyin without tones)-P,UF,U,U)
|
tzu liao chia mi (C,U,Chinese (transliterated Wade-Giles)-P,UF,U,U)
|
encryptie (C,U,Dutch-P,D,U,U)
|
|
Facet/Hierarchy Code: K.KG |
Hierarchical Position:
![](/global/images/ghost.gif) |
|
![Hierarchy of Activities Facet](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
Activities Facet |
|
![Hierarchy of Functions (hierarchy name)](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
.... Functions (hierarchy name) (G) |
|
![Hierarchy of functions (activities)](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
........ functions (activities) (G) |
|
![Hierarchy of <functions by general context>](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
............ <functions by general context> (G) |
|
![Hierarchy of information handling functions](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
................ information handling functions (G) |
|
![Hierarchy of computer-use functions](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
.................... computer-use functions (G) |
|
![Hierarchy of encryption](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
........................ encryption (G) |
Additional Parents:
![](/global/images/ghost.gif) |
|
![Hierarchy of Associated Concepts Facet](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
Associated Concepts Facet |
|
![Hierarchy of Associated Concepts (hierarchy name)](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
.... Associated Concepts (hierarchy name) (G) |
|
![Hierarchy of <technology and related concepts>](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
........ <technology and related concepts> (G) |
|
![Hierarchy of technology (general associated concept)](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
............ technology (general associated concept) (G) |
|
![Hierarchy of information technology](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
................ information technology (G) |
|
![Hierarchy of computer networking concepts](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
.................... computer networking concepts (G) |
|
![Hierarchy of encryption](/global/images/global_hierarchy.gif)
![](/global/images/ghost.gif) |
........................ encryption (G) |
Additional Notes: |
|
Chinese (traditional) ..... 將資料轉成代碼以隱藏資訊或防止未經授權的存取。可用來指為了此目的而採取之電子傳輸或印刷機制,但日漸多用於指數位化或電腦的資料。 |
Dutch ..... Het omzetten van gegevens in code om informatie te verbergen of ongeoorloofde toegang te voorkomen. Kan worden gebruikt voor hiervoor bedoelde gedrukte of elektronisch overgedragen schema's, maar wordt steeds meer gebruikt voor gedigitaliseerde gegevens of computergegevens. |
|
Sources and Contributors: |
|
|
|