此前用作电邮加密的系统,全都仰仗安全存储密钥的招数。
Past systems designed to encrypt e-mails all relied on ways of storing their keys safely.
密钥存储区和信任存储区设置直接取自代理上指定的全局安全属性。
The keystore and truststore settings are taken direct from the global security properties specified on your broker.
密钥存储库是包含EFS安全信息的密钥库。
Keystore is a key repository that contains EFS security information.
既然已经创建了密钥存储,我们将为服务器和客户机配置安全性。
Now that the key stores are in place, we'll configure the security for the service and clients.
Wiggs建议使用AzureStorage服务来存储密钥库,这可充分利用由这些服务所提供的安全性。
Wiggs proposes using Azure Storage services for storing key libraries to benefit from the security provided by these services.
如果在WebSphereApplicationServerND单元中启用了全局安全性,则将在缺省的 SSL指令表配置中设置缺省的密钥和信任存储区。
When global security is enabled in a WebSphere Application Server ND cell, the default key and trust stores are set in the default SSL repertoire configuration.
keylogin命令然后将经过解密的机密密钥传递给本地keyserver守护进程,该守护进程将这个解密的机密密钥存储在其中,直到用户运行安全RPC事务。
The keylogin command then passes on the decrypted secret key to the local keyserver daemon, which stores the decrypted secret key with itself until the user runs a Secure RPC transaction.
用于Web服务安全的JCEKS密钥存储库形式的安全凭据或指定加密操作所需的私钥或公开证书。
Security credentials for web services security in the form of JCEKS key stores or the private keys or public certificates required for the specified cryptographic operations.
用于Web服务安全的JCEKS密钥存储库形式的安全凭据或指定加密操作所需的私钥/公开证书。
Security credentials for web services Security in the form of JCEKS key stores or the private keys/public certificates required for the specified cryptographic operations
加密系统中的信任根从需要安全访问和存储的密钥开始。
The root of trust within a cryptographic system starts with a key, which needs to be accessed and stored securely.
硬件安全组件:专业的方干扰存储器安全硬件和密钥管理。
Hardware security Module: dedicated security hardware for tamper proof storage and management of keys.
在相同安全强度条件下,椭圆曲线密码体制具有较短的密钥长度,较少的计算量、存储量和较小的带宽等诸多优点。
Under similar secure conditions, the ECC has the advantages such as: less computation amounts, shorter length of private key, smaller storing and bandwidth.
智能卡能够存储和解释私人签名密钥和证书,实现数字签名和认证,有效的保证信息的安全。
Smart Card can effectively protect the information security because it can store and explain the private signature key and certificate, realize digital signature and authentication.
Geambasu女士和她的同事们发明的这项技术使用一种并不安全的网络空间,存储一定时期后可以自毁的加密密钥。
The technique devised by Ms Geambasu and her colleagues USES one of the least secure areas of the web to store encryption keys that self-destruct after a certain period.
这样既可以实现密钥存储管理的安全性,又保证了其可用性。
In this way we can achieve the security of key management, also keeps its usability.
比较密码存储的高安全性和字符串私有和公共密钥的漂亮转储想法直接在DB中,我觉得这两个安全级别之间有很大的差距。
Comparing the high security for password storage and pretty dump idea of string private and public key directly in DB, I feel a much greated gap between those two security levels.
谁能建议的一种方式来存储密码(已经给了它一次)安全地在说会话变量中,由一个密钥加密,只有客户需要持有,直到点的时候?。
Can anyone suggest a way to store the password (having been given it once) securely in say the session variable, encrypted by a key that only the client holds until the point when it's needed?
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
给出了数据库加密技术和依赖用户的可恢复密钥管理机制的设计,实现了用户密钥的安全存储、备份与恢复。
Database encryption and user-dependent restorable key management scheme insure the security of key storing, backuping and restoring.
综合运用对称加密算法和公钥算法,既保证敏感信息的存储安全又为密钥提供安全高效的管理。
This scheme used of symmetry encryption and public key encryption which provided secured storage for sensitive data and effective key management.
方便的前口袋里安全地存储密钥,现金或信用卡。
Convenient front pocket safely stores keys, cash, or credit CARDS.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
应用推荐