主要包括会话协议、密钥恢复协议、密钥生成协议。
It includes conversation protocol, key recovery protocol and key creation protocol.
传统的密钥恢复主要有两种类型:密钥托管和密钥封装。
There are two kinds of traditional key recovery: key escrow and key encapsulation.
由于界面友好,选项众多,所以无论是专业人士还是没有经验的用户都能够自如地使用密钥恢复软件。
Due to friendly interface and many options, so whether professionals or inexperienced users are able to freely use the key recovery software.
密钥恢复软件可以迅速地分析您系统中的4500 +多种各类软件程序,并且生成一份软件激活密钥的清单。
Key recovery software can quickly analyze your system 4500 + kinds of various software programs and produces a list of software activation keys.
针对用户密钥丢失导致加密数据不可恢复和传统数据库保护数据存在的问题,设计了一种高安全性的密钥恢复机制。
This paper introduces a high security mechanism for key management to solve the problems, which are derived by key exposure and exploit of traditional database storage.
该文主要介绍了关于密钥恢复的一种加密解决方案和一种通过在IP数据报加入密钥恢复信息提供密钥恢复能力的密钥恢复的方式。
The paper chiefly introduces a cryptographic solution about key recovery and key recovery capability by adding key recovery information to an IP datagram.
该方法实现简单,但存在缺陷:由于附加块信息不同于正常通信过程,恶意用户容易察觉通信具有密钥恢复功能,使用数据包过滤方法,就可以完全屏蔽密钥恢复功能。
The implementation is practical but with obvious disadvantage: the illegal user can easily notice the key recovery, and by data package filtering, the key recovery function can be screened.
该机制通过非对称加密算法、随机密钥加密用户备份信息,以及“一次一密”加密数据库等手段有效解决传统密钥恢复机制在密钥产生、存储、备份、恢复过程中的安全问题。
In this mechanism, random encryption key, asymmetric encryption algorithm and one-time key for database encryption are used to ensure the key's safety in generation, storage, backup and recovery.
在安全链接到了错误的人手上的情况下,你就简单地改变密钥去恢复隐私。
In case the secret link ever gets into the wrong hands, you can simply change the key phrase in order to restore privacy.
在按需付费的基础设施中,灾难恢复、专用密钥管理和控件行为公开是SaaS环境中的主要安全性顾虑。
Disaster recovery, private key management, and disclosure of controls activities are security concerns in the SaaS environment in the pay-on-demand infrastructure.
Passware KitForensicversion 9.5可以在短短几分钟内恢复受BitLocker功能保护的的硬盘驱动器的加密密钥。
Passware Kit Forensic version 9.5 can recover encryption keys for hard drives protected with BitLocker in just a few minutes.
恢复操作在密钥对的私钥被用来加密数据的情况下添加很多值。如果丢失了私钥,则加密的数据也会丢失。
The recover operation adds a lot of value in cases where the private key of the pair is used to encrypt data; if the private key were lost, the encrypted data would also be lost.
密钥管理包括密钥的产生和密钥的存储、备份及恢复等。
Key management includes key generation and key storage, backup and restore.
从坠毁的硬盘驱动器恢复超过2500流行的软件产品密钥!
Recover over 2500 popular software product keys from a crashed hard disk drive!
基于时间的缓存攻击是指通过分析处理器中算法的不同执行时间来恢复密钥的攻击。
Time-based cache attacks analyzes the time difference in the execution of algorithm over a processor, and recovers the secret key.
访问安全信息时出错。请与管理员联系,申请另外一个恢复安全密钥的令牌。
An error occurred while accessing your security information. Please contact your administrator to request another token for recovering your security keys.
盲检测时只需要水印密钥和待测图像就可以恢复出嵌入的信息。
When detecting the watermark, we do not need the original image and original watermark.
我将哈希(?)用户的位置与该键后,客户端,然后使用相同的密钥服务器恢复数据。
I would then hash (?) the users location with that key client side, post that, and then use the same key server side to restore the data.
我希望能够存储不同的值在不同的“仓库”,以便能够恢复每一个通过“密钥”(字符型)。
I wish to store different values in different "storages" so as to be able to recover each one via a "key" (type char).
提取水印时,按照密钥确定水印提取位置,使用与嵌入互逆的方式提取二值水印,恢复为灰度水印。
When extracting the watermark, determine the extracting location in accordance with the key, extract the binary watermark and then recover the gray image watermark.
对JPEG图像随机LSB隐写系统的提取实际上是对隐写密钥的恢复。
The point of the extracting attack to random LSB steganography of JPEG images is to recover the stego-key.
恢复系统密钥时,采用并行过程。
恢复整个初始状态所需的密钥字个数约为O(216),引入的错误数量约为O (216)。
About o (216) key stream bytes at most are needed to recover the whole initial state of RC4 after about o (216) fault inductions at most.
密钥管理器24然后可将恢复的密钥包含在活动区域内,在该区域内的密钥可被提供给存储设备2。
The key manager 24 May then include the restored key in the active area where it is available to provide to storage devices 2.
给出了数据库加密技术和依赖用户的可恢复密钥管理机制的设计,实现了用户密钥的安全存储、备份与恢复。
Database encryption and user-dependent restorable key management scheme insure the security of key storing, backuping and restoring.
管理员可在确定可更换存储介质4需要非活动密钥时发起对于恢复密钥的请求。
An administrator may initiate the request to restore the key upon determining that an inactive key is needed for a removable storage media 4.
接收到恢复一个非活动密钥以便可将该密钥用于解密和加密与所请求的非活动密钥相关联的至少一个相关存储设备的数据的请求。
A request is received to restore one of the inactive keys to make available to decrypt and encrypt data for the at least one associated storage device associated with the requested inactive key.
利用A5/1算法的密钥和帧序列号初始化弱点,可以用相关分析技术区分出A5/1密钥流与真随机比特序列或恢复A5/1密钥。
The A5/1 key-streams can be easily distinguished from the random sequences, or even the A5/1 keys can be recovered, because of the known weakness of the A5/1 algorithm.
利用A5/1算法的密钥和帧序列号初始化弱点,可以用相关分析技术区分出A5/1密钥流与真随机比特序列或恢复A5/1密钥。
The A5/1 key-streams can be easily distinguished from the random sequences, or even the A5/1 keys can be recovered, because of the known weakness of the A5/1 algorithm.
应用推荐