• It is the standard behind secure communication on the Internet, integrating data cryptography into the protocol.

    支持在Internet上进行安全通信标准,并且数据密码术集成到了协议之中。

    youdao

  • The name was both an homage to cryptography (a “zero-knowledge proofis a standard cryptographic protocol) and a promise of a specific relation between the application provider and the users.

    这个名字既是加密算法(“0知识证明标准加密协议)的致敬,也是对服务提供商用户之间特定关系一种约定

    youdao

  • The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.

    SSL协议基于公钥密码,加密密钥成对出现公钥密码中,它们是在数学上相关的,无法由个推知另一个。

    youdao

  • Distributed multiplication computation is an important part of secure multi-party computation and a basic protocol of threshold cryptography.

    分布式乘法计算安全多方计算中的重要部分,也是设计门限密码体制基本协议

    youdao

  • The technology adopted include categories of data fragment reassembly, protocol conversion, cryptography, intrusion detection, virus, and keyword filtering, authentication and audit and so on.

    网闸所采用的技术包括数据分片重组协议转化密码学入侵检测病毒以及关键字过滤身份验证审核

    youdao

  • Combining process of bidding and cryptography, an efficient and secure inviting public bidding and bidding protocol of construction engineering is proposed with signature based on proof of knowledge.

    论文研究了密码学工程招投标中的应用,把招投标流程密码学知识相结合,基于知识证明签名给出一个安全有效电子招投标方案

    youdao

  • In modern cryptography, one way to ensure the security of a protocol is by means of provable security.

    现代密码学中可证安全保证协议安全种方式

    youdao

  • On the theoretical basis above, we achieve an secure electronic exchange system based SSL protocol, which use object-oriented programming design, cryptography technology and COM technology.

    依据上述理论基础,采用面向对象的程序设计方法,在SSL协议基础上,探索了利用COM组件技术实现一个安全电子交易的二次加解密组件系统

    youdao

  • Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.

    基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定