The KDC maintains a database of secret keys.
KDC维护一个秘密密匙数据库。
It takes your access and secret keys as Strings.
它将访问密钥和秘密密钥视为String。
Asymmetric keys for exchange of secret keys.
用于交换秘钥的非对称密钥。
This story carries one of the most secret keys of Tao.
这个故事蕴含着道的最隐秘的诀窍之一。
Normally, and as mentioned, secret keys are protected by a passphrase.
正常情况下,正如前面提到的,机密密钥受密码短语的保护。
You should have received one or more PuTTY SSH secret keys (PPK file).
您应该会收到一个或更多PuTTYSSH秘密密钥(PPK文件)。
The public and secret keys are stored in a public database (/etc/publickey file).
这些公钥和机密密钥存储在一个公共数据库(/etc/publickey文件)中。
This opposite is the path, and I say this is one of the most secret keys of Tao.
与之相反的才是途径,我说这是道的最隐秘的诀窍之一。
Support the use of TGTs obtained from a credentials cache and secret keys obtained from key tables.
支持从凭证高速缓存获得的TGT的使用,支持从密钥表获得密钥的使用。
The scheme is of very strong security, and it allows all users to select their own secret keys.
该方案具有很强的安全性,并且允许所有用户自主选择秘密密钥。
Each user using Secure RPC with DES authentication is supposed to have a pair of public and secret keys.
每个通过DES身份验证使用安全rpc的用户都必须拥有一对公钥和机密密钥。
As the popular arithmetic of secret key encryption, there are symmetrical and unsymmetrical secret keys.
作为现在流行的采用密钥加密解密的算法,无非分为对称密钥和非对称密钥两种类型。
For secret keys, some reasonable factors are key version number and the time the key was added to the key table.
对于密钥,一些合理的因素是密钥版本号和密钥被添加到密钥表中的时间。
This is an administrative daemon managing a database of principals, their secret keys, and policy configurations.
这是一个管理守护进程,负责管理主体数据库、主体数据库的密钥和策略配置。
The -s option tells kdb5_util to create a stash file (a file containing a set of secret keys) to authenticate itself.
s选项告诉kdb5_util创建一个存储文件(包含一组密钥的文件),以便对自身进行身份验证。
Then, we realize the real-time secret coding on the digital chip TMS320VC5402 and analyze the similarity of symbol secret keys.
使用数字可编程芯片TMS320 VC 5402实现了实时保密编码,并对混沌符号密钥的相似性作了分析。
An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.
对称密钥(公钥)算法用于交换在对称算法中使用的加密密钥,以及用于数字签名。
It obtains these credentials and secret keys from the Subject and fails if the Subject does not contain the necessary credentials and secret keys.
它从Subject获得这些凭证和密钥,并且如果Subject没有包含必要的凭证和密钥时就会失败。
It is a crux for security of ring signature that exposure of secret keys can be a devastating attack on cryptosystem which ring signature base on.
作为环签名基础的公钥加密体制,存在着密钥泄露的问题,对于环签名的安全性来说是致命的。
The system administrator runs the newkey command for each user to generate unique public and secret keys for the user who wants to use DES authentication.
系统管理员为每个用户运行newkey命令,以便为希望使用DES身份验证的用户生成唯一的公钥和机密密钥。
Once the public and secret keys of the users are created, they must log in and run the keylogin command anytime they wish to run the Secure RPC application.
在创建了用户的公钥和机密密钥之后,当这些用户希望运行安全RPC应用程序时,他们必须登录并运行keylogin命令。
This protocol actually contains a series of messages containing secret keys and other information that help clients and servers identify each other securely.
此协议实际上包含一系列消息,其中包含秘密密钥以及有助于客户端和服务器安全地相互验证的其他信息。
The authors designed the communication system of the teaching platform and the pseudo random number generator to generate secret keys of the algorithm.
设计了实验平台的通信系统及算法过程中产生密钥的伪随机序列发生器。
These functions are helpful for simulations (so you can re-run the simulation), but they are extremely dangerous if you're using them to create secret keys for security.
虽然这些函数对于模拟程序来说是有帮助的(因此您可以重新运行模拟程序),但是如果您使用这些函数来创建安全密钥,那可实在是非常危险。
You've seen in this article how symmetric encryption, using client-generated secret keys, can be used to secure message exchanges without the need for client certificates.
您已经从本文中了解了对称加密是如何在不需要客户端证书的情况下使用客户端生成的保密密钥来保证消息交换的安全。
Even though some secret keys of the system may be known, the security of this system is unlikely to be broken and thus secure communication may continue even in this event.
论证表明新方案的加密变换几乎是不可被破译的,整个系统的工作不会因部分秘密密钥的泄露而受到任何破坏。
For simplicity, the login module chooses default credentials and secret keys based on the time when they were added to the Subject; hence, the timestamp in KerberosCredentials.
为达到简洁性,登录模块根据凭证和密钥加到Subject的时间来选择缺省的凭证和密钥;从此时起即为KerberosCredentials中的时间戳记。
Though not shown in this article, this use of secret keys is essentially the same as the signing example for WS-SecureConversation discussed in "WS-SecureConversation performance."
虽然本文没有介绍,但是保密密钥的使用方法本质上与“WS -SecureConversation性能”中讨论的WS - SecureConversation签名例子是一样的。
As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.
按照惯例,当出现加密的时候,理解整个系统的出发点就是思考跟密钥有关的问题:有多少密钥,谁持有,如何使用。
As usual when crypto is involved, the starting point for understanding the system's design is to think about the secret keys: how many there are, who knows them, and how they are used.
按照惯例,当出现加密的时候,理解整个系统的出发点就是思考跟密钥有关的问题:有多少密钥,谁持有,如何使用。
应用推荐