在使用telnet这样的不安全“明文”协议时,网络上的任何人都可以窃取您的密码和其他敏感信息。
When using an unsecured, "clear text" protocol such as Telnet, anyone on the network can pilfer your passwords and other sensitive information.
它是支持在Internet上进行安全通信的标准,并且将数据密码术集成到了协议之中。
It is the standard behind secure communication on the Internet, integrating data cryptography into the protocol.
TransportLayerSecurity (TLS)是一种密码协议,可以在客户机和服务器之间提供安全的通信。
Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication between clients and servers.
特别在当我们使用IP安全协议中的密码凭证来标志内部主机时,基于这些标志的策略对主机来说无疑更具可信性。
Especially when we use IP security protocol in the internal host password credentials to sign, on the basis of these marks strategy is undoubtedly more credibility for the host.
MDF使用聊twitterOAuth协议,因此帐号和密码有安全保证,但是,当你买了一个广告后,你也就批准了MDF将有关你广告的推发送你的Twitter '信息流中。
MDF USES the Twitter OAuth protocol, so your login and password are safe, but, when you buy an AD, you also authorize MDF to send a tweet about your AD to your Twitter stream.
众所周知,设计正确而安全的密码协议是一项容易出错的任务。
It is well known that designing correct and secure cryptographic protocols is an error-prone task.
安全计算问题是密码学协议研究的基础问题之一,也与很多重要的密码学应用相关。
The problem of secure multiparty computation is fundamental in cryptography, as well as relevant to practical cryptographic applications.
您可参见“花旗网上银行协议与条款”中“登录卡和密码安全”一节以获得密码安全的详细信息。
Please refer to the "Securing your Access Card and Code/PIN" provisions of the Citibank Online Terms and Conditions for detailed PIN security information.
这个量子密钥传输协议在通信节点和控制中心之间通过多个GHZ对构建安全的密码分配系统。
The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers.
网络安全中一个非常重要的因素就是密码协议。
A very important factor of network security is cryptographic protocols.
辫子群是一种新兴的适用于量子计算机时代的公钥密码平台,但是目前基于辫子群的密钥协商协议AAG、AAFG和BDH等都有不同程度的安全弱点。
It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.
密码协议必须满足安全属性的需求,对密码协议进行形式化规范需要证明其满足该属性。
The cryptographic protocol should always satisfy security properties, so the formal specification should give the corresponding proof method.
因此密码协议设计和密码协议分析是信息安全领域的难题。
So the design and analysis of cryptographic protocols are the troubles of information security.
这个协议解决了可信第三方的性能瓶颈问题,是一个更为有效的、安全的密码协议。
It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.
本文主要分析了椭圆曲线公钥密码体制的安全椭圆曲线的实现、密钥的生成、密钥交换协议和数字签名等内容。
The paper mainly introduces some contents of ECC, such as implement of secure elliptic curve, generation of key, key exchanged protocol and digital signature.
分布式乘法计算是安全多方计算中的重要部分,也是设计门限密码体制的基本协议。
Distributed multiplication computation is an important part of secure multi-party computation and a basic protocol of threshold cryptography.
该系统使用公钥密码技术,设计和实现了一套身份认证协议和相关应用接口,可以更加安全和有效地解决网上应用中面临的网络身份认证问题。
The technology of public key is applied in this system, protocol interfaces of the system which can solve the identity authentication in network effectively are implemented.
类BA N逻辑是一种用于分析密码协议安全性的逻辑。
BAN family of logic is used to analyze the security of cryptographic protocols.
密码是网络与信息安全的核心,密码问题一般归结为密码算法与协议的设计与分析问题。
Generally, the problem about cryptology comes down to the design and analysis of cipher algorithms and protocols.
抗选择密文攻击公钥密码体制是安全性很高的密码体制,它是设计抗主动攻击的协议非常有用的工具。
The public key cryptosystem secure against chosen ciphertext attacks is a very strong secure cryptosystem and is a useful primitive for designing protocols that resisting active adversary.
给出了面向非连接通信协议IP层的密码同步的解决方案和安全协议的运行状态图。
Set forth a cipher synchronization scheme in the connectionless oriented IP layer, also present the state transform map of this secure protocol.
信息安全主要是由安全协议和密码算法组成,其中密码算法是信息安全的基础和核心技术。
Information security is composed of security protocol and cryptographic algorithm, the latter is the base and core.
采用近世代数和时序逻辑的方法定义了形式化描述语言,并形式化地描述了密码协议的分层安全需求。
Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols.
利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.
目前,密码系统中大量地使用基于公钥的密码协议,这些协议的安全性直接影响着网络系统的安全。
Today we have seen more and more public key protocols use in networked and distributed systems, so we must select an secure public key protocol otherwise it will jeopardy the secrecy of networks.
(安全远程密码协议)是一种安全的新型密码鉴别和密钥交换协议。
SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol.
本文提出了接收签字的概念,同时给出了一种具体实现接收签字的密码协议,并对其安全性进行了讨论。
First, the paper proposes the idea of received signature. Then, a practical realization of received signature protocol is given.
它支持多种网络安全协议,以满足商用密码应用中的数据安全保密的需求。
The data cipher card supports kinds of network protocols to satisfy the requirement of the application of commercial cryptology.
最后,在随机预言模型和理想密码模型中证明了协议的安全性。
It is based on the protocol of Burmester and Desmedt and is provably-secure in the random-oracle and ideal-cipher models.
一些研究人员在密码协议分析中引入形式化方法,通过建立形式模型和自动检测工具分析密码协议的安全性,取得了较大的成功。
Some researchers introduced formal methods for analyzing cryptographic protocols, and achieved many significant results by building formal models and automatic verifying tools.
应用推荐