无证书公钥密码体制解决了密钥托管问题和公钥认证问题。
Certificateless public key cryptography resolves the key escrow problem and public key authentication problem.
如果你真的偏执,考虑添加密码和公钥认证的实现双因素认证。
If you're truly paranoid, consider adding password and public key authentication to achieve two-factor authentication.
OpenSSH支持两种类型的加密,即基于主机的认证和公钥认证。
OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.
公钥认证体制中认证机构和其它实体使用证书管理协议进行交互,完成证书管理功能。
In Public Key Infrastructure, certificate Authorities use certificate management protocol to communicate with other entities, in order to implement the function of certificate management.
通过引入群公钥证书并在群密钥中结合群以及成员的长期密钥和临时密钥,提供了隐含密钥认证,以有效地对抗中间人攻击。
The PAGKA protocol suite is communication efficient, and has the following cryptographic properties such as key independence, implicit key authentication, perfect forward secrecy and resistance .
在进行公理推导的基础上,本文还利用工具SPV对更多的公钥认证协议进行了自动化验证,与协议推导取得了一致的验证结果。
On the ground of deduction, the paper chose a more serials of public key authentication protocols to use the tool SPV for automatic verification, and got expected results.
现在准备使用EFS登录由OpenSSH服务器上的用户laxman 对 OpenSSH客户机用户ram 进行公钥认证。
The OpenSSH client user ram is all set for Public Key authentication to user laxman on the OpenSSH server with EFS login. Verify the same with ssh login from client
通过认证一个公钥属于一个命名的实体,数字证书解决了这个问题。
Digital certificates address this problem by certifying that a public key belongs to a named entity.
为了防止邮件提供商不想实现这个协议或者它是不可信的,还可以由第三方认证机构来持有公钥。
There can be secondary authorities holding the public key in case the email provider does not want to implement the protocol or it is not reliable.
然而,我们需要将客户机配置为信任签署服务器的公钥证书的认证中心(CA)。
However, we'll need to configure the client to trust the certificate authority (ca) that signed the server's public key certificate.
验证选择了刚刚上载的公钥的配置加密认证的文件名称。
Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.
PK i由两个密钥组成-公钥和私钥-用于认证用户和加密数据。
PKI consists of two keys — a public key and a private key — used to authenticate the user and encrypt the data.
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
至此,ssh 基于公钥的认证已经完成,现在可以进入“DB2配置”。
At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."
这里不需要ssh服务器配置,因为在默认情况下,在基于密码的认证之前,ssh将尝试使用基于公钥的认证。
No SSH server configuration is necessary, since, by default, SSH will attempt to use public key-based authentication before password based authentication.
比较基于主机的认证和基于公钥的认证。
Comparing host-based authentication to public key-based authentication.
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问)。
Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).
组合公钥技术是一种新的认证技术,它是基于标识的公钥算法技术。
This technology is a new authentication technique, and it's an algorithm based on the identity technology.
为了保证本系统的安全性,本论文结合基于口令和公钥的认证模式,设计了一种新型的身份认证方法。
To guarantee the system safe, this thesis designed a new kind of Identity certification method based on the mode of keywords and public-key certification.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。
A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.
在认证机制中引入公钥密码体制,提出了一个基于公钥密码体制的3g认证与密钥分配协议。
By introducing public key cryptosystem to the authentication mechanism, the author proposed a 3g authentications and key agreement protocol based on public key cryptosystem.
本文针对个人通信系统的需求,给出一种基于公钥体系的认证和密钥约定协议的实现方案。
In connection with the requirements on personal communications, an implementation of an authentication and key agreement protocol based on public key cryptosystem is given.
方案不仅支持系统内人员和设备的密钥管理、身份认证及公钥密码运算,而且还对加密密钥进行管理。
This scheme not only supports secret key management and identity authentication of personnel and equipment, but also constructs secret key management center and manages encrypted key of the system.
为了解决网络世界中的身份认证问题,就必须引入公钥基础设施(PKI)。
In order to solve the identity authentication in the cyberworld, it's very necessary to introduce Public Key Infrastructure (PKI).
水印的认证利用了第三信任方和版权者的公钥,而不需要原始图像参与。
By using the public keys, the image of watermark can be authenticated without the original image.
同时,基于身份加密的公钥密码系统中也存在着一些问题,如身份认证、私钥分发以及密钥托管等。
However, there are some problems in IBE such as identity authentication, private key distribution, key escrow and so on.
此外,文中以公钥与单钥算法相结合的方式来确保数据的安全传输和认证。
In addition, public key and symmetric key operations are employed simultaneously to ensure the secure transmission and authentication of data.
该系统使用公钥密码技术,设计和实现了一套身份认证协议和相关应用接口,可以更加安全和有效地解决网上应用中面临的网络身份认证问题。
The technology of public key is applied in this system, protocol interfaces of the system which can solve the identity authentication in network effectively are implemented.
一次签名方案的缺陷在于公钥较长,从而导致认证信息较长。
But One-time Signature scheme usually have large public keys which limit their usage.
应用推荐