• 如果一种安全方法可以公钥分发给受信任群体足够了

    If there was a secure way to distribute public keys to trusted parties, that would be enough.

    youdao

  • 完成这种设置,有快速简单方法,即创建一个公钥

    A quick and simple way of setting this up is to create a public key.

    youdao

  • 常见身份验证方法包括密码公钥、键盘交互、GSSAPISecureIDPAM

    Common authentication methods include password, public key, keyboard-interactive, GSSAPI, SecureID, and PAM.

    youdao

  • 公钥基础设施(PKI)公钥与使用证书颁发机构(CA)相应用户标识进行关联一种方法

    A public key infrastructure (PKI) is a means for associating public keys with the respective user identities using a Certification Authority (ca).

    youdao

  • 技术角度来看,可以使用各种加密方法建立信任包括加密密钥私钥公钥数字签名或者协议

    Trust is also established from a technology perspective using cryptographic methods, including encryption keys, private or public keys, digital signatures, or protocols.

    youdao

  • 对于PGP其他公钥加密方法存在公钥推断某人方法

    With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.

    youdao

  • 开始讨论公钥以及生成它们基本原理之前,首先说明加密数字签署XML数据其他方法

    Before jumping into public and private keys and the nitty-gritty of generating them, I'd like to show you some other options for encrypting and digitally signing XML data.

    youdao

  • 为了保证系统安全性论文结合基于口令公钥认证模式设计了一种新型身份认证方法

    To guarantee the system safe, this thesis designed a new kind of Identity certification method based on the mode of keywords and public-key certification.

    youdao

  • 方法接受布尔值指示是返回公钥信息还是同时返回公钥钥信息。

    Both methods accept a Boolean value that indicates whether to return only the public key information or to return both the public-key and the private-key information.

    youdao

  • 根据素数的陈氏表示法改进RSA公钥密码体制中的安全素数寻找方法提高RSA算法运行速度。

    According to Chen's prime number representation method, this paper improves the method of calculating safety prime number to increase the speed of the RSA.

    youdao

  • 本文介绍公钥体制中得到广泛应用两种加密解密方法并举出了实例帮助理解

    This paper introduce some methods of classic cryptography and modern cryptography, including the methods of encryption and decryption and illustrating to help comprehension.

    youdao

  • 进一步利用知识思想给出了抵抗公钥替换攻击一般方法

    Furthermore, using zero knowledge idea, a general approach to withstanding the public key substitution attack is given.

    youdao

  • 并通过RSA公钥密码算法的改进给出一种新的加密方法进而给出相应密钥管理方案

    Through some improvement to the RSA public key system, a new method of multicast encryption is put forward and then corresponding key management model is given.

    youdao

  • 公钥证书提供了一种公钥拥有者身份信息公钥绑定一起的方法

    A public key certificate provides a method for binding a public key and its owner's identity informations.

    youdao

  • 方法兼有加密体制优点:既有对称密码加密体制的加密速度快强度高的优点,拥有公钥密码体制密钥分发管理上的优势

    It has strongpoint of symmetry encryption scheme such as encryption speed and encrypt intensity, but also has advantage of public key encryption scheme on key distribution and key management.

    youdao

  • 基于有效的数字计算方法误差估计方法,对目前提出基于切比雪夫映射公钥加密方法进行了改进得到一种密钥协商协议

    Based on high effective locations algorithm and error estimate, improvement of the public-key scheme based on Chebyshev maps proposed recently was presented and a key agreement protocol was given.

    youdao

  • 针对现有安全广播协议密钥分发效率较低问题,提出一种通过多接收者公钥加密实现安全广播的方法

    To improve the inefficiency of the existing key distribution protocols in the secure broadcasting, an ideal multi-recipient public key encryption scheme to achieve the secret broadcasting is proposed.

    youdao

  • 方案依据PKI公钥基础设施)应用原理采用PKISMIME相结合方法建立了基于PKI的安全邮件传输体系

    The solution, which makes use of the method of combining PKI with S/MIME, establishes a system of secure E-mail transfer, according to the application principle of Public Key Infrastructure(PKI).

    youdao

  • 详细分析了UMTS认证密钥分配协议过程以及协议的安全性,找出协议中存在弱点和可能的攻击,提出了公钥加密协议的改进方法

    This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    youdao

  • 为了设计交叉访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户PK I方法

    In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.

    youdao

  • 分析病毒文件完整性破坏,对此提出了使用公钥密码体制进行数字签名来保护文件完整性的方法

    The destruction of the integrity of executable files by virus is discussed and the conceptof integrity information of executable files is proposed.

    youdao

  • 对无证书代理签名方案进行安全性分析,指出该方案对于公钥替换攻击不安全的,并给出具体的攻击方法

    This paper analyzes the security of a certificateless proxy signature scheme and shows that it is insecure against the public key replacement attack in certificateless cryptosystems.

    youdao

  • 协议没有采用NAXOS方法即使用户临时公钥离散对数泄漏,协议安全的。

    Protocol II, without using the NAXOS trick, is still secure even if the exponent of an ephemeral public key is leaked.

    youdao

  • 协议没有采用NAXOS方法即使用户临时公钥离散对数泄漏,协议安全的。

    Protocol II, without using the NAXOS trick, is still secure even if the exponent of an ephemeral public key is leaked.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定