• 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • IT经理鉴定组织中用的协议用户识别密钥管理

    He says it managers must also evaluate the protocols used within their organizations, such as user identification and key management.

    youdao

  • 早期规范中的认证密钥管理协议保密密钥管理(PKM),数据保密机制包含基于DES -CBCAES - CCM的两个解决方案

    In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.

    youdao

  • 早期规范中的认证密钥管理协议保密密钥管理(PKM),数据保密机制包含基于DES -CBCAES - CCM的两个解决方案

    In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定