用户向安全服务器提供一个秘密密钥(密码)来证明其身份。
The user supplies a secret key (password) to the security server to prove its identity.
一旦安全服务器通过秘密密钥确认了用户的身份,用户登录到DCE的过程就完成了。
Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.
此秘密密钥只有该用户和安全服务器知道。
This secret key is known only to the user and the security server.
双重密钥安全表示用户必须通过两个系统的认证-应用程序服务器(位于主管服务供应商)和金融机构。
Double key secure means the user must authenticate two systems — the application server (at the hosting service provider) and the financial institution.
RADIUS服务器的安全密钥。
STkt请求的主要目标是获得一个新会话密钥,供客户端与安全服务器一起使用。
The main objective of STkt request is to get a new session key for the client to use with the security server.
使用此会话密钥,客户端和服务器可以安全地相互通信。
Using this session key, client and server can safely communicate with each other.
身份验证服务的总体目标是,与客户端希望向其进行身份验证的服务器安全地交换客户端身份和会话密钥。
The whole purpose of the authentication service is to securely exchange the client identity and session key to the server to which the client wants to authenticate.
此协议实际上包含一系列消息,其中包含秘密密钥以及有助于客户端和服务器安全地相互验证的其他信息。
This protocol actually contains a series of messages containing secret keys and other information that help clients and servers identify each other securely.
既然已经创建了密钥存储,我们将为服务器和客户机配置安全性。
Now that the key stores are in place, we'll configure the security for the service and clients.
确保正确设置访问权限非常重要,因为OpenSSH服务器可能拒绝使用具有不安全的访问权的密钥。
It's important to ensure that access permissions are properly set because the OpenSSH server may refuse to use keys which have non-secure access rights.
在网络信息安全领域,服务器与客户机之间的密钥协商显得非常必要。
In the area of network information security, key agreement is essential between servers and clients.
基于验证元的口令认证密钥交换协议的最基本安全目标是抵抗字典攻击和服务器泄露攻击。
The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.
其次,对UAP协议进行安全分析,由于其确认密钥完全依赖于服务器的长期私钥,因此它不具有前向保密性和密钥泄漏的安全性。
Secondly, the UAP protocol is analysed, because the key confirmation completely lies on the long-term private key, so it does not achieve forward secrecy, and resists key-compromise impersonation.
在改进原有协议的基础上,提出了一个更加安全和高效的基于口令的跨服务器认证密钥交换协议。
While , compared with the old schemes, the efficency of both is equal, the security of the new schemes is improved quite a lot.
在改进原有协议的基础上,提出了一个更加安全和高效的基于口令的跨服务器认证密钥交换协议。
While , compared with the old schemes, the efficency of both is equal, the security of the new schemes is improved quite a lot.
应用推荐