如果用户希望把应用程序限制为只使用符合FIPS的密码技术和TLS,可以手工配置每个端点,也可以使用管理工具启用FIPS遵从性。
Users wishing to restrict their applications to use FIPS complaint ciphers and TLS can either manually configure every endpoint, or simply enable FIPS compliance using the admin tools.
本文论述信息安全威胁和密码体制,描述密码技术领域的标准化、组织机构、开发应用和出口限制。
This paper discusses information security threats and cryptosystems, and describes standardizations, organizations, development and applications and export restriction in cryptologic technology field.
为了保证信息系统的安全性,密码技术被应用于信息系统中。
Cryptographic technology is applied to information system to ensure its security.
到目前为止,学术界对于基于门限密码学的入侵容忍研究几乎都集中在门限rsa密码技术的应用上。
Up to now, the research on threshold - cryptography-based intrusion tolerance focuses on using threshold RSA cryptography.
信息隐藏技术是一门建立在数学、现代密码学、信息处理理论和计算机应用技术基础上的交叉性学科。
Information hiding is an interlaced subject, which is built on the basis of mathematics, modern cryptography, information processing theory, and computer applied techniques.
密码技术是信息安全领域的核心技术,在当今社会的许多领域都有着广泛的应用前景。
Cryptology is the kernel technology in the field of information security, it has extensive commercial prospect in many fields.
将组合公钥技术和门限密码理论结合应用于移动自组网的密钥管理方案中。
Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.
以量子密钥分配为代表的量子密码术是量子信息技术应用于经典通信的成功典范。
As the representative of quantum cryptography, the quantum key distribution (QKD) is a successful model that the quantum information technique is applied in to the conventional communications.
密码技术的应用领域不断扩大。
The application of the cryptographic technology has been increasing.
分组密码协处理器现已成功的应用到了广州大学信息安全技术实验室研制的PCI - FPGA密码卡中。
The block cipher coprocessor has been applied in a PCI-FPGA cipher card designed by the Information Security Technology Laboratory of Guangzhou University.
提出了一种基于数字水印技术和应用密码学的数字产品版权保护认证机制。
The attacks on digital watermarking increasingly become serious, with the application of digital watermarking on digital copyright protection.
文中提出将PIC单片机技术和密码学原理应用到防伪包装领域;
This paper put forward the PIC single chip technology and cryptography theory which were applied in anti-forgery packaging.
该系统使用公钥密码技术,设计和实现了一套身份认证协议和相关应用接口,可以更加安全和有效地解决网上应用中面临的网络身份认证问题。
The technology of public key is applied in this system, protocol interfaces of the system which can solve the identity authentication in network effectively are implemented.
由于密码技术的采用,电子选举协议在理论研究及实际应用方面都取得了一些成果;
Their purpose is to improve its safety and efficiency. Because of using cryptology, we have maken progress in theoretical research and application.
公钥密码技术结合传统的对称密码技术及信息摘要技术,可提供信息的保密性、完整性和信源确认,是多种安全应用的基础。
Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin.
信息隐藏是数学、密码学、信息论与盘算机应用技术相互结合的一个交叉性的研讨课题。
Information hiding is an interdisciplinary subject of the combination of mathematics, cryptography, information theory and computer application technique.
安全认证是密码学的重要应用方向,也是信息安全领域中常用的技术之一。
Secure authentication technology is a most important application way. It's one of typic technology in information secure field, too.
散列函数是密码学的基础要素之一,主要应用方向是数据完整性校验和身份认证技术。
The hashing function is one of the basic foundations of the cryptography. It widely used in data integrality and identity authentication.
密码技术被广泛应用于信息安全领域。
Cryptography is utilized widely in the field of information security.
密码学作为信息安全技术的核心领域,提供了多种密码算法与应用协议以满足人们实际应用的需要。
Cryptography is the core domain in the information security technique. It provides many algorithms and protocols to meet practical need.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
目前在软件加/解密技术中应用到的密码体制主要分为对称密码体制与非对称密码体制。
RSA crypto-algorithm is recognized as the most mature and perfect in all asymmetrical key system at present.
目前在软件加/解密技术中应用到的密码体制主要分为对称密码体制与非对称密码体制。
RSA crypto-algorithm is recognized as the most mature and perfect in all asymmetrical key system at present.
应用推荐