它的设计目的是,通过使用密钥加密技术,为客户端-服务器应用程序提供强大的身份验证和加密通信。
It is designed to provide strong authentication and encrypted communication for client-server applications by using secret-key cryptography.
本文主要介绍了计算机信息的常规加密技术和公开密钥加密技术,并对两者的优缺点和应用环境作了比较。
This paper introduces the routine encryption of computer information and the publicity key encryption mainly, and compares the both and their environment.
因为这是使用非对象加密技术,而每一端有自己的证书和私有密钥,比起清单5对称加密技术示例,它处理起来更为简单。
Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
为了确保安全,可以结合使用rsync与加密技术,确保在没有正确的密码或加密密钥的情况下无法读取远程文件。
For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.
关键是Facebook是怎么样,亚马逊是怎么样安全地和你或你的计算机,使用加密技术进行交流的,如果你们两个都,知道那个同样的密钥。
But the point is that how is Facebook, how is Amazon possibly going to communicate securely with you or your laptop using cryptology if you both have to know the same secrets.
结合加密技术与图像处理算法,提出了一种类似于公开密钥体制的基于分块dct变换的数字图像自适应水印算法。
In this paper, a block based adaptive watermarking technique in DCT domain that is similar to the public key system is proposed in light of the cryptography technique and image processing technique.
信息安全技术主要包括以加密技术为代表的密码技术、密钥管理技术、数据库加密技术等。
Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.
对于系统中需要外在的物理媒介来保存的加密密钥,使用基于口令的加密技术对密钥加密,将密钥保存在计算机文件系统中。
Encrypted cryptographic key, which need to be saved in the extern media, was encrypted with Password-Based Encryption technology and was saved in the computer file system.
椭圆曲线密码(ECC)是一个基于椭圆曲线理论的公钥加密技术,可以用来创造更快、更小、更高效的加密密钥。
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.
但是,由于该加密技术十分强大,因此必须经常备份加密密钥。
However, because of the strength of the encryption technology, you should always back up your encryption keys.
传统的信息加密技术存在密钥管理的问题。
The traditional encryption has the problem of the manage of key.
首先详细讨论了与安全技术相关的一系列关键技术,包括数据拦截技术、数据加密技术、密钥管理技术等。
Firstly, some key technologies correlated with security are discussed in detail, such as data interception, data encryption, key management, etc.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
利用元胞自动机之间的相互作用,提出耦合触发元胞自动机的加密技术,增加密钥空间和增强密码系统的强度。
Using the interaction between cellular automata, a cryptography system based on the coupled toggle cellular automata is proposed to enlarge the key space and the strength of the system.
给出了一种新的信道加密的思想——将混沌加密技术应用于网络传输通信。基于此思想实现了一个密钥文本的P 2 P网络传输系统。
Carrying out a new channel encryption method based on chaotic encryption, and employing this method to develop a key text P2P transmission system.
给出了数据库加密技术和依赖用户的可恢复密钥管理机制的设计,实现了用户密钥的安全存储、备份与恢复。
Database encryption and user-dependent restorable key management scheme insure the security of key storing, backuping and restoring.
本文将着重讨论一下利用随机数作为密钥,采用现有的加密技术达到比较高的数据传输的保密性。
This paper mainly discusses that using the digit as secret key we have a good secret transmission with existing encrypt technology.
硬件加密技术解决了软件加密在加密运算时的密钥出现在内存和占用系统资源两个不足之处。
Hardware encryption technology solves the problem that the software encryption may cause the key computed in the memory or system resources occupied.
操作系统的新版本支持新的下一代加密技术(CNG)密钥属性,该属性没有包装。
A new version of the operating system supports a new Cryptography Next Generation (CNG) key property that does not have a wrapper.
操作系统的新版本支持新的下一代加密技术(CNG)密钥属性,该属性没有包装。
A new version of the operating system supports a new Cryptography Next Generation (CNG) key property that does not have a wrapper.
应用推荐