指出了主密钥安全保护的重要地位。
This paper points out the importance of protecting the main key.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
Double key secure authentication is one of the protection methods used to verify access across different systems.
密码保护视频输出允许用户利用加密钥安全输出文件。
The password-protected video export allows users to safely export video files with a custom encryption key.
门限机制和前向安全机制是有关密钥安全保护的两种重要思想。
Threshold mechanism and forward safety mechanism is two kinds of important method about key safekeeping of security.
能提供这种服务的基础设施就是公开密钥安全基础设施(PKI)。
The infrastructure which can provide security services is called Public Key infrastructure (PKI).
椭圆曲线密码体制是目前公钥体制中每比特密钥安全强度最高的一种密码体制。
Elliptic Curve Cryptography (ECC) has the highest safety strength of private key per bit in the Public-Key Cryptography recently.
基于量子物理原理的量子密码术已被证明是保密信中密钥安全分配的有效手段。
Quantum cryptography, which is based on fundamental physical principles, has been proved to be an effective technique for secure key distribution.
然而,基于量子物理原理的量子密码学已被证明是保密通信中密钥安全分配的有效手段。
Nevertheless, quantum cryptography, which is based on quantum physics, has been proved to be an effective technique for secure key distribution.
双重密钥安全表示用户必须通过两个系统的认证-应用程序服务器(位于主管服务供应商)和金融机构。
Double key secure means the user must authenticate two systems — the application server (at the hosting service provider) and the financial institution.
用户向安全服务器提供一个秘密密钥(密码)来证明其身份。
The user supplies a secret key (password) to the security server to prove its identity.
这些密钥为了安全目的被配置成可允许轻易地交替,或者它们有可能由于某种原因而泄露。
These keys are configured to allow for easy rotation for security purposes or if they are compromised for any reason.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
TCS要求控制关键系统资源的分配和释放,包括数据库记录、通信套接字、安全密钥,等等。
The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.
此秘密密钥只有该用户和安全服务器知道。
This secret key is known only to the user and the security server.
一旦安全服务器通过秘密密钥确认了用户的身份,用户登录到DCE的过程就完成了。
Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
Secret key cryptography is one of the most important technologies in distributed systems security.
注意,配置对新密钥的自动接受可能具有安全风险。
Be aware that configuring the automatic acceptance of new keys is a potential security risk.
另外,还要求管理员角色用传统的方式访问安全信息(密码、密钥文件等等)以更好地保护敏感数据。
In addition, the administrator role is required to access traditionally secure information (passwords, key files, etc.) to provide better protection to sensitive data.
此前用作电邮加密的系统,全都仰仗安全存储密钥的招数。
Past systems designed to encrypt e-mails all relied on ways of storing their keys safely.
密钥存储库是包含EFS安全信息的密钥库。
Keystore is a key repository that contains EFS security information.
在数字安全语境中,密钥是一段数据,用于对其他数据进行加密或解密。
In the context of digital security, a key is a piece of data which is used to encrypt or decrypt other pieces of data.
因此,由客户机来生成那种用途的密钥是很安全的,而且完全可以不将私钥注册到XKMS服务。
Hence, keys used for such a purpose can very safely be generated by the client, and the private key may never be registered with the XKMS service.
取而代之的,在驱动器启动时自动产生一个新的安全密钥,而驱动器断电或终止链接时密钥就会被删除。
Instead, the drives automatically generate a new security key when they start up, then wipe that key as soon as they are powered down or disconnected.
虽然这些函数对于模拟程序来说是有帮助的(因此您可以重新运行模拟程序),但是如果您使用这些函数来创建安全密钥,那可实在是非常危险。
These functions are helpful for simulations (so you can re-run the simulation), but they are extremely dangerous if you're using them to create secret keys for security.
当使用双重安全密钥创建了所有经过的交互点和数据路径时,才能达到安全网络体系结构。
Secure network architecture is achieved when all interaction points and data paths traveled are created using double secure keys.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
RADIUS服务器的安全密钥。
STkt请求的主要目标是获得一个新会话密钥,供客户端与安全服务器一起使用。
The main objective of STkt request is to get a new session key for the client to use with the security server.
用于Web服务安全的JCEKS密钥存储库形式的安全凭据或指定加密操作所需的私钥或公开证书。
Security credentials for web services security in the form of JCEKS key stores or the private keys or public certificates required for the specified cryptographic operations.
导入一个LTPA导出的密钥(可以使用WebSphereApplicationServer安全管理面板导出ltpa密钥)。
Import an LTPA exported key (you can export the LTPA key using a WebSphere Application Server security management panel).
应用推荐