秘密密钥加密是分布式系统安全机制中一种最重要的技术。
Secret key cryptography is one of the most important technologies in distributed systems security.
尽管DCE目前基于秘密密钥系统,但在本文后面将介绍DCE如何利用并扩展这些技术,以提供一种更为安全的环境。
Although DCE is currently based on secret key system, further in the article we will come to know how DCE exploits these techniques and augments them to provide a much more secured environment.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
为了确保安全,可以结合使用rsync与加密技术,确保在没有正确的密码或加密密钥的情况下无法读取远程文件。
For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.
关键是Facebook是怎么样,亚马逊是怎么样安全地和你或你的计算机,使用加密技术进行交流的,如果你们两个都,知道那个同样的密钥。
But the point is that how is Facebook, how is Amazon possibly going to communicate securely with you or your laptop using cryptology if you both have to know the same secrets.
密钥管理通过IP网络传输,结合PKI与智能卡技术,可以保证密钥传输的安全性和正确性。
Key management can make the key transporting on IP network safe and accurate greatly combining with PKI and smart card method.
随着标准密码算法细节的公开,密码技术保护的信息系统的安全就取决于密钥的保护。
With the standard code computing methods being opened, the accounting system and the safety of code technology protection depend on the protection of secret key.
量子密钥分配技术是信息安全中最热门的研究课题,它起源于量子力学中的测不准原理和未知量子态的不可克隆定理。
Quantum key distribution technique is a popular research subject in information security field, which is based on Heisenberg's uncertainty principle and no-clone theory.
此时需采用密钥托管技术,而且密钥托管必须是安全的。
Thus the encrypted key escrow technology must be adopted and it must be of security.
公开密钥基础设施PKI是一种利用非对称密码技术为电子商务、电子政务和电子事务的开展提供一整套安全保护的基础平台。
Public Key Infrastructure (PKI) utilizes the asymmetrical cryptography technology to lay the security foundation for the electronic commerce, the electronic government and the electronic business.
公开密钥基础设施(PKI)是解决网络安全的技术。
Public key infrastructure (PKI) is one of the important techniques for solving network security problem.
密码技术的飞速发展,特别是公开密钥密码体制的提出,为信息安全提供了最强有力的保护。
The cryptology, especially the public - key cryptology can offer the highest level of information security.
身份认证和密钥交换技术是保证无线通信安全的重要手段。
Identity authentication and key exchange technology is the important means to ensure wireless communication security.
密码学是安全技术的核心,其中的加密解密、数字签名、密钥交换等技术是起到保障作用的重要机制。
Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.
信息安全技术主要包括以加密技术为代表的密码技术、密钥管理技术、数据库加密技术等。
Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.
Geambasu女士和她的同事们发明的这项技术使用一种并不安全的网络空间,存储一定时期后可以自毁的加密密钥。
The technique devised by Ms Geambasu and her colleagues USES one of the least secure areas of the web to store encryption keys that self-destruct after a certain period.
首先详细讨论了与安全技术相关的一系列关键技术,包括数据拦截技术、数据加密技术、密钥管理技术等。
Firstly, some key technologies correlated with security are discussed in detail, such as data interception, data encryption, key management, etc.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
密钥管理技术的主要任务是如何在公用数据网上安全地传递密钥而不被窃取。
The job of the Key Management is to deliver the key on the network save.
随着密码技术的飞速发展,特别是公开密钥密码体制的提出,为信息安全提供了最强有力的保护。
With the rapid progress of cryptology, especially the public-key cryptology can offer the most effective level of information security.
战地网络极易受到各种攻击和破坏,要实现其安全通信,密钥管理是关键技术。
Key management is an essential technique to secure communication which is critical in the tactical environments where the network infrastructure is vulnerable to various attacks and compromises.
该方案利用前向安全数字签名理论和技术,保证了一个PKI系统在CA签名密钥泄露的情况下损失最小;在CA需要更换签名密钥时效率最高;
The scheme utilizes the theory and technology of forward-secure digital signature to guarantee that the loss is the lowest in the case that CA's signing secret key is compromised;
给出了数据库加密技术和依赖用户的可恢复密钥管理机制的设计,实现了用户密钥的安全存储、备份与恢复。
Database encryption and user-dependent restorable key management scheme insure the security of key storing, backuping and restoring.
基于密码学的公钥技术提出了一种混合密钥加密系统,并加入认证技术,从而构建了一个网络环境下的虚拟光学信息安全系统模型。
A model of hybrid cryptosystem was proposed with the aid of public key techniques. Through this model, the solution of aforementioned issues may be found.
远程安全密钥协议基于鉴别符认证技术,具有零知识证明性。
The Security Remote Password protocol is an identity authentication protocol based on verifier, which has the security property with Zero-knowledge password proofs.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
应用推荐