• 秘密密钥加密分布式系统安全机制中一重要技术

    Secret key cryptography is one of the most important technologies in distributed systems security.

    youdao

  • 尽管DCE目前基于秘密密钥系统,但本文后面介绍DCE如何利用扩展这些技术,以提供一种更为安全环境

    Although DCE is currently based on secret key system, further in the article we will come to know how DCE exploits these techniques and augments them to provide a much more secured environment.

    youdao

  • 使用公用安全系统之一PKI(公用密钥基础),一种用于PDA智能电话安全性的加密技术

    One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

    youdao

  • 网络系统主要安全技术数据加密RSA算法密钥系统安全的一种体制

    The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.

    youdao

  • 为了确保安全可以结合使用rsync加密技术,确保在没有正确密码加密密钥的情况下无法读取远程文件

    For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.

    youdao

  • 关键Facebook怎么样亚马逊怎么样安全计算机,使用加密技术进行交流的,如果你们两个,知道那个同样密钥

    But the point is that how is Facebook, how is Amazon possibly going to communicate securely with you or your laptop using cryptology if you both have to know the same secrets.

    youdao

  • 密钥管理通过IP网络传输结合PKI智能卡技术可以保证密钥传输的安全正确性

    Key management can make the key transporting on IP network safe and accurate greatly combining with PKI and smart card method.

    youdao

  • 随着标准密码算法细节公开,密码技术保护信息系统安全取决于密钥的保护。

    With the standard code computing methods being opened, the accounting system and the safety of code technology protection depend on the protection of secret key.

    youdao

  • 量子密钥分配技术信息安全最热门研究课题起源于量子力学中的测不准原理未知量子态的不可克隆定理

    Quantum key distribution technique is a popular research subject in information security field, which is based on Heisenberg's uncertainty principle and no-clone theory.

    youdao

  • 此时采用密钥托管技术,而且密钥托管必须是安全的。

    Thus the encrypted key escrow technology must be adopted and it must be of security.

    youdao

  • 公开密钥基础设施PKI是一种利用非对称密码技术电子商务、电子政务电子事务的开展提供一整套安全保护的基础平台。

    Public Key Infrastructure (PKI) utilizes the asymmetrical cryptography technology to lay the security foundation for the electronic commerce, the electronic government and the electronic business.

    youdao

  • 公开密钥基础设施(PKI)解决网络安全技术

    Public key infrastructure (PKI) is one of the important techniques for solving network security problem.

    youdao

  • 密码技术飞速发展,特别是公开密钥密码体制的提出,为信息安全提供强有力保护。

    The cryptology, especially the public - key cryptology can offer the highest level of information security.

    youdao

  • 身份认证密钥交换技术保证无线通信安全重要手段

    Identity authentication and key exchange technology is the important means to ensure wireless communication security.

    youdao

  • 密码学安全技术核心,其中的加密解密数字签名密钥交换技术起到保障作用重要机制

    Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.

    youdao

  • 信息安全技术主要包括加密技术代表的密码技术密钥管理技术数据库加密技术

    Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.

    youdao

  • Geambasu女士同事们发明这项技术使用种并不安全网络空间,存储一定时期可以自毁加密密钥

    The technique devised by Ms Geambasu and her colleagues USES one of the least secure areas of the web to store encryption keys that self-destruct after a certain period.

    youdao

  • 首先详细讨论了安全技术相关的一系列关键技术,包括数据拦截技术、数据加密技术密钥管理技术

    Firstly, some key technologies correlated with security are discussed in detail, such as data interception, data encryption, key management, etc.

    youdao

  • 研究功耗分析如何破解密码算法中的密钥的关键技术以此为基础提出防御功耗分析的安全密码算法非常必要的。

    It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.

    youdao

  • 密钥管理技术主要任务如何在公用数据网上安全地传递密钥不被窃取。

    The job of the Key Management is to deliver the key on the network save.

    youdao

  • 随着密码技术飞速发展特别是公开密钥密码体制的提出,为信息安全提供强有力的保护。

    With the rapid progress of cryptology, especially the public-key cryptology can offer the most effective level of information security.

    youdao

  • 战地网络极易受到各种攻击破坏,实现其安全通信密钥管理关键技术

    Key management is an essential technique to secure communication which is critical in the tactical environments where the network infrastructure is vulnerable to various attacks and compromises.

    youdao

  • 方案利用安全数字签名理论技术保证了一个PKI系统CA签名密钥泄露情况下损失最小;在CA需要更换签名密钥时效率最高;

    The scheme utilizes the theory and technology of forward-secure digital signature to guarantee that the loss is the lowest in the case that CA's signing secret key is compromised;

    youdao

  • 给出了数据库加密技术依赖用户恢复密钥管理机制的设计,实现了用户密钥安全存储备份恢复。

    Database encryption and user-dependent restorable key management scheme insure the security of key storing, backuping and restoring.

    youdao

  • 基于密码学公钥技术提出混合密钥加密系统,并加入认证技术,从而构建一个网络环境下虚拟光学信息安全系统模型

    A model of hybrid cryptosystem was proposed with the aid of public key techniques. Through this model, the solution of aforementioned issues may be found.

    youdao

  • 远程安全密钥协议基于鉴别符认证技术具有知识证明

    The Security Remote Password protocol is an identity authentication protocol based on verifier, which has the security property with Zero-knowledge password proofs.

    youdao

  • 基于TPM安全优盘系统使用可信计算平台模块TPM实现密钥存储管理解决密码技术密钥管理的难题

    TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.

    youdao

  • 基于TPM安全优盘系统使用可信计算平台模块TPM实现密钥存储管理解决密码技术密钥管理的难题

    TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定