• 本文提出采用高树密钥结构分布式lkh密钥管理协议

    This paper puts forward Distributed LKH group key management protocol based on HLTN key architecture.

    youdao

  • 另外方案采用三层密钥结构进一步增强了无线网络安全性实现了安全快速漫游

    In addition, the solution has enhanced wireless network security by using three-level key structures and achieves a secure fast roaming.

    youdao

  • 使用双重安全密钥创建了所有经过的交互数据路径时,才能达到安全网络体系结构

    Secure network architecture is achieved when all interaction points and data paths traveled are created using double secure keys.

    youdao

  • 开发了j2me它包含几个用于生成asn . 1数据结构方法,我展示了如何利用用户密码生成一个Kerberos密钥

    I have developed a J2ME class that contains several useful methods for the authoring of ASN.1 data structures, and I have also showed how to generate a Kerberos secret key from a user's password.

    youdao

  • XMill结构编码方案每个不同元素属性名称分配一个整数代码作为进入元素和属性名称词典密钥

    The structural encoding scheme of XMill assigns each distinct element and attribute name an integer code, which serves as the key into the element and attribute name dictionaries.

    youdao

  • 调用keyctl show就可以结构显示密钥

    A call to keyctl show shows the keys in a tree-like structure.

    youdao

  • 队列管理维护一个证书密钥资源库),证书库作为文件扩展名 .sto )存储在队列管理器目录结构

    The queue manager maintains a certificate store (key repository), which is stored as a file (extension .sto) under the queue manager directory structure.

    youdao

  • 部署文件中,需要指定构成拓扑结构实例存储卷地址密钥对。

    In a deployment file, the instances, volumes, addresses, and key pair that compose the topology will be specified.

    youdao

  • XML加密关于加密解密结构信息,而规定密钥交换任何特定方法

    Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.

    youdao

  • 所有业务对象可以通过它们自己的惟一密钥而不是层次结构密钥访问

    All business objects are accessible via their own unique key instead of a hierarchical key.

    youdao

  • Kerberos基础结构内,一个密钥分发中心KDC,可以提供票据分发功能

    In a Kerberos infrastructure, we have something called a key distribution center, or KDC, which provides ticket distributing functionality.

    youdao

  • 本文针对树形结构给出了一种动态密钥分配方案

    This paper gives a dynamic key-pair assignment scheme for a tree structure.

    youdao

  • 公钥证书实体身份公开密钥绑定在一起数据结构

    PKI is the data structure which bind the identity of entity with its public-key.

    youdao

  • 本文对基于向量空间接入结构分布式密钥生成进行了研究。

    The problem of distributed key generation based on vector space access structures is studied.

    youdao

  • 方案用于任意接入结构每个托管代理密钥多次使用。

    This scheme is used in task input structure, and every sub key of escrow agent could be reused for many times.

    youdao

  • 批量密钥更新成员行为进行分析的基础上,对现有的优化密钥结构进行了优化,给出了种实现方法

    Based on batch group rekeying and group members' behavior, a new method which optimizes the current key tree structure is proposed.

    youdao

  • 完整设计了模型整个可实现框架包括各组成模块的功能相关数据结构消息编码格式证书管理密钥的设计,以及具体访问控制流程

    Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.

    youdao

  • 文中结合完全二叉结构提出一种新的基于身份密钥协商协议

    Combined with complete binary tree architecture, a new identity-based group key agreement protocol is proposed in this paper.

    youdao

  • 探讨SSH协议体系结构介绍ssh三个层次传输协议、用户认证协议、连接协议密钥机制。

    It probes into the structure of SSH protocol system and discusses the three different levels of SSH, namely transport layer protocol, user authentication protocol and connection protocol.

    youdao

  • 如果未经授权用户知道文本结构任何信息他们就可以利用信息解密已知密码文本块,有可能重新获得您的密钥

    If unauthorized users know anything about the structure of a block of your plain text, they can use that information to decipher the known cipher text block and possibly recover your key.

    youdao

  • 空间信息网络存在不同通信方式,网络拓扑结构动态多变,对组播密钥管理提出特殊要求

    There are many communication ways in space information network(SIN). The network topology changes dynamically, which brings out special requirements for multicast key management.

    youdao

  • 结构密钥管理、全可靠性以及认证方法方面都传统结构有较大改进

    The main advantages include better session key management, improved security, greater availability, anti denial of service attacks and simple authentication.

    youdao

  • 基于结构门限思想王志伟等人提出了一个高效的密钥协商协议(TTS协议),认为他们的协议安全的。

    Based on tree and threshold idea Wang et al. proposed an efficient group key agreement protocol (TTS) and claimed that their protocol is secure.

    youdao

  • 文中讨论了怎样对称密钥体制集成一个网络加密系统及相关的密钥管理算法,结合银行的网络系统的结构进行一些探讨。

    This paper describes how to integrate a networks cryptographic system based on the non-symmetric cryptographic system, and the correlative key-management method.

    youdao

  • 证明结果表明,密钥封装结构方案能够达到密码工作流模式下要求的接收者安全和外部安全

    The proposed scheme can satisfy the receiver security and the external security characters in cryptographic work.

    youdao

  • 目前,密钥图的方案已经被提出,其中树形结构密钥星型结构是两种重要类型。

    In the paper, analyzed the individual rekeying on key tree and key star and the server' cost on batch rekeying of key tree and key star.

    youdao

  • 方法利用总结密钥管理方案的评估指标构造综合评估结构模型

    This method constructs model of comprehensive evaluation with metrics worked out on key management.

    youdao

  • 提出的方案基于层次密钥结构多方密钥协商具有密钥独立性无状态型等特征

    The scheme is based hierarchical key tree and multi-party key agreement. It possesses the desired properties, such as key independence and key statelessness.

    youdao

  • 提出的方案基于层次密钥结构多方密钥协商具有密钥独立性无状态型等特征

    The scheme is based hierarchical key tree and multi-party key agreement. It possesses the desired properties, such as key independence and key statelessness.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定