本文提出了采用限高树密钥结构的分布式lkh组密钥管理协议。
This paper puts forward Distributed LKH group key management protocol based on HLTN key architecture.
另外,本方案采用三层密钥结构进一步增强了无线网络的安全性,实现了安全快速的漫游。
In addition, the solution has enhanced wireless network security by using three-level key structures and achieves a secure fast roaming.
当使用双重安全密钥创建了所有经过的交互点和数据路径时,才能达到安全网络体系结构。
Secure network architecture is achieved when all interaction points and data paths traveled are created using double secure keys.
我开发了一个j2me类,它包含几个用于生成asn . 1数据结构的方法,我还展示了如何利用用户的密码生成一个Kerberos密钥。
I have developed a J2ME class that contains several useful methods for the authoring of ASN.1 data structures, and I have also showed how to generate a Kerberos secret key from a user's password.
XMill的结构编码方案为每个不同的元素和属性名称分配一个整数代码,作为进入元素和属性名称词典的密钥。
The structural encoding scheme of XMill assigns each distinct element and attribute name an integer code, which serves as the key into the element and attribute name dictionaries.
调用keyctl show就可以在树结构中显示密钥。
A call to keyctl show shows the keys in a tree-like structure.
队列管理器维护一个证书库(密钥资源库),证书库被作为文件(扩展名 .sto )存储在队列管理器目录结构下。
The queue manager maintains a certificate store (key repository), which is stored as a file (extension .sto) under the queue manager directory structure.
在部署文件中,需要指定构成拓扑结构的实例、存储卷、地址和密钥对。
In a deployment file, the instances, volumes, addresses, and key pair that compose the topology will be specified.
XML加密只关于加密和解密结构化信息,而不规定密钥交换的任何特定方法。
Note that XML Encryption is only about encryption and decryption of structured information and does not dictate any particular method of key exchange.
所有业务对象都可以通过它们自己的惟一密钥而不是层次结构密钥来访问。
All business objects are accessible via their own unique key instead of a hierarchical key.
在Kerberos基础结构内,有一个密钥分发中心,即KDC,可以提供票据分发功能。
In a Kerberos infrastructure, we have something called a key distribution center, or KDC, which provides ticket distributing functionality.
本文针对树形结构给出了一种动态密钥对分配方案。
This paper gives a dynamic key-pair assignment scheme for a tree structure.
公钥证书是将实体的身份和公开密钥绑定在一起的一种数据结构。
PKI is the data structure which bind the identity of entity with its public-key.
本文对基于向量空间接入结构的分布式密钥生成进行了研究。
The problem of distributed key generation based on vector space access structures is studied.
该方案可用于任意接入结构,每个托管代理者的子密钥能多次使用。
This scheme is used in task input structure, and every sub key of escrow agent could be reused for many times.
在对批量密钥更新和成员行为进行分析的基础上,对现有的优化密钥树结构进行了优化,并给出了一种实现方法。
Based on batch group rekeying and group members' behavior, a new method which optimizes the current key tree structure is proposed.
完整设计了模型的整个可实现框架:包括各组成模块的功能、相关数据结构和消息编码格式、证书管理库和密钥环的设计,以及具体的访问控制流程等。
Those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on.
文中结合完全二叉树结构,提出了一种新的基于身份的群密钥协商协议。
Combined with complete binary tree architecture, a new identity-based group key agreement protocol is proposed in this paper.
探讨了SSH协议体系结构,介绍ssh三个层次:传输层协议、用户认证协议、连接协议和密钥机制。
It probes into the structure of SSH protocol system and discusses the three different levels of SSH, namely transport layer protocol, user authentication protocol and connection protocol.
如果未经授权的用户知道了您的纯文本块结构的任何信息,他们就可以利用该信息来解密已知的密码文本块,并有可能重新获得您的密钥。
If unauthorized users know anything about the structure of a block of your plain text, they can use that information to decipher the known cipher text block and possibly recover your key.
空间信息网络存在不同的通信方式,网络拓扑结构动态多变,对组播密钥管理提出了特殊的要求。
There are many communication ways in space information network(SIN). The network topology changes dynamically, which brings out special requirements for multicast key management.
新结构在密钥管理、全可靠性以及认证方法方面都比传统的结构有较大的改进。
The main advantages include better session key management, improved security, greater availability, anti denial of service attacks and simple authentication.
基于树结构与门限的思想,王志伟等人提出了一个高效的组密钥协商协议(TTS协议),并认为他们的协议是安全的。
Based on tree and threshold idea Wang et al. proposed an efficient group key agreement protocol (TTS) and claimed that their protocol is secure.
文中讨论了怎样在非对称密钥体制下集成一个网络加密系统及相关的密钥管理算法,并结合银行的网络系统的结构进行了一些探讨。
This paper describes how to integrate a networks cryptographic system based on the non-symmetric cryptographic system, and the correlative key-management method.
证明结果表明,该密钥封装结构方案能够达到密码工作流模式下要求的接收者安全和外部安全。
The proposed scheme can satisfy the receiver security and the external security characters in cryptographic work.
目前,密钥图的方案已经被提出,其中树形结构密钥图和星型结构是两种重要类型。
In the paper, analyzed the individual rekeying on key tree and key star and the server' cost on batch rekeying of key tree and key star.
该方法利用总结出的密钥管理方案的评估指标,构造了综合评估结构模型。
This method constructs model of comprehensive evaluation with metrics worked out on key management.
提出的方案基于层次密钥树结构和多方密钥协商并具有密钥独立性和无状态型等特征。
The scheme is based hierarchical key tree and multi-party key agreement. It possesses the desired properties, such as key independence and key statelessness.
提出的方案基于层次密钥树结构和多方密钥协商并具有密钥独立性和无状态型等特征。
The scheme is based hierarchical key tree and multi-party key agreement. It possesses the desired properties, such as key independence and key statelessness.
应用推荐