这些协议都已经经过加密,使用的是操作系统身份验证方法。
Both of these protocols are encrypted and use the operating systems method of authentication.
前者(rsh)是一种标准的远程Shell系统,它提供了基本的身份验证安全性,但不提供加密功能,而后者(ssh)提供了基本的身份验证和数据加密功能。
The former, RSH, is a standard remote shell system that offers basic authentication security, but no encryption, while the latter, SSH, offers both authentication and encryption of the data.
本模型不仅适用于实时的、大数据传输的网络系统,而且实现了密钥管理、加密管理、数字签名以及身份认证等功能。
The model not only realizes key management, encrypted communication, digital signature and identity authentication, but also is fit for network system with real time and large data transfer.
方案不仅支持系统内人员和设备的密钥管理、身份认证及公钥密码运算,而且还对加密密钥进行管理。
This scheme not only supports secret key management and identity authentication of personnel and equipment, but also constructs secret key management center and manages encrypted key of the system.
同时,基于身份加密的公钥密码系统中也存在着一些问题,如身份认证、私钥分发以及密钥托管等。
However, there are some problems in IBE such as identity authentication, private key distribution, key escrow and so on.
提出一个基于分级身份的密码系统:包括分级的基于身份的加密和签名方案。
A new hierarchical identity based (ID-based) cryptosystem is proposed, including hierarchical ID-based encryption and signature.
为了提高航空通信系统的安全性,论文提出了一个简洁有效的身份认证方案,并在注册过程中引入加密技术。
In order to advance the security of Aeronautical Communication System, a simple and effective identity verification scheme was proposed, and the encryption was introduced in logging-on process.
在简化pki系统的研究中,本文首先介绍基于身份的加密算法,然后结合单向哈希链,提出一种基于IBE的改进PKI系统。
In the research of simplifying PKI system, this paper proposes an improved PKI system based on the combine of the IBE and the one-way hash chain.
密钥协商协议在通信系统中为通信的参与者提供身份认证,并为参与者生成一个用来加密传递消息的临时会话密钥。
An authenticated key agreement protocol is used to provide authentication in communication systems, and produces a short-time key that can encrypt the transferred information.
当前一些大型网络数据库管理系统(DBMS)的安全性方法主要包括:身份认证、访问控制、审计跟踪和数据备份,但对一些更为敏感和重要的数据,还需要进行数据加密或者容灾系统的设计。
The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.
当前一些大型网络数据库管理系统(DBMS)的安全性方法主要包括:身份认证、访问控制、审计跟踪和数据备份,但对一些更为敏感和重要的数据,还需要进行数据加密或者容灾系统的设计。
The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.
应用推荐