The size of computer networks has made network security a critical issue. Protocol security and algorithm security are two fundamental aspects of network data security.
网络的普及使得网络安全问题日益重要,协议的安全性和密码算法的安全性是网络数据安全的两个最基本的概念。
Security researchers have recently demonstrated exploits against the MD5 algorithm which allowed them to forge usable certificates.
安全调查人员最近证明,利用MD5算法允许他们伪造可用的证书。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
The problem in this case was that the policy used different algorithm suites for the bootstrap message exchange with the Security Token service (STS) and the actual conversation with the service.
在这种情况下问题是,对于与SecurityTokenService (STS)的引导程序消息交换和与服务的实际会话,策略使用不同的算法套件。
Although WS-I is still working on finalizing the Basic Security Profile, there is one aspect of the BSP that we felt needed to be further constrained — the choice of encryption algorithm.
尽管WS - i仍在进行BasicSecurityProfile的收尾工作,但我们认为需要对BSP的一个方面进行进一步的约束:即加密算法的选择。
This tutorial does not purport to be an example of security in user authentication; instead, it will demonstrate the usage of XForms in the well-known algorithm for logging in and account creation.
这篇教程的主旨并不是示范用户身份验证的安全性。取而代之,本文将演示如何在众所周知的登录和创建帐户的算法中使用Xforms。
The MD5 password encryption algorithm further improved security by allowing more robust passwords. An example of a shadow password entry is below.
MD 5密码加密算法支持更为可靠的密码,从而进一步提高了安全性。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
So the algorithm has highly security and robustness.
算法具有很高的安全性和较好的稳健性。
Today, Google cracked an old encryption algorithm called SHA-1, although this does not sound like the most significant milestone in the network security.
今天谷歌破解了一种名为SHA-1的老式加密算法,尽管此事听起来不像是网络安全界最重大的里程碑。
Through searching the problem of network security evaluation, this paper presents an algorithm to evaluate network security.
对网络系统安全评估问题进行了研究,提出了一种评估网络系统安全的新算法。
Code access security is a stack-based algorithm.
代码访问安全是一个基于堆栈的算法。
The thought of network security situation prediction based on cloud and an algorithm of network security situation prediction based on cloud were proposed.
提出了基于云的网络安全态势预测思想和基于云的网络安全态势预测规则挖掘算法。
Ca authentication center provides highly intensive encipher algorithm, highly liable security mechanism and management strategy, automatic generating key and certificate management.
CA认证系统拥有高强度的加密算法,高可靠性的安全机制及完善的管理及配置策略,提供自动的密钥和证书管理服务。
Numerical result from IEEE-14 test system shows that the presented algorithm reflects the relationship of security and economy and is helpful to construct reasonable pricing system in power market.
在IEEE - 14测试系统的计算结果表明,算法反映了安全因素和经济因素的关系,有助于建立电力市场中合理的用户电价体系。
The experimental results show that both of them can resist signal distortions such as JPEG compression, Gauss noise, and the improved algorithm has better robustness and security.
从试验结果看,两种算法能够抵抗JPEG压缩以及高斯噪声等信号处理的攻击,且改进后的算法水印鲁棒性及保密性得到了增强。
An digital image watermark algorithm is proposed based on the synergetic neural network, combined with encryption technique, to guarantee its robustness and security.
为保证图像数字水印的鲁棒性和安全性,结合加密技术,提出了一种使用协同神经网络的图像数字水印算法。
This algorithm has been applied successfully in the Postal Saving Security Communication System.
该算法已在绿卡安全通信系统中成功应用,效果良好。
It is not the only option which to increase the key length of encryption algorithm in order to enhance security.
仅通过增加加密算法的密钥长度来达到增强安全性已不再是唯一的可行方法。
Of course, the security rendered by such an antiquated algorithm is nil.
当然,这过时的算法提供的安全是毫无价值的。
This research is helpful to the application of stream cipher algorithm in information security and modern secure communication equipment.
该研究结果有助于序列密码算法在信息安全及现代保密通信设备中的应用。
Experimental results show that the algorithm is robust and security to some watermarking attacks.
实验表明,该算法对诸多攻击具有很好的鲁棒性和安全性。
The critical techniques such as data processing, design of reviewing algorithm and security control strategy are discussed.
讨论了系统的关键技术,包括数据的处理、阅卷算法的设计和安全控制策略等。
As dynamic changes of topology, position-based routing algorithm and security routing are focuses and key points in this field.
由于拓扑结构的动态变化,位置路由算法和安全路由是其研究的热点和重点。
Based on trapdoor one-way function, this paper presents a RSA -based probabilistic public-key algorithm with security and efficiency and the correctness of algorithm was proved.
根据单向陷门函数的陷门性质,文章设计了一种安全有效的基于RSA的概率公钥密码算法,并对其正确性进行了证明。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
I am also not disclosing the encryption algorithm used for providing ultimate security standards.
我也没有披露加密算法,用于提供最终的安全标准。
A security alert fusion algorithm based on temporal scenario recognition is proposed.
提出了一种基于时间场景识别的安全报警熔合算法。
Aiming at the current faults of algorithm for video encryption which existed in security, compatibility and practicality, it was proposed a chaos based algorithm for video encryption.
针对现有流媒体加密算法在安全性、通用性和实用性方面存在的缺陷,提出一种全新的基于混沌参数可变序列的流加密算法。
Aiming at the current faults of algorithm for video encryption which existed in security, compatibility and practicality, it was proposed a chaos based algorithm for video encryption.
针对现有流媒体加密算法在安全性、通用性和实用性方面存在的缺陷,提出一种全新的基于混沌参数可变序列的流加密算法。
应用推荐