It consists of the protocols of automatic key management, authentication and encryption.
该体系包括自动密钥管理、认证、加密协议。
The private key forever in chip, and public key authentication and encryption to send to the chip sensitive data.
这个私有密钥永远在芯片里,而公共密钥用来认证及加密发送到该芯片的敏感数据。
Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks.
安全机制通过增加MAC帧的认证和保密以防御MAC层的安全攻击。
In the design process, system security and data integrity are ensured by user authentication and encryption respectively.
在设计过程中,通过对用户的认证与数据加密机制来确保系统的安全性与数据的完整性。
HTTP are the verbs: GET, PUT and POST as well as a number of thoroughly tested solutions in the fields of authentication and encryption.
HTTP是动词:GET、PUT和POST以及很多在身份验证和加密领域经过仔细测试的解决方案。
In a strategy paper published last week, the EU said research was needed to make tags more secure - through authentication and encryption.
欧盟在上周发表的一份策略文件里表示,有必要通过鉴定和加密研究使标签更安全。
It information security professionals in the medical industry appear to be reluctant to deploy document authentication and encryption for users.
似乎医疗产业的IT信息安全专家们很不情愿为用户提供文档认证和加密功能。
The threats to EPON security are analyzed in detail in this paper. The main issues about authentication and encryption are also discussed.
本文详细分析了EPON系统面临的安全隐患,讨论了鉴权与加密的一些关键问题。
The main difference between NIS and NIS + is that the latter supports authentication and encryption for data exchanges between the NIS master and slave computers.
NIS和NIS +间的主要区别在于,后者支持nis主计算机和从计算机间的身份验证和数据交换加密。
This mechanism provides the functions of bidirectional identity authentication and key negotiation, and makes SIP authentication and Encryption more flexible.
该机制能实现双向身份认证和密钥协商功能,使SIP认证和加密更为灵活。
In the existing authentication and encryption program, if the signer denies his signatures to any other receiver cannot verify the honesty of the signature verification.
现有的认证加密方案中,如果签名者否认签名,接收者不能向其它任何验证者证实签名者的诚实性。
The Lotus Mobile Connect clientless option, that is, Lotus Mobile Connect HTTP access services, USES the same strong authentication and encryption algorithms as the full VPN client.
LotusMobileConnectclientless选项,即Lotus Mobile ConnectHTTP访问服务,使用与纯vpn客户端同样强大的认证和加密算法。
The former, RSH, is a standard remote shell system that offers basic authentication security, but no encryption, while the latter, SSH, offers both authentication and encryption of the data.
前者(rsh)是一种标准的远程Shell系统,它提供了基本的身份验证安全性,但不提供加密功能,而后者(ssh)提供了基本的身份验证和数据加密功能。
Considering the characteristics of EPON, we introduce a "churning" policy and modify the process of register and OAM frames, thus to achieve an efficient authentication and encryption scheme.
重点结合EPON系统自身的特点,通过对注册过程以及OAM帧的修改,结合“搅动”策略实现了一种有效的鉴权与加密方案。
A protocol of electronic election based on elliptic curve is proposed. The digital signature based on elliptic curve is used in this protocol. It provides the identity authentication and encryption.
提出了一个基于椭圆曲线的电子选举协议,该协议中多次用到基于椭圆曲线的数字签名,不仅达到了相应的身份认证,同时达到了加密的作用。
A troublesome area is the management of the keys used for encryption and authentication.
一个麻烦的领域是用于加密和身份验证的密钥的管理。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
Past NFS versions did not have this ability and therefore could not negotiate for the quality of protection, data integrity, the requirement for authentication, or the type of encryption.
以前的NFS版本都没有这种能力,因此不能对保护的质量、数据的完整性、认证的要求或加密类型进行协商。
We have presented the solutions to security problems in authentication, authorization, and protecting data through encryption.
我们为认证、授权和通过加密保护数据这些方面的安全问题提供了解决方案。
Authentication in DB2 does not only involve encrypting user names and passwords but also allows for encryption of data as it travels across the network between the clients and the server.
DB 2中的身份验证不仅涉及对用户名和密码进行加密,还允许对客户机与服务器之间通过网络传输的数据进行加密。
The release is capable of testing authentication, digital signature and encryption.
这个发布可以测试身份认证、数字签名以及加密。
Encryption is not directly related to authentication and authorization but is an important aspect of protecting data, during transit or at rest, from unauthorized users.
加密与认证和授权没有直接的关系,但是,在保护传输中的或静止的数据不受未经授权用户访问的时候,它也是一个重要的方面。
Another troublesome area is the management of the keys used for encryption and authentication.
另一个麻烦的领域是用于进行加密和身份验证的密钥的管理。
When configuring a secure environment, you must make sure that every component provides for appropriate authentication, authorization, and encryption of network traffic.
在配置安全环境时,您必须确保所有组件都能为网络通信提供相应的身份验证、授权和加密。
Thus, for the most part, the infrastructure provides for reasonable authentication, authorization, and encryption of administrative traffic by default.
因此,在大多数情况下,基础设施默认地为管理通信流提供合理的身份验证、授权和加密。
SSL USES encryption techniques, digital signatures and digital certificates to provide message privacy, message integrity and mutual authentication between clients and servers.
SSL使用加密技术、数字签名和数字证书,在客户端和服务器之间提供消息隐私、消息完整性和相互验证。
You can also provide user id and password information for database authentication, and you can select the encryption method for the password.
还可以提供用户ID和密码信息,用于数据库身份验证,可以选择密码的加密方法。
DATA_ENCRYPT_CMP - This specifies that the server accepts encrypted server authentication schemes and the encryption of user data.
DATA_ENCRYPT _ CMP——这指定服务器接受加密的SERVER身份验证模式和用户数据的加密。
The SOAP 1.1 protocol does not yet define encryption and authentication methods.
SOAP 1.1协议还没有定义加密和认证的方法。
SSH offers certificate based authentication, strong encryption, and other features, and is considered to be far more secure.
SSH提供基于验证的证书、强加密和其他特性,并且被认为安全多了。
应用推荐