Some new indexes about cryptographic security are introduced, and their relationships are discussed.
引入了密码安全的一些新度量指标,讨论了这些指标之间的关系。
Gets a delegate that will be called to validate the format (not the cryptographic security) of an XML signature.
获取一个委托,将调用此委托以验证XML签名的格式(而非加密安全性)。
This paper describes the basic building blocks of a cryptographic security system and the choice which must be made during the implementation of cryptographic security.
本文描述了密码保密系统的基本构成及实施密码保密过程中必须作出的选择。
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
此特性让这三种关键的安全技术能够利用 ACF提供的硬件密码计算加速设施。
The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.
NFSRPC请求可以使用密码认证的能力提供了端到端的NFS安全支持。
Unlike other outlets, we provide a high security anonymous drop box fortified by cutting-edge cryptographic information technologies.
和其他媒体不同的是,我们提供一个高度安全的匿名泄密箱,这些信息箱绑定了尖端的加密信息技术。
Security credentials for web services Security in the form of JCEKS key stores or the private keys/public certificates required for the specified cryptographic operations
用于Web服务安全的JCEKS密钥存储库形式的安全凭据或指定加密操作所需的私钥/公开证书。
Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication between clients and servers.
TransportLayerSecurity (TLS)是一种密码协议,可以在客户机和服务器之间提供安全的通信。
Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.
SecureSocketsLayer (SSL)协议是一种加密协议,可为网络上的数据通信提供隐私和安全保障。
For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.
为了确保安全,可以结合使用rsync与加密技术,确保在没有正确的密码或加密密钥的情况下无法读取远程文件。
Security credentials for web services security in the form of JCEKS key stores or the private keys or public certificates required for the specified cryptographic operations.
用于Web服务安全的JCEKS密钥存储库形式的安全凭据或指定加密操作所需的私钥或公开证书。
There may be cryptographic techniques, skill level of vendors' staff to ensure the security and some new methods may be devised to solve this issue.
可以借助加密技术和云计算厂商的技能优势,确保信息安全。同时,可以设计一些新的方法,解决这个问题。
Provable Security is the essential requirement of modern cryptographic schemes.
可证明安全是现代密码方案的基本要求。
Thismethod brings serious challenge for the security of Cryptographic Chip.
该方法的出现给密码芯片的安全带来了严重的挑战。
A very important factor of network security is cryptographic protocols.
网络安全中一个非常重要的因素就是密码协议。
As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.
混沌密码算法是一种快速加密算法,在安全性要求较高的领域中,有着非常广阔的应用前景。
Cryptographic technology is applied to information system to ensure its security.
为了保证信息系统的安全性,密码技术被应用于信息系统中。
This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security.
文章简述了SSLv3.0的分层结构、协议状态、握手协议和加密参数计算,并对其安全性做出分析。
However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol.
遗憾的是,加密协议的设计是一项非常细致的工作,任何细小的错误都可能会影响到协议的安全功能。
BAN family of logic is used to analyze the security of cryptographic protocols.
类BA N逻辑是一种用于分析密码协议安全性的逻辑。
Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.
差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。
Cryptographic modules are the important components to protect information, they are required to be protected, and the security requirements for them must be standardized.
密码模块是保护信息的核心部件,其自身安全也需要得到保证,这种安全性要求需要规范化。
In this work, both the security on cryptographic functions and the relation of security measure indexes are mainly researched.
本文主要研究了密码函数的安全性及相关的度量指标。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
密码协议分析与设计的基础是对其进行形式化建模。
The core of information security is the cryptographic technique.
信息安全的核心是密码技术。
The proposed scheme can satisfy the receiver security and the external security characters in cryptographic work.
证明结果表明,该密钥封装结构方案能够达到密码工作流模式下要求的接收者安全和外部安全。
So the design and analysis of cryptographic protocols are the troubles of information security.
因此密码协议设计和密码协议分析是信息安全领域的难题。
All kinds of cryptographic algorithms used can insure security of these activities.
使用各种各样的加密算法,可以保证这些活动的安全性。
All kinds of cryptographic algorithms used can insure security of these activities.
使用各种各样的加密算法,可以保证这些活动的安全性。
应用推荐