It is the standard behind secure communication on the Internet, integrating data cryptography into the protocol.
它是支持在Internet上进行安全通信的标准,并且将数据密码术集成到了协议之中。
The name was both an homage to cryptography (a “zero-knowledge proof” is a standard cryptographic protocol) and a promise of a specific relation between the application provider and the users.
这个名字既是对加密算法(“0知识证明”是一种标准加密协议)的致敬,也是对服务提供商和用户之间特定关系的一种约定。
The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.
SSL协议基于公钥密码,加密密钥成对地出现在公钥密码中,它们是在数学上是相关的,但无法由一个推知另一个。
Distributed multiplication computation is an important part of secure multi-party computation and a basic protocol of threshold cryptography.
分布式乘法计算是安全多方计算中的重要部分,也是设计门限密码体制的基本协议。
The technology adopted include categories of data fragment reassembly, protocol conversion, cryptography, intrusion detection, virus, and keyword filtering, authentication and audit and so on.
网闸所采用的技术包括数据分片重组、协议转化、密码学、入侵检测、病毒以及关键字过滤、身份验证及审核等。
Combining process of bidding and cryptography, an efficient and secure inviting public bidding and bidding protocol of construction engineering is proposed with signature based on proof of knowledge.
论文研究了密码学在工程招投标中的应用,把招投标流程与密码学知识相结合,基于知识证明签名给出一个安全有效的电子招投标方案。
In modern cryptography, one way to ensure the security of a protocol is by means of provable security.
在现代密码学中,可证安全是保证协议安全的一种方式。
On the theoretical basis above, we achieve an secure electronic exchange system based SSL protocol, which use object-oriented programming design, cryptography technology and COM technology.
依据上述理论基础,采用面向对象的程序设计方法,在SSL协议的基础上,探索了利用COM组件技术实现一个安全电子交易的二次加解密组件系统。
Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.
基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
应用推荐