A classical message authenticated encryption protocol based on quantum one-way functions was proposed.
给出了一个基于量子单向函数的非交互式经典消息认证加密协议。
Then to combine the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides.
然后,利用改进的加密方案,结合RS A签名算法,设计了一个双方不可否认的小公钥rsa加密协议。
TACACS is an encryption protocol and therefore less secure than the later TACACS + and Remote Authentication Dial-In User Service protocols.
TACACS是一个安全的加密协议,因此低于后来TACACS +和远程认证拨号用户服务协议。
Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.
某种可能使用IP安全性协议 (IPSEC)的网络级加密形式(例如虚拟专用网 (VPN))是最可取的解决方案,虽然也有其他合理的选择。
Mediations perform a set of actions on the messages that pass through them to mediate the non-semantic characteristics; the actions include protocol switching, translation, encryption, and routing.
中介对通过它们传递的消息执行一组操作以协调非语义特征;这些操作包括协议切换、转换、加密和路由。
The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.
SSL协议基于公钥密码,加密密钥成对地出现在公钥密码中,它们是在数学上是相关的,但无法由一个推知另一个。
This proof of possession is similar to how the SSL handshake protocol uses encryption to prove that a client is in fact the holder of a private key, without sending the key itself.
这种所有权证明类似于SSL握手协议使用加密来证明客户端是私有密匙的持有者,而不需要发送密匙本身。
The SOAP 1.1 protocol does not yet define encryption and authentication methods.
SOAP 1.1协议还没有定义加密和认证的方法。
All client communications are encrypted with strong encryption algorithms, through SSL on HTTP calls and through RC2 in the Lotus Sametime instant messaging protocol.
所有客户端的通讯都是用强加密算法进行加密,通过HTTP调用上的SSL和LotusSametime即时通讯协议的RC2。
When using standard FTP to transfer files, the protocol sends the necessary account name and password without encryption.
当使用文件传输协议传送文件时,该协议发送未经解密的必需帐户名及密码。
Network encryption occurs at the network transfer layer of a selected protocol.
网络加密在选定协议的网络传输层上进行。
The SSL protocol is used for encryption of data for secure data transmission.
SSL协议的作用是将数据进行加密,保证数据传输安全。
It was demonstrated that the proposed protocol was not only a secure encryption scheme, but also a secure authentication scheme.
证明了给出的协议既是一个安全的加密方案,也是一个安全的认证方案。
The difference is that the conversations are scrambled from end to end, using a special form of encryption called SCIP (secure communications interoperability protocol).
区别在于通话是端到端加密编码的,通过被称为SCIP (securecommunications interoperability protocol,安全交互通讯协议)的特殊形式。
A protocol of encryption for security in sensor networks is proposed, and some problems of realization and characteristics for this protocol are analyzed.
给出了一种针对传感器网络的安全加密协议,并对该协议的一些实现问题及其特点进行了分析。
Protocol analysis module, asynchronous encryption and SADB realized are discussed in the system of virtual private network.
本文主要讨论了在虚拟专用网络系统中协议分析模块、异步加密模式和SADB的实现。
The other one is to analyze Address Resolution Protocol (ARP) and implement the transparency of the security and encryption route platform to the original network structure by ARP cheat technology.
其二,分析ARP协议的实现细节,采用ARP欺骗技术实现安全加密路由平台对原有网络结构的彻底透明。
Taking advantage of the commutative encryption, the proposed buyer-seller watermarking protocol is secure and fair to both sides in digital copyright protection.
提出了一种基于交换加密技术的安全公平买方-卖方水印协议,用于保护数字内容版权。
Additionally, we discuss the security problem of PPP protocol, including encryption and authentication techniques, which ensures the safety of packets in transit.
还研究了PPP协议的安全问题,包括协议的加密和认证机制,确保报文转发过程中的高速和安全性。
According to ATA protocol, PHES used hardware encryption method in FPGA to achieve the transparent data encryption and high data throughput rate by pipeline operation.
根据ATA协议,该系统利用FPGA硬件加密方法实现数据透明加密和流水线操作来达到高吞吐率。
A protocol of electronic election based on elliptic curve is proposed. The digital signature based on elliptic curve is used in this protocol. It provides the identity authentication and encryption.
提出了一个基于椭圆曲线的电子选举协议,该协议中多次用到基于椭圆曲线的数字签名,不仅达到了相应的身份认证,同时达到了加密的作用。
SSL is a protocol that supports authentication and data encryption.
SSL协议正是一个提供身份鉴别和数据加密的协议。
Encryption and authentication mechanism has no use to defend against wormhole attack. It is need to embed corresponding mechanism in routing protocol to guarantee security.
虫洞攻击容易发动,很难被检测到,一般的加密认证方式不能防御虫洞攻击,需要在路由协议中有针对性添加特定的安全机制。
This paper deeply researches on EKE protocol and CAPTCHA on the base of the knowledge of Data Encryption and Information Security.
本文主要在掌握了一定的数据加密与信息安全、身份认证等知识的基础上,对EKE协议和CAPTCHA作了较为深入的研究。
SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.
SSL协议采用了对称加密、非对称加密、信息摘要、数字签名、数字证书等密码学技术。
In the new protocol we raised, QKD is used in both authentication and data encryption in order to ensure the absolute security of wireless communications.
在提出的新协议中,量子密钥分发被用于认证和数据加密当中,由此可以保证无线通信网络的绝对安全性。
Encryption technology, security system and security protocols are the major supports for present business transaction, while security protocol usually adopts SSL and SET protocol.
而商务交易安全主要是通过加密技术、安全机制、安全协议进行保证的。电子商务中的安全协议主要采用SSL协议和SET协议。
Integration of the new nuclear agreement and SSL encryption security protocol to achieve data transmission 128-168 bit strong encryption.
集成核新加密协议及SSL安全通讯协议,实现数据传输的128- 168位强加密。
Analyzes and proves the feasibility mat a connection oriented TCP protocol can carry out data encryption, authentication and signature in theory. Furthermore, a secure connection protocol is advanced.
分析和证明了在提供面向连接服务的TCP层实现报文加密、认证和签名的可行性,提出了一种TCP保密连接协议。
According to analysing the result, the encryption algorithms that SET protocol used has been already no longer safe, and has heavy influence the speed of the system and trade cost.
从分析结果来看,SET协议使用的加密算法已不再安全,而且对系统的速度和交易成本有较大的影响。
应用推荐