• Today we have seen more and more public key protocols use in networked and distributed systems, so we must select an secure public key protocol otherwise it will jeopardy the secrecy of networks.

    目前,密码系统大量使用基于公钥密码协议,这些协议的安全性直接影响着网络系统的安全。

    youdao

  • In any case, Public Key Certificates (PKCs) are required for these protocols.

    任何情况下公共密钥证书(蛋白)需要这些协议

    youdao

  • The public key cryptosystem secure against chosen ciphertext attacks is a very strong secure cryptosystem and is a useful primitive for designing protocols that resisting active adversary.

    选择密文攻击公钥密码体制安全性很高的密码体制,它是设计主动攻击的协议非常有用的工具。

    youdao

  • ADFS USES a set of secure protocols like SSL and Public Key encryption to provide Single Sign on to applications that are not hosted inside your network.

    ADFS使用SSL公开密钥加密安全协议提供了登录访问没有放在内部网络上的应用程序这个便利。

    youdao

  • On the ground of deduction, the paper chose a more serials of public key authentication protocols to use the tool SPV for automatic verification, and got expected results.

    进行公理推导基础上,本文利用工具SPV更多公钥认证协议进行了自动化验证协议推导取得了一致的验证结果。

    youdao

  • It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.

    辫子种新兴适用于量子计算机时代的公钥密码平台但是目前基于辫子群的密钥协商协议AAGAAFGBDH不同程度的安全弱点。

    youdao

  • To improve the inefficiency of the existing key distribution protocols in the secure broadcasting, an ideal multi-recipient public key encryption scheme to achieve the secret broadcasting is proposed.

    针对现有安全广播协议密钥分发效率较低问题,提出一种通过多接收者公钥加密实现安全广播的方法。

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定