• Secret key cryptography is one of the most important technologies in distributed systems security.

    秘密密钥加密分布式系统安全机制中一重要技术

    youdao

  • Kerberos was designed based on secret key cryptography and using trusted third party authentication.

    Kerberos根据秘密密钥加密使用可信第三身份验证而设计的。

    youdao

  • A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.

    对称算法要求消息发送方接收方使用同一个通常被称作秘钥密码术

    youdao

  • It is designed to provide strong authentication and encrypted communication for client-server applications by using secret-key cryptography.

    设计目的通过使用密钥加密技术,客户端-服务器应用程序提供强大的身份验证加密通信

    youdao

  • Some applications try to combine public - and secret-key cryptography to achieve security and performance.

    有些应用试图秘钥密码术结合起来,获得安全性高性能

    youdao

  • Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.

    公钥对称公钥密码学使用一对密钥,其中个定义加密存放另外一个称为公钥,通常无须加密。

    youdao

  • Threshold cryptography provides a way in which the secret key can be shared secretly.

    门限密码学提供了一种安全密钥共享方法

    youdao

  • The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.

    现有两种主要的、相互竞争着的密码术,称作钥(即对称系统钥(即不对称)系统。

    youdao

  • The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.

    现有两种主要的、相互竞争着的密码术,称作钥(即对称系统钥(即不对称)系统。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定