Secret key cryptography is one of the most important technologies in distributed systems security.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
Kerberos was designed based on secret key cryptography and using trusted third party authentication.
Kerberos是根据秘密密钥加密并使用可信第三方身份验证而设计的。
A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.
对称算法要求消息的发送方和接收方使用同一个秘钥;这通常被称作秘钥密码术。
It is designed to provide strong authentication and encrypted communication for client-server applications by using secret-key cryptography.
它的设计目的是,通过使用密钥加密技术,为客户端-服务器应用程序提供强大的身份验证和加密通信。
Some applications try to combine public - and secret-key cryptography to achieve security and performance.
有些应用试图把明钥和秘钥密码术结合起来,以获得安全性和高性能。
Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.
公钥和非对称公钥密码学使用一对密钥,其中的一个定义为私钥并加密存放,另外一个被称为公钥,通常无须加密。
Threshold cryptography provides a way in which the secret key can be shared secretly.
门限密码学提供了一种安全的密钥共享方法。
The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.
现有两种主要的、相互竞争着的密码术,被称作秘钥(即对称)系统和明钥(即不对称)系统。
The two main competing cryptography schemes are known as the secret-key (symmetric) system and the public-key (asymmetric) system.
现有两种主要的、相互竞争着的密码术,被称作秘钥(即对称)系统和明钥(即不对称)系统。
应用推荐