To safely persist a private key, use a secure key container.
要安全地保存私钥,请使用安全的密钥容器。
The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.
数据块使用一个对称密钥算法进行加密,它使用一个密钥来实现对数据的加密和解密。
The backed-up files were encrypted with a cryptographically-secure key, the only copy of which was on the machine that was lost.
我们使用加密安全密钥对备份文件进行了加密,而密钥位于丢失数据的那台计算机上。
You have a problem of how to avoid initially sending the single secure key from the LDAP server to the LDAP client in plain text.
我们还有一个问题:如何防止出现以正文文本格式将密钥从LDAP服务器发送到 LDAP客户机上的情况。
Nevertheless, quantum cryptography, which is based on quantum physics, has been proved to be an effective technique for secure key distribution.
然而,基于量子物理原理的量子密码学已被证明是保密通信中密钥安全分配的有效手段。
Quantum cryptography, which is based on fundamental physical principles, has been proved to be an effective technique for secure key distribution.
基于量子物理原理的量子密码术已被证明是保密信中密钥安全分配的有效手段。
Encrypted key exchange protocol's goal is to establish a high secure key used for further encryption and authentication through a low secure password.
密钥加密协议的目的是利用安全性低的口令协商安全性高的密钥,进而利用密钥对以后的通信进行加密或身份认证,从而实现安全通信。
How to protect the initiator identifier during the secure key negotiation based on the analysis of IKE is discussed, and the concrete implementation is given.
在对IKE进行分析的基础上,讨论了怎样在安全密钥协商过程中对发起者身份进行保护,并给出了具体实施步骤。
In this paper, we propose a perfectly-secure key distribution scheme for multicasting and prove a lower bound on the size of the user's piece of information in such a scheme.
本文提出了一个多站点传送的密钥分发方案,给出了在一个完全保密的方案中用户信息集合大小的下界,并且构造了一个达到该下界的应用方案。
The quantum communication network marries a variety of GHZ states to well establish the secure key distribution system employed in conjunction with the nodes and control centers.
这个量子密钥传输协议在通信节点和控制中心之间通过多个GHZ对构建安全的密码分配系统。
It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key.
现代密码学认为,任何加密体系的加密和解密算法都可以公开,其安全性在于密钥的保密性。
Double key secure authentication is one of the protection methods used to verify access across different systems.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.
使用强大的算法密钥将所有数据都进行单向加密意味着您的数据非常安全,但是使用时很不方便。
These replacement operators are the key to secure database access.
这些替换操作符是安全数据库访问的关键。
Normally, you have to enter this passphrase every time you want to connect to any remote cloud instance that USES the key, but there is a secure way to avoid this annoyance: Employ an SSH agent.
通常,每次连接使用此密钥的任何远程云实例时,都必须输入这个密码,但是有一种安全的方法可以避免这种麻烦:使用SSH代理。
Thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.
因此,必须建立健壮的身份管理过程来实现身份验证和授权,这是成功实现安全的软件解决方案的关键因素之一。
You need to make sure people are using it and that the key stores are secure.
您需要确保人们准备使用它,并且关键的存储是安全的。
For a truly secure system, the message will be encrypted in a way that requires a mathematical key to unlock it.
实际使用的安全系统中,信息进行加密后,只有借助一段数字密钥才能解密密文。
In addition, the administrator role is required to access traditionally secure information (passwords, key files, etc.) to provide better protection to sensitive data.
另外,还要求管理员角色用传统的方式访问安全信息(密码、密钥文件等等)以更好地保护敏感数据。
To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.
为了便于使用,无线承载网络还支持“第二密钥”,也称作“用户安全密钥”,使用起来更加友好,但是安全性稍差。
After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.
在身份验证之后,SSL将真正使用保密的密钥加密来保护通道,但其细节与本讨论无关。
A secure connection is now established, and communication for the rest of the session is encrypted using the secret key.
现在就建立了一个安全连接,会话其余部分的通信是用秘钥加密的。
This article covers the basics of working with images, starting and stopping instances of those images, and the key pairs and security groups that let you secure the instances.
本文介绍关于使用映像、启动和停止映像实例、保护映像实例的密匙对和安全组的基础知识。
For digitally signing large files, the files are first compressed (the fixed-length hash is calculated) in a secure manner using these algorithms, and then signed with the private key.
要数字签署大型文件,首先使用这些算法用一种安全的方式压缩(计算固定长度的哈希码)文件,然后再用私钥签署。
Double key secure means the user must authenticate two systems — the application server (at the hosting service provider) and the financial institution.
双重密钥安全表示用户必须通过两个系统的认证-应用程序服务器(位于主管服务供应商)和金融机构。
Each Digital Realty Trust Turn-Key Datacentre facility is physically secure and features a state-of-the-art power and cooling architecture that has been optimized for green operation.
每个数字房地产信托交钥匙数据中心的设施物理上是安全的,装备了为绿色节能优化的最先进的电源和散热架构。
Keylogin then prompts the user for the Secure RPC password and then decrypts the secret key of that user.
然后,keylogin提示用户输入安全RPC密码,然后解密该用户的机密密钥。
The server must accept the client's Secure Shell (SSH) public key.
服务器必须接受客户端SecureShell (SSH)的公共密钥。
The server must accept the client's Secure Shell (SSH) public key.
服务器必须接受客户端SecureShell (SSH)的公共密钥。
应用推荐