TCS要求控制关键系统资源的分配和释放,包括数据库记录、通信套接字、安全密钥,等等。
The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.
加密密钥是信息安全的关键环节,保障军事人员的通信传递。
Encryption keys are a crucial aspect of information security in the delivery of assured communications to military personnel.
关键的问题是这些密钥是非对称的——使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric — information encrypted with one key can be decrypted using the other key.
关键的问题是这些密钥是非对称的;使用一个密钥加密的信息可以使用另一个密钥来解密。
The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.
密钥管理是实现数据库加密的关键技术。
Key management is critical technic of realizing database encryption.
关键是Facebook是怎么样,亚马逊是怎么样安全地和你或你的计算机,使用加密技术进行交流的,如果你们两个都,知道那个同样的密钥。
But the point is that how is Facebook, how is Amazon possibly going to communicate securely with you or your laptop using cryptology if you both have to know the same secrets.
TwitterSearchConnector需要两对密钥(consumerkey、consumersecret、访问令牌以及访问令牌secret)和在第一个UI表单中输入的搜索关键词(图1)。
Your TwitterSearchConnector needs the two pairs of keys (consumer key, consumer secret, access token, and access token secret) and the search keyword that's entered in the first UI form (Figure 1).
安全是多播研究中急需解决的问题。本文对多播安全中认证和组密钥管理这两个关键问题进行了研究。
Because of the importance and urgency of security to multicast, this thesis investigates two key issues, i. e. authentication and group key management, of multicast security.
CA证书管理是PKI网络安全体系实施的关键,它涉及到密钥和证书从创建到撤销的整个过程。
Ca certification management is the key of PKI actualization. It includes all process from initialization to cancellation of the key and certification.
大素数的选取是构造RSA密钥的关键,在素数的产生及测试是RSA公钥系统中的一个重要研究课题。
The selection of large primes is the key to construct RSA secret key. The production and test of large prime is an important research subject in RSA public key system.
组通信是其重要的通信方式之一,可行和有效的组密钥管理机制是保障组通信安全的关键前提。
Group communication is its important communication method, in which a feasible and effective group key management mechanism is the key precondition for security.
如何保证公钥的产生不会影响私钥的性能,是水印密钥系统的关键问题。
How to generate public keys without weaken the performance of the private key is a key problem.
如果网站想访问我的网站的数据,他们已经登记我的开发者网站注册后,网站会,消费者的关键和秘密密钥。
If a website want to access my data from website, they have to register with my developer website, after the registration that website will generate Consumer key and Secret key.
因此如何在现有的密码体制和数字签名体制的基础上,构建一个更好的方案保护和管理密钥,是决定现实中系统的安全性的关键。
So it becomes a key problem how to build a better security protection scheme and key management system by making use of the cryptography algorithm in practice.
没有登录系统,而不是我计划为用户提供一个密钥关键代码,将识别它们。
There is no login for the system, instead I plan on providing a user with a secret key key code that will identify them.
论文还对系统的设计与实现的关键环节进行了探讨,包括ca子系统、密钥管理等。
The paper also discusses the key process of design and implementation such as CA subsystem, key management etc.
首先详细讨论了与安全技术相关的一系列关键技术,包括数据拦截技术、数据加密技术、密钥管理技术等。
Firstly, some key technologies correlated with security are discussed in detail, such as data interception, data encryption, key management, etc.
论文重点对节能的密钥分发、安全和高效的组密钥更新以及密钥预分发等组密钥管理的关键问题进行研究。
The group key management problems this thesis studies mainly include energy-saving multicast key distribution, secure and efficient group rekeying, and key pre-distribution.
战地网络极易受到各种攻击和破坏,要实现其安全通信,密钥管理是关键技术。
Key management is an essential technique to secure communication which is critical in the tactical environments where the network infrastructure is vulnerable to various attacks and compromises.
如果这是一个浏览器的API密钥,这是没有问题的,但如果它是一个服务器API密钥的那种你通常会使用地理定位api,现在关键是妥协。
If this was a browser API key, that's no problem, but if it was a server API key of the sort you would normally use with the Geolocation API, that key is now compromised.
未来所有的请求将包括此密钥关键代码来识别和验证该用户是谁。
All future based requests would include this secret key key code as a way to identify and authenticate who that user is.
保密性是许多安全服务的内在假设,而密钥管理是其成功实施的关键。
Cryptography is an internal assumption for most of security services, and key management is the core for its implementation.
分析了在红外通信波段对量子密钥分配的关键器件单光子探测器进行精密温度控制的必要性。
Analysis indicates the importance of precise temperature control of single-photon detector used for quantum key distribution in infrared communication wavelengths.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
应用推荐