• 这些密钥存储密码技术保护密钥存储库中,成功登录时用户密钥装载内核内核进程关联起来

    These keys are stored in cryptographically protected key store and upon successful login, the user's keys are loaded into the kernel and associated with the kernel processes.

    youdao

  • 为了确保安全可以结合使用rsync加密技术,确保在没有正确密码加密密钥的情况下无法读取远程文件

    For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.

    youdao

  • 公开密钥基础设施PKI是一种利用非对称密码技术电子商务、电子政务电子事务的开展提供一整套安全保护的基础平台。

    Public Key Infrastructure (PKI) utilizes the asymmetrical cryptography technology to lay the security foundation for the electronic commerce, the electronic government and the electronic business.

    youdao

  • 密码安全技术核心,其中的加密解密数字签名密钥交换技术起到保障作用重要机制

    Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.

    youdao

  • 密码技术飞速发展,特别是公开密钥密码体制的提出,为信息安全提供强有力保护。

    The cryptology, especially the public - key cryptology can offer the highest level of information security.

    youdao

  • 信息安全技术主要包括加密技术代表密码技术密钥管理技术数据库加密技术

    Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.

    youdao

  • 随着标准密码算法细节公开密码技术保护信息系统安全取决于密钥的保护。

    With the standard code computing methods being opened, the accounting system and the safety of code technology protection depend on the protection of secret key.

    youdao

  • 椭圆曲线密码(ECC)一个基于椭圆曲线理论公钥加密技术可以用来创造更快更小高效加密密钥

    Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.

    youdao

  • 组合公钥技术门限密码理论结合应用移动自组网的密钥管理方案中。

    Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.

    youdao

  • 量子密钥分配代表量子密码量子信息技术应用经典通信成功典范

    As the representative of quantum cryptography, the quantum key distribution (QKD) is a successful model that the quantum information technique is applied in to the conventional communications.

    youdao

  • 目前有几种加密技术对称密钥密码系统对称密钥密码系统。

    Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.

    youdao

  • 利用自动机之间相互作用,提出耦合触发元胞自动机的加密技术,增加密钥空间增强密码系统强度。

    Using the interaction between cellular automata, a cryptography system based on the coupled toggle cellular automata is proposed to enlarge the key space and the strength of the system.

    youdao

  • 基于TPM安全优盘系统使用可信计算平台模块TPM实现密钥存储管理解决密码技术密钥管理的难题

    TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.

    youdao

  • 基于密码公钥技术提出混合密钥加密系统,并加入认证技术,从而构建一个网络环境下虚拟光学信息安全系统模型

    A model of hybrid cryptosystem was proposed with the aid of public key techniques. Through this model, the solution of aforementioned issues may be found.

    youdao

  • 随着密码技术飞速发展特别是公开密钥密码体制的提出,为信息安全提供强有力的保护。

    With the rapid progress of cryptology, especially the public-key cryptology can offer the most effective level of information security.

    youdao

  • 研究功耗分析如何破解密码算法中的密钥的关键技术以此为基础提出防御功耗分析的安全密码算法非常必要的。

    It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.

    youdao

  • 第二章介绍基本应用密码算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • 第二章介绍基本应用密码算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定