这些密钥存储在用密码技术保护的密钥存储库中,在成功登录时,用户的密钥被装载到内核中并与内核进程关联起来。
These keys are stored in cryptographically protected key store and upon successful login, the user's keys are loaded into the kernel and associated with the kernel processes.
为了确保安全,可以结合使用rsync与加密技术,确保在没有正确的密码或加密密钥的情况下无法读取远程文件。
For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.
公开密钥基础设施PKI是一种利用非对称密码技术为电子商务、电子政务和电子事务的开展提供一整套安全保护的基础平台。
Public Key Infrastructure (PKI) utilizes the asymmetrical cryptography technology to lay the security foundation for the electronic commerce, the electronic government and the electronic business.
密码学是安全技术的核心,其中的加密解密、数字签名、密钥交换等技术是起到保障作用的重要机制。
Cryptography is the core of security technologies, and encryption, decryption, digital signature, key exchange etc. are the important mechanisms to guarantee the safety.
密码技术的飞速发展,特别是公开密钥密码体制的提出,为信息安全提供了最强有力的保护。
The cryptology, especially the public - key cryptology can offer the highest level of information security.
信息安全技术主要包括以加密技术为代表的密码技术、密钥管理技术、数据库加密技术等。
Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.
随着标准密码算法细节的公开,密码技术保护的信息系统的安全就取决于密钥的保护。
With the standard code computing methods being opened, the accounting system and the safety of code technology protection depend on the protection of secret key.
椭圆曲线密码(ECC)是一个基于椭圆曲线理论的公钥加密技术,可以用来创造更快、更小、更高效的加密密钥。
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys.
将组合公钥技术和门限密码理论结合应用于移动自组网的密钥管理方案中。
Combined public key and threshold cryptography are applied to key management for Mobile Ad Hoc Network (MANET) in this paper.
以量子密钥分配为代表的量子密码术是量子信息技术应用于经典通信的成功典范。
As the representative of quantum cryptography, the quantum key distribution (QKD) is a successful model that the quantum information technique is applied in to the conventional communications.
目前有几种加密技术如对称密钥密码系统和非对称密钥密码系统。
Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.
利用元胞自动机之间的相互作用,提出耦合触发元胞自动机的加密技术,增加密钥空间和增强密码系统的强度。
Using the interaction between cellular automata, a cryptography system based on the coupled toggle cellular automata is proposed to enlarge the key space and the strength of the system.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
基于密码学的公钥技术提出了一种混合密钥加密系统,并加入认证技术,从而构建了一个网络环境下的虚拟光学信息安全系统模型。
A model of hybrid cryptosystem was proposed with the aid of public key techniques. Through this model, the solution of aforementioned issues may be found.
随着密码技术的飞速发展,特别是公开密钥密码体制的提出,为信息安全提供了最强有力的保护。
With the rapid progress of cryptology, especially the public-key cryptology can offer the most effective level of information security.
研究功耗分析如何破解密码算法中的密钥的关键技术,并以此为基础提出防御功耗分析的安全密码算法是非常必要的。
It is necessary to study that how to break the encryption system using power analysis techniques and design security encryption algorithms that can resist power analysis.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
应用推荐