• Some new indexes about cryptographic security are introduced, and their relationships are discussed.

    引入了密码安全一些度量指标讨论了这些指标之间的关系

    youdao

  • Gets a delegate that will be called to validate the format (not the cryptographic security) of an XML signature.

    获取一个委托调用此委托验证XML签名格式(而加密安全性)。

    youdao

  • This paper describes the basic building blocks of a cryptographic security system and the choice which must be made during the implementation of cryptographic security.

    本文描述了密码保密系统基本构成实施密码保密过程中必须作出选择

    youdao

  • This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.

    特性三种关键安全技术能够利用 ACF提供硬件密码计算加速设施

    youdao

  • The ability to use cryptographic authentication for NFS RPC requests provides support for end-to-end NFS security.

    NFSRPC请求可以使用密码认证能力提供了端到端的NFS安全支持

    youdao

  • Unlike other outlets, we provide a high security anonymous drop box fortified by cutting-edge cryptographic information technologies.

    其他媒体不同的是,我们提供一个高度安全匿名泄密,这些信息箱绑定了尖端的加密信息技术

    youdao

  • Security credentials for web services Security in the form of JCEKS key stores or the private keys/public certificates required for the specified cryptographic operations

    用于Web服务安全JCEKS密钥存储库形式安全凭据指定加密操作所需/公开证书

    youdao

  • Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication between clients and servers.

    TransportLayerSecurity (TLS)一种密码协议,可以在客户机服务器之间提供安全通信

    youdao

  • Secure Sockets Layer (SSL) protocol is a cryptographic protocol that provides privacy and security for data communication over the network.

    SecureSocketsLayer (SSL)协议一种加密协议,可网络数据通信提供隐私安全保障

    youdao

  • For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.

    为了确保安全可以结合使用rsync加密技术,确保在没有正确密码加密密钥的情况下无法读取远程文件

    youdao

  • Security credentials for web services security in the form of JCEKS key stores or the private keys or public certificates required for the specified cryptographic operations.

    用于Web服务安全JCEKS密钥存储库形式安全凭据指定加密操作所需公开证书

    youdao

  • There may be cryptographic techniques, skill level of vendors' staff to ensure the security and some new methods may be devised to solve this issue.

    可以借助加密技术和云计算厂商技能优势确保信息安全。同时,可以设计一些新的方法解决这个问题。

    youdao

  • Provable Security is the essential requirement of modern cryptographic schemes.

    可证明安全现代密码方案基本要求

    youdao

  • As a fast encryption algorithm, the chaotic cryptographic method has quite wide applications in the field of security.

    混沌密码算法一种快速加密算法,安全性要求较高领域有着非常广阔应用前景

    youdao

  • This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security.

    文章简述SSLv3.0分层结构、协议状态握手协议加密参数计算安全性做出分析

    youdao

  • However, design of cryptographic protocols is a very micromesh job, because any tiny mistake may damage security of the protocol.

    遗憾加密协议设计非常细致工作任何细小错误都可能会影响到协议的安全功能。

    youdao

  • BAN family of logic is used to analyze the security of cryptographic protocols.

    BA N逻辑一种用于分析密码协议安全性逻辑。

    youdao

  • Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.

    差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,目前的信息安全系统构成严峻挑战。

    youdao

  • Cryptographic modules are the important components to protect information, they are required to be protected, and the security requirements for them must be standardized.

    密码模块保护信息核心部件自身安全需要得到保证,这种安全性要求需要规范化

    youdao

  • In this work, both the security on cryptographic functions and the relation of security measure indexes are mainly researched.

    本文主要研究了密码函数安全性相关度量指标

    youdao

  • The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.

    密码协议分析设计基础进行形式化建模

    youdao

  • The proposed scheme can satisfy the receiver security and the external security characters in cryptographic work.

    证明结果表明,密钥封装结构方案能够达到密码工作流模式下要求的接收者安全和外部安全

    youdao

  • All kinds of cryptographic algorithms used can insure security of these activities.

    使用各种各样加密算法,可以保证这些活动的安全性

    youdao

  • Information security is the basis of modern computer communication network, while modern cryptographic algorithm is also the core part of the information security.

    信息安全技术现代计算机通信网络基础现代密码算法又是信息安全最为核心的部分

    youdao

  • Gets or sets a value that indicates whether the security token must be capable of performing cryptographic operations, such as encryption.

    取得设定值,这个表示安全性权杖是否必须能够执行密码编译作业例如加密

    youdao

  • This paper researches into how to establish the standard of security requirements for cryptographic modules from principle, content, security level, development methods, and so on.

    本文如何制定密码模块安全性要求标准必须遵循原则内容、安全性等级划分、标准的开发方法等方面进行了研究

    youdao

  • Then, the importance of implementation security is discussed. Furthermore, we study how to apply cryptographic primitives to embedded security engineer.

    进一步分析嵌入式安全密码算法实现安全性以及密码算法嵌入式安全工程中的应用

    youdao

  • Information security mainly consists of security protocols and cryptographic algorithm. Cryptographic algorithm is the basis and key technology of the information security.

    信息安全主要安全协议密码算法两方面组成,其中密码算法是信息安全基础核心技术

    youdao

  • Information security mainly consists of security protocols and cryptographic algorithm. Cryptographic algorithm is the basis and key technology of the information security.

    信息安全主要安全协议密码算法两方面组成,其中密码算法是信息安全基础核心技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定