• Basing on the analysis of the popular key management protocols, we design and implement a novel key management protocol aiming at the requirements of DSPS system.

    本文分析目前密码管理协议基础上,针对DSPS系统需求和特点设计实现密钥管理协议

    youdao

  • In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议

    youdao

  • In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.

    早期规范中的认证密钥管理协议保密密钥,管理(PKM),数据保密机制包含基于DES -CBCAES - CCM的两个解决方案

    youdao

  • He says it managers must also evaluate the protocols used within their organizations, such as user identification and key management.

    IT经理鉴定组织中用的协议用户识别密钥管理。

    youdao

  • He says it managers must also evaluate the protocols used within their organizations, such as user identification and key management.

    IT经理鉴定组织中用的协议用户识别密钥管理。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定