The name was both an homage to cryptography (a “zero-knowledge proof” is a standard cryptographic protocol) and a promise of a specific relation between the application provider and the users.
这个名字既是对加密算法(“0知识证明”是一种标准加密协议)的致敬,也是对服务提供商和用户之间特定关系的一种约定。
The SSL protocol is based on public-key cryptography where encryption keys come in pairs that are mathematically related, but one cannot be deduced from knowing the other.
SSL协议基于公钥密码,加密密钥成对地出现在公钥密码中,它们是在数学上是相关的,但无法由一个推知另一个。
It is the standard behind secure communication on the Internet, integrating data cryptography into the protocol.
它是支持在Internet上进行安全通信的标准,并且将数据密码术集成到了协议之中。
The technology adopted include categories of data fragment reassembly, protocol conversion, cryptography, intrusion detection, virus, and keyword filtering, authentication and audit and so on.
网闸所采用的技术包括数据分片重组、协议转化、密码学、入侵检测、病毒以及关键字过滤、身份验证及审核等。
On the theoretical basis above, we achieve an secure electronic exchange system based SSL protocol, which use object-oriented programming design, cryptography technology and COM technology.
依据上述理论基础,采用面向对象的程序设计方法,在SSL协议的基础上,探索了利用COM组件技术实现一个安全电子交易的二次加解密组件系统。
In modern cryptography, one way to ensure the security of a protocol is by means of provable security.
在现代密码学中,可证安全是保证协议安全的一种方式。
Based on the public key cryptography, a mobile communication protocol providing end - to - end security is provided.
基于公钥加密体制,本文提出了一种具有移动终端安全性的无线通讯协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
应用推荐