按保密的内容分 受限制(restricted)的算法 算法的安全性基于算法的保密性 基于密钥(key-based)的算法 算法的安全性基于密钥的保密性 一、密码学与信息安全的关系密码编码学 Kerchhoff 原则:1883年,Kerchoff第一次明确提出了...
基于36个网页-相关网页
public key-based 基于公钥
key-based routing 叫做基于关键字的路由
Key-based Search Model 基于关键字的检索模型
Turn-Key based 中介即用系统
key-based renewal 基于密钥的续订
Key-based indices 基于键的索引
Comparing host-based authentication to public key-based authentication.
比较基于主机的认证和基于公钥的认证。
Unless your API is a free, read-only public API, don't use single key-based authentication.
除非你的API是一个免费的,只读的公开api,否则不要使用单一的基于密钥的验证。
At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."
至此,ssh 基于公钥的认证已经完成,现在可以进入“ DB2 配置”。
"The key finding of this meeting is that we have up to one-meter sea-level rise by 2100, based on our new insight of glaciers.
VOA: standard.2009.03.12
Insurance companies would no longer be allowed to deny health coverage based on pre-existing medical conditions a key point of weakness in and public anger with the current system.
VOA: standard.2009.07.21
应用推荐