代用密碼 的英文怎麼說

中文拼音 [dàiyòng]
代用密碼 英文
substitution cipher
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 代用 : substitute
  1. In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided

    把以指紋特徵為表的生物識別技術與基於體制的身份認證協議有機結合,向最終戶提供一種更加安全、可靠、便捷的身份認證手段,將是成功地實現網路安全和信息系統安全的有效途徑。
  2. The traditional means, such as key, password, cryptogram, id card and even ic card, have fallen behind the needs of economic activity and social security. this is because that they would be forgeable, falsifiable, stolen or decodable

    傳統的個人身份鑒別手段如鑰匙、口令、、身份證件,甚至ic卡等識別方式,由於它們具有可假冒、可偽造、可盜、可破譯的弱點,已不能完全滿足現社會經濟活動和社會安全防範的需要。
  3. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組rijndael演算法的單向hash函數的構造方法,即使logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭結束時的rijndael加結果即為所求的hash函數值。
  4. Used properly - with a key of sufficient length and an encryption mode that doesn t leak information about the plaintext - most modern algorithms are reasonably safe against cryptanalytic attacks

    如果使得當使足夠長的鑰和不會泄漏關于明文的信息的加方式大多數現演算法在分析攻擊面向都有一定的安全性。
  5. This is an important thing to keep in mind when using the " anonymous proxy " services available across the internet : how well can you trust them since you re sending usernames and passwords through their systems

    在使internet上的「匿名理」時,記得這一點尤其重要:您正在通過它們的系統來發送戶名和,怎樣才能相信它們呢?
  6. How to apply modern cryptography to the copyright protection of digital contents is the focus of this dissertation, in which the traitor tracing problem of digital fingerprinting technology is researched in order that the issue of digital contents is run by natural commercial format

    本文中重點研究如何將現學技術應到數字產品的版權保護中,即數字指紋技術中的叛逆者追蹤問題,以保證數字產品的出版發行能夠按正常商業形式運作。
  7. The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use

    論文主要論述了pki基礎技術的一般知識和概念;討論了現學的基本知識和基本原理;對各種加解演算法的主要特點、速度、加強度進行了簡要的介紹和比較;論述了公開鑰體制在pki體系中的應:數字信封、數字簽名,以及數字證書定義、格式及途。
  8. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    本文對美國高級加標準rijndael演算法進行了比較深入的研究,內容包括:從布爾函數、 walsh譜和數結構的角度對其s盒性質進行的研究,簡化演算法的攻擊方法以及演算法的優化實現問題,主要成果有: 1 、提出求解布爾函數表達式的兩種新方法,具有簡潔、易於編程實現、準確而快速的特點,應於des演算法獲得與公開文獻相符的結果,應於rijndael演算法首次求出其s盒布爾函數表達式。
  9. In cryptography, a cipher produced by a composition of a number of substitution and transposition ciphers

    學中,由替和置換結合使而構成的一種
  10. In cryptography, an early example of monoalphabetic, or substitution cipher used in the gallic wars

    學中,在高盧戰爭中使的一種單表置換,或稱替的早期例子。
  11. The module of customer certification adds one - off password certification to the traditional sheet certification, and replaces stored password with stored digest of user password to guard against attacks and keep secrets

    戶認證模塊在傳統基於表單認證的方式上增加一次性口令認證,並且在存儲時以存儲消息摘要替本身,從而達到防攻擊和保的目的。
  12. The " change password program " software is designed for use by the subscribers of hongkong post e - cert in changing the password of the e - cert file that is created and saved on a floppy disk through the central key generation service

    "更改電子證書檔案程式"軟體為香港郵政電子核證服務登記人而設。經匙服務產生電子證書而存入磁碟后,可以利此軟體更改檔案
  13. You may not transfer all or any of your rights or obligations under this membership agreement to any other person, or permit any other person to use your member id or password

    閣下不得將閣下在本會員協議下的所有或任何權利或義務轉讓給任何其他人士,或者容許任何其他人士使閣下的會員號或
  14. Returns a pseudo - random key from a password, salt and iteration count

    、 salt值和迭次數返回偽隨機鑰。
  15. Phishing : a type of technology - based social engineering ploy in which computers users are directed, usually via e - mail, to a web site that purports to be that of a bank, loan company, credit card company, e - commerce merchant, governmental agency, or other site that requires users to enter confidential information, such as account passwords, account numbers, social security numbers, and other personal data that is collected and used for identity theft

    網路釣魚:基於社會工程學的技術,通常通過電子郵件,據稱是銀行,貸款公司,信卡公司,電子商務商,政府理的網站,或其他要求戶輸入機信息的站點,諸如帳戶、帳戶號、社會保險號的機信息被收集並於身份偷竊。
  16. Using the theories of probability, algebra and number theory comprehensively, we investigate a class of boolean functions with three - valued walsh spectrum in the first part of this dissertation : the properties of the extended semi - bent functions, which are constructed from any two bent functions, are studied, followed by the structure characteristics of the boolean functions satisfying propagation criterion with respect to all but two vectors ; the definition and cryptographic properties of k - order quasi - bent functions are proposed whose walsh spectrum takes on only three values. some sufficient and necessary conditions are offered to decide whether a boolean function is a k - order quasi - bent function ; a special method is presented to construct the k - order quasi - bent functions, whose cryptographic properties are explored by the matrix method, which is different from the method of walsh spectrum and that of autocorrelation of boolean functions ; the application of this kind of boolean functions in the fields of stream cipher, communications and block ciphers is discussed, which shows the great importance of the fc - order quasi - bent functions ; some methodology are proposed to construct the k - order quasi - bent functions, including the complete construction by using the characteristic matrices of boolean functions, and the recursive method by two known k - order quasi - bent functions we further extend our investigation to the ring zp, where p is a prime, and the similar results are presented as far as the p - valued quasi - generalized - bent functions are considered

    本文首先綜合運概率論、數學、數論等基礎學科的理論知識,並以頻譜理論作為主要研究工具,對一類譜值分佈相對均勻的函數? ?廣半bent函數、 k階擬bent函數和p值k階擬廣義bent函數進行了系統、深入的研究,給出了廣半bent函數定義,並探討了廣半bent函數的學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的定義及等價判別條件;討論了k階擬bent函數和p值k階擬廣義bent函數與部分bent函數和p值廣義部分bent函數的關系,探討了它們的學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的典型構造方法,並將對k階擬bent函數的性質的研究轉化到對一類特殊的矩陣的研究上;利布爾函數的特徵矩陣原則上給出了k階擬bent函數的一種完全構造方法,還給出了從已有的p值k階擬廣義bent函數出發,遞歸構造變元個數更多的p值k階擬廣義bent函數的方法;初步探討了k階擬bent函數在序列、分組以及通信中的應;給出了一類布爾函數walsh譜的分解式,並利這類布爾函數的walsh譜分解式給出了一類近似穩定的布爾函數的構造,特殊情形下為k階擬bent函數;利數數論的知識考察了p值k階擬廣義bent函數的譜特徵,並給出了k階擬廣義bent函數與所有仿射函數的符合率特徵等等。
  17. Furthermore, some novel cryptography technology such as chaotic cryptography, quota cryptography are paid much attention by researchers beside conventional cryptography. in this paper, we propose a new chaotic searching simulated annealing method based on chaotic cryptography and intelligent computing to obtain cryptographically strong s - boxes

    在傳統的利數方法設計學的基礎上,一些新興的學理論,如混沌學、量子學等等也引起了愈來愈多的學者的青睞。
  18. The customer shall be granted a user id and an initial password

    並獲發號及首次使之個人或企業團體。
  19. The default is pserver, which represents the password server protocol and is used by most public repositories

    預設值是pserver ,它服務器協議,大多數公共資源庫都使這個協議。
  20. The platform ofsecure application based on b / s structure emerges as the times require. it has three main part : security agent client ( sac ), security proxy server ( sps ) and certificate authority server ( cas ). security socket layer ( ssl ) protocol is extended between tcp / ip and http to form a security channel to make those three parts be a full and rigorous security system. in addition, many cryptography algorithms are applied in the system to protect web application

    基於b s架構的應安全平臺應運而生,它包括安全理客戶端( sac , securityagentclient ) 、安全理服務器( sps , securityproxyserver ) 、 ca服務器( cas , certificateauthorityserver )三個組成部分,在傳統的tcp ip協議和http協議之間通過擴展ssl ( securitysocketlayer )協議形成了一條安全通道,組成了一個完整的、嚴的安全體系,並採學中的多種方法,保護web應安全。
分享友人