密鑰交換協議 的英文怎麼說

中文拼音 [yàojiāohuànxié]
密鑰交換協議 英文
ike v2
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ動詞1 (把事物轉移給有關方面) hand over; give up; deliver 2 (到某一時辰或季節) reach (a cert...
  • : 動詞1. (給人東西同時從他那裡取得別的東西) exchange; barter; trade 2. (變換; 更換) change 3. (兌換) exchange; cash
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  1. 4. study existing key - exchange protocols, promote and implement a key exchange protocol under the hardness assumption of the decisional diffie - hellman problem as well as the existence of collision - free hash functions. 5

    在分析了方法的基礎上設計並實現了基於離散對數困難問題( dlp )和diffie - hellman密鑰交換協議,輔以hash函數和公證書,進行會話方法。
  2. The paper analyzes the secure problem existing in the tcp / ip protocol, discusses the possibility and superiority of secure transmission in network layer, researches the architecture of protocol ipsec, presents the design thought of using ipsec to realize the secure transmission within the pbc ' s intranet under the windows. the paper gives a schema of secure transmission system in the pbc ' s intranet, realizes it using the windows kernel program technology and obeying the specifications of ndis and ipsec. the secure transmission system promotes the secure extent of the pbc ' s intranet

    論文針對人民銀行內聯網面臨的信息和數據安全傳輸問題,分析了tcp / ip存在的安全問題,探討了在tcp / ip網路層實現安全傳輸的可能性和優越性,認真研究了ipsec體系結構和esp、 ah、 ike密鑰交換協議的原理,在既要保護已有投資,又要提高安全程度的前提下,提出了在windows操作系統下採用ipsec實現人民銀行內聯網安全傳輸的設計思想。
  3. In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router

    在對安全通信的研究中,本文分析了diffie - hellman密鑰交換協議中易受攻擊的地方,提出了基於端對端及cookie機制的新方法,並在路由器上實現了和ip報文的安全通信。
  4. Management of internet key is a necessary condition to communicate security. the paper introduces internet key exchange protocol to provide key management. and finite state machine is use for the procedure of internet key exchange

    第六部分: hitemet的管理是用戶進行安全通信的必要條件,本文採用了hitemet密鑰交換協議ike ( hitemetkeyexchange ) ,本文採用有限狀態機來描述商過程。
  5. The current internet key exchange protocol ike is too complicated to effectively prevent dos attack and has too much rounds, which will influence the performance and interoperability and cause a lot of security hole at the same time

    目前ipsec的密鑰交換協議ike過于復雜,不能有效的防止dos攻擊,輪數太多,這些都嚴重影響了的性能和互操作性,同時導致了許多安全漏洞。
  6. Security of the large scale email service application based on qmail and ldap

    基於網路層的輕負載密鑰交換協議的研究
  7. We select rubin logic to formally analyze the authentication and key exchange protocol designed for this transmission platform utilized, and the analysis result indicates that this authentication and key

    對于傳輸平臺所使用的認證和密鑰交換協議,本文選擇rubin邏輯對其進行形式化分析,分析結果表明該認證和密鑰交換協議具有一定的嚴性。
  8. In this thesis, we deeply research on secure transmission technique in military information system and presented a multipurpose image watermarking algorithm together with a new authentication and key exchange protocol. they can be well used in the transmission platform

    本文深入研究了軍用信息系統安全傳輸技術,設計和實現了一個多功能數字圖像水印演算法和一個認證和密鑰交換協議,並將其應用到傳輸平臺中。
  9. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和的安全性;利用openssl標準庫函數實現系統的數據加模塊,實現對稱加、非對稱加以及信息摘要的常用演算法。
  10. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括演算法、單項散列函數、數字證書、安全和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  11. Ike internet key exchange

    因特網密鑰交換協議
  12. Then we do some research about the basic protocols, the elliptic curve diffie - hellman protocol is improved as it can ’ t make identity authentity and can ’ t resist third party ’ s attacks ; at the same time, the signature equation of elliptic curve digital signature algorithm is reconstructed, and the improved kp + lqalgorithm is applied into verification stage, the whole speech of the protocol is improved greatly

    接著,研究和分析了基於ecc的各類。針對密鑰交換協議不能進行身份鑒別以及存在第三方攻擊的問題,對其加以改進;同時,對數字簽名中的簽名方程重新構造,並將優化的kp + lq演算法用於驗證過程,提高了的執行效率。
  13. Skip : simple key exchange internet protocol

    因特網簡單密鑰交換協議
  14. On the basis of deeply analyzing the wireless ip network security threat and existing design requirement, we put forward the design requirements of key exchange protocol in wireless ip network

    在深入分析了無線ip網路的安全威脅和現有的設計要求的基礎上,我們提出了無線ip網路中設計密鑰交換協議的要求和目標。
  15. Skip simple key exchange internet protocol

    因特網簡單密鑰交換協議
  16. Skisimple key exchange internet protocol

    因特網簡單密鑰交換協議
  17. Provably secure internet key exchange protocol

    密鑰交換協議
  18. Ike : internet key exchange

    因特網密鑰交換協議
  19. The author designed and implemented the ike part of ipsec

    作者在這個項目中負責設計和實現ipsec集中的密鑰交換協議ike 。
  20. It pays a great attention to the internet security association and key management protocol ( isakmp ) and the internet key exchange ( ike ) based on isakmp, because the key management is always the most consequential part of any security systems

    然後針對在安全系統中至關重要的管理進行了重點分析,這其中包括了internet安全關聯管理,以及以它為框架在ipsec中實現的internet密鑰交換協議,並且簡單說明了在上述管理信息的生成公式。
分享友人