密鑰交換 的英文怎麼說

中文拼音 [yàojiāohuàn]
密鑰交換 英文
ake
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ動詞1 (把事物轉移給有關方面) hand over; give up; deliver 2 (到某一時辰或季節) reach (a cert...
  • : 動詞1. (給人東西同時從他那裡取得別的東西) exchange; barter; trade 2. (變換; 更換) change 3. (兌換) exchange; cash
  1. Both of these shared secret exchange mechanisms are unwieldy

    這些共享密鑰交換機制都難以處理。
  2. It includes functions of tonglink / q, using rc5 encryption algorithm, md5 message digesting algorithm, diffie - hellman key exchanging algorism to implement point - to - point security

    描述了通過md5消息摘要演算法, rc5加演算法, diffie - hellman密鑰交換演算法,保存等方法實現點-點加的過程。
  3. 4. study existing key - exchange protocols, promote and implement a key exchange protocol under the hardness assumption of the decisional diffie - hellman problem as well as the existence of collision - free hash functions. 5

    在分析了密鑰交換方法的基礎上設計並實現了基於離散對數困難問題( dlp )和diffie - hellman密鑰交換協議,輔以hash函數和公證書,進行會話密鑰交換方法。
  4. Ike ( internet key exchange ) is the protocol which performs mutual authentication and establishes security associations ( sas ) for ipsec ( ip security ). it is a very important component of the ipsec protocol suite

    因特網密鑰交換( internetkeyexchangeike )協議是ipsec ( ipsecurity )協議簇的重要組成部分,負責動態協商和管理安全聯盟。
  5. The paper analyzes the secure problem existing in the tcp / ip protocol, discusses the possibility and superiority of secure transmission in network layer, researches the architecture of protocol ipsec, presents the design thought of using ipsec to realize the secure transmission within the pbc ' s intranet under the windows. the paper gives a schema of secure transmission system in the pbc ' s intranet, realizes it using the windows kernel program technology and obeying the specifications of ndis and ipsec. the secure transmission system promotes the secure extent of the pbc ' s intranet

    論文針對人民銀行內聯網面臨的信息和數據安全傳輸問題,分析了tcp / ip協議存在的安全問題,探討了在tcp / ip網路層實現安全傳輸的可能性和優越性,認真研究了ipsec協議體系結構和esp協議、 ah協議、 ike密鑰交換協議的原理,在既要保護已有投資,又要提高安全程度的前提下,提出了在windows操作系統下採用ipsec實現人民銀行內聯網安全傳輸的設計思想。
  6. In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router

    在對安全通信的研究中,本文分析了diffie - hellman密鑰交換協議中易受攻擊的地方,提出了基於端對端協議及cookie機制的密鑰交換新方法,並在路由器上實現了密鑰交換和ip報文的安全通信。
  7. As the discussion, the 802. 1x is easy to extend and supports various authentication mechanisms, among which eap - tls is the most popular one. the eap - tls provides a two - way authentication between the client and server, key exchange and dynamic key in authentication procedure, which make sure the security of the process of authentication

    802 . 1x具有很強的擴展優勢,可以支持多種認證機制, eap - tls就是其中應用最廣的一種,因為eap - tls提供了客戶端和服務器的雙向認證,且在認證過程中進行密鑰交換和生成動態,在?大程度上?巳現?痰陌踩? =幼盼惱陸檣芰吮痙槳鋼
  8. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線碼在加密鑰交換、數字簽名等方面的碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線碼在電子拍賣系統、認證系統方面的實現方案。
  9. Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card

    Ecdsa等簽名驗證體制的選取, deffie - hellman等密鑰交換體制的研究。論文也討論了基於有限域上橢圓曲線公碼系統的若干應用和信息安全產品,如數字簽名,組簽名,在智能卡中的應用。
  10. Management of internet key is a necessary condition to communicate security. the paper introduces internet key exchange protocol to provide key management. and finite state machine is use for the procedure of internet key exchange

    第六部分: hitemet的管理是用戶進行安全通信的必要條件,本文採用了hitemet密鑰交換協議ike ( hitemetkeyexchange ) ,本文採用有限狀態機來描述的協商過程。
  11. ( 2 ) research on ipsec architecture the goal, function and construction of ipsec design ; the analysis on the two security protocols of ipsec ? ah and esp including security function, packet format, application mode and processing operations of each ; mainly of the security association ( sa ) and its two modes : transport and tunnel, the instrument on organizing and managing sas security association database ( sad ), and that on managing security policies ? ? security policy database ( spd ) ; specific descriptions on internet key exchange ( ike )

    ( 2 ) ipsec協議體系的研究給出了ipsec的設計目的、作用和組成;分析了ipsec的兩種安全協議? ? ah和esp ,包括每種協議的安全功能、包格式、應用模式以及對數據包的處理過程;重點研究了安全聯盟( sa )以及兩種模式:傳輸模式和隧道模式,組織和管理sa的手段? ?安全聯盟數據庫( sad ) ,以及安全策略的管理手段? ?安全策略數據庫( spd ) ;最後,對internet密鑰交換( ike )進行了詳細介紹。
  12. The current internet key exchange protocol ike is too complicated to effectively prevent dos attack and has too much rounds, which will influence the performance and interoperability and cause a lot of security hole at the same time

    目前ipsec的密鑰交換協議ike過于復雜,不能有效的防止dos攻擊,協議輪數太多,這些都嚴重影響了協議的性能和互操作性,同時導致了許多安全漏洞。
  13. The secret information derived from the key exchange data

    密鑰交換數據導出的機信息。
  14. Extracts secret information from the encrypted key exchange data

    從加密鑰交換數據中提取機信息。
  15. Both peer a and peer b can use a shared key to exchange a secret message, or peer a can use the private key that corresponds to a public key that peer b holds to perform the same operation

    如對等點a和對等點b都可以用一個共享密鑰交換的訊息,或對等點a可以使用對應于對等點b持有的公用匙的私用來完成同樣的操作。
  16. Security of the large scale email service application based on qmail and ldap

    基於網路層的輕負載密鑰交換協議的研究
  17. Based on this, this thesis puts forward the randomized key exchange system based on rsa, which uses des key as session key to handle the plain text and encrypted text, and uses rsa key pair to encrypt / decrypt des key in order to keep security

    在此基礎上,給出了基於rsa的隨機密鑰交換系統。該系統採用des作為會話處理明文和文,用rsa對des進行加解以保證安全。
  18. The key exchange data within which the secret information is hidden

    其中隱藏有機信息的密鑰交換數據。
  19. We select rubin logic to formally analyze the authentication and key exchange protocol designed for this transmission platform utilized, and the analysis result indicates that this authentication and key

    對于傳輸平臺所使用的認證和密鑰交換協議,本文選擇rubin邏輯對其進行形式化分析,分析結果表明該認證和密鑰交換協議具有一定的嚴性。
  20. In this thesis, we deeply research on secure transmission technique in military information system and presented a multipurpose image watermarking algorithm together with a new authentication and key exchange protocol. they can be well used in the transmission platform

    本文深入研究了軍用信息系統安全傳輸技術,設計和實現了一個多功能數字圖像水印演算法和一個認證和密鑰交換協議,並將其應用到傳輸平臺中。
分享友人