密鑰管理協議 的英文怎麼說

中文拼音 [yàoguǎnxié]
密鑰管理協議 英文
ikmp
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全ipsec的體系結構、操作模式,詳細論述了ipsec簇的各個組成部分,如認證報頭ah、封裝安全載荷espike、加認證演算法、安全聯盟和安全策略等,以及這些組件之間如何作,來共同實現對網路層ip數據包的安全保護。
  2. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整性、機性、數據來源認證和抗重播等方面的能力, ipsec的基本? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加和認證演算法、等如何合作,共同完成對ip報文的安全保護。
  3. 2. some protocols in the standard are improved, and one of them, namely the key management protocol based on key distribution center, is applied in the newly designed network interface card with encryption

    2 、改進了標準中的部分密鑰管理協議,並把基於發放中心的密鑰管理協議應用到了新設計的加網卡。
  4. Management of internet key is a necessary condition to communicate security. the paper introduces internet key exchange protocol to provide key management. and finite state machine is use for the procedure of internet key exchange

    第六部分: hitemet的是用戶進行安全通信的必要條件,本文採用了hitemet交換ike ( hitemetkeyexchange ) ,本文採用有限狀態機來描述商過程。
  5. On this thesis we discuss the security of the electric document, and focus on digital signature and the protocol application on office automation, which including three departments - - - - hash algorithm, the security protocol about work flow and security key base on the public key infrastructure

    本文重點研究了在電子公文的數字簽名問題,主要從雜湊演算法和針對公文流轉的數字簽名,以及基於pki公基礎設施的三個方面進行了討論,本文的主要工作包括: 1
  6. The security environment of the router with ipsec is provided by the cooperation of access control system, key management system, audit system, security service strategy system, intelligent diagnosis system and ipsec implementation

    基於ipsec的路由器的安全保障由路由器中的訪問控制系統、系統、審計系統、安全服務策略系統、智能診斷系統以及ipsec實現共同提供。
  7. 2. keeping to isakmp / oakley protocol, has presented the secure and credible key distribution and management, supported strict identity authentication based on pki and supported x. 509 and pkcs12 certificates. 3

    遵循isakmp oakley商和,實現安全可靠的分發與,支持x . 509證書和pkcs12證書格式,支持嚴格的pki身份認證。
  8. Then we brought out algorithm to construct ergodic matrix according to the recursion formula ( i ) and expatiate characteristic theorems about “ ergodic matrix ” by the numbers, the difficult problem and one - way ( trapdoor ) function based on the ergodic matrix over finite field. then we put forward the concept of strong matrix based on ergodic matrix according to a problem and the algorithm of finding and constructing the strong matrix of ergodic matrix. as one - way function played an important role in cryptography, we gave a new plan to realize application pattern in cryptology

    基於單向函數在碼學中的重要性,本文構造了基於遍歷矩陣的單向函數b = q _ 1 ~ aaq _ 2 ~ b ,並在此基礎上實現了包括密鑰管理協議、認證和智力撲克在內的五種典型的安全,同時就演算法的特點和攻擊特性進行了分析。
  9. Functions are analyzed from the four components of network cipher computer, key distribution management center ( kdmc ), web management computer and secure remote access system ( sras ). suggestions are proposed for confidentiality, authentication and visit control. ipsec protocol architecture, important concepts and characteristics are studied in detail

    分析了中心、網路加機、 web機和安全遠程接入四大部分的功能,給出了vpn網路碼機系統的機性保證、認證和訪問控制方法,詳細論述了ipsec基本、重要概念和特點。
  10. Certificate management subsystem, communicating with key management subsystem safely through spkm agreement and ca, can be used to manage and use ca to complete issuing and filing of the ca and to issue a blacklist for rescissory ca

    證書子系統可以對ca進行和使用,通過spkm和數字證書安全地與子系統通訊,完成用戶的處,簽發數字證書,並進行發布與歸檔,對已經廢除的證書,簽發黑名單。
  11. The operating process of network cipher computer and kdmc are discoursed firstly, then the tcp / ip stack of linux is introduced, and an ipsec realization method with using a cipher card is put forward. triplex key system is adopted for internet key exchange ( ike ). the database and other modules are also designed and implemented

    論文論述了網路碼機和中心的工作流程,接著介紹了linux下tcp / ip內核棧,提出了加卡方案,採用了三重體系實現了internet自動交換,進行了中心數據庫設計與實現,最後對其它模塊進行了實現。
  12. After analyzed the research of the status quo, the current of development and the application of the future in information security system in home and abroad, and researched the principle and technology of information security mechanism both in the network with open internet protocol and in the network with tcp / ip internet protocol, according to the microsoft information security structure and the application in network, and, the information security system should be established based on the pki structure, the security system can totally integrated with microsoft operation system

    這些功能的獲得,就要通過pki技術來實現。本文通過對國內外信息安全研究現狀、發展趨勢及應用前景進行分析,研究開放系統互聯標準網路和tcp ip網路中的信息安全機制的基本原和基本實現方法,根據微軟操作系統的安全體系結構以及實際網路中的運行需求,建立基於pki機制的信息安全系統。
  13. In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric - key cryptography, public - key cryptography, hash functions and key management protocols

    第二章介紹基本的應用碼學演算法和,包括對稱加演算法、非對稱加演算法、散列函數、數字簽名技術和密鑰管理協議
  14. Nowadays, the main wsn key distribution protocol is considered as one type of pre - distribution key management protocols

    當前主要的傳感器分配都可認為屬于預分配密鑰管理協議
  15. Finally these problems come down to the multicast cryto - key management protocol. in this paper i put forward a model that can be easily applied on existing internet system

    本文從常規網路出發提出了一種組播密鑰管理協議的框架,並且對其模型進行分析。
  16. This paper is organized in this way : section one details the problems multicast security meets ; section two gives my model ; section three makes a simple evaluation and comment on this model

    本文首先分析了現階段組播所面臨的安全問題和其特徵,在此基礎上提出了一個可行的組播密鑰管理協議框架。
  17. It pays a great attention to the internet security association and key management protocol ( isakmp ) and the internet key exchange ( ike ) based on isakmp, because the key management is always the most consequential part of any security systems

    然後針對在安全系統中至關重要的進行了重點分析,這其中包括了internet安全關聯密鑰管理協議,以及以它為框架在ipsec中實現的internet交換,並且簡單說明了在上述密鑰管理協議信息的生成公式。
  18. First, basic knowledge about key management is introduced ; secondly, after the detailed analysis of ieee 802. 10 standard, some key management protocols are improved, and one of them is applied in newly designed network interface card with encryption ; finally, a new solution of key management is proposed to enable stas to roam between aps

    首先介紹了相關的基礎論知識;其次對ieee802 . 10標準作了較為深入的研究和分析,並對其中的部分密鑰管理協議進行了改進,改進后應用到新設計的加網卡中;最後提出了無線局域網中移動站實現在ap間漫遊的方案。
  19. The main contents are : 1. the security framework of ieee 802. 10 standard is described in detail. after the detailed analysis of key management protocols by means of ban logic, we draw a conclusion that the security framework is fit for the realization of secure lan, but some protocols in the standard are flawed

    本文得到的主要成果如下: 1 、詳細介紹了ieee802 . 10標準中的安全構架,用ban邏輯對標準中的密鑰管理協議進行了詳細分析,得出結論是安全構架適合於實現安全局域網,但是標準中的部分密鑰管理協議有缺陷。
  20. At first, this thesis describes the secure characteristics and mechanisms on the internet protocol security ( ip sec ), also introduces the internet security association and key management protocol ( isakmp ) specified in rfc 2408 and the internet key exchange ( ike ) protocol specified in rfc 2409 for ip sec. secondly, it thoroughly analyzes the validities of the secure characteristics of the ike protocol based on the former formal analysis

    本文首先論述了ipsec ( internetprotocolsecurity )安全特性和安全服務機制、支持ipsec的密鑰管理協議isakmp ( internetsecurityassociationandkeymanagementprotocol )以及ike ( internetkeyexchange ),然後,從兩個方面對ike進行了全面的研究。
分享友人