密鑰管理 的英文怎麼說

中文拼音 [yàoguǎn]
密鑰管理 英文
km key management
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. These appliances, available from companies such as decru, neoscale, and vormetric, implement very fast encryption - they typically claim to operate at or close to " wire speed. " they also usually include sophisticated key management facilities for controlling the creation and distribution of cipher keys, cycling of keys, and disposition of keys, besides handling general data encryption

    Decru 、 neoscale和vormetric等公司都能提供這些器件,它們實現了非常快的加通常被聲稱速度達到或接近「線速」 。它們還常常包括高級的密鑰管理設施,除了用於處一般的數據加外,還可用於控制的創建和分發、的循環和的銷毀。
  2. Offering the card issuing key educing service in ic card key management system

    在ic卡密鑰管理系統中,提供發卡導出服務
  3. Koal key management system is the core of the ic card application system security. its effectiveness has a direct impact on the whole system s security

    格爾密鑰管理系統是ic卡應用系統的安全核心,密鑰管理系統的安全性將直接影響到整個系統的安全。
  4. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  5. The key management server of key management subsystem assumes the core function of key management. it offers the retraction and filing etc. the server cipher machine ensures the safety generation and safety issuing of the keys

    密鑰管理子系統中的密鑰管理服務器承擔了密鑰管理的核心功能,同時提供了撤消、歸檔等功能,服務器碼機保證了用戶的安全產生和安全分發。
  6. While dissertate the keys management theory and rsa arithmetic in detail

    同時對密鑰管理論及rsa演算法作了詳細論述。
  7. Key agreement scheme based on gdh for virtual dynamic subgroup group

    基於gdh的協商式虛擬動態子群組密鑰管理方案
  8. Key agreement is usually mentioned in general static group. based on virtual dynamic subgroup, agreed virtual dynamic subgroup scheme avdsg was proposed, which can manage the virtual dynamic subgroup by using the key information of the group

    基於gdh的協商式虛擬動態子群組密鑰管理方案實現了利用原來大群的信息,有效地建立和虛擬動態安全子群的方法,與gdh方案相比,減少了很多的數據傳輸和存儲空間。
  9. Lkh and iolous schemes were proposed to account for the issue of group communication key management, and these two shemes become the basic ideal for more and more shemes to improve

    Lkh和iolus方案對組通信的密鑰管理提出了解決的方案,成為許多密鑰管理方案改進的基礎。
  10. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整性、機性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加和認證演算法、密鑰管理等如何合作,共同完成對ip報文的安全保護。
  11. This article describes the situation of information security theory and technology, and discusses the theories of ca, information encryption, and public key system

    本文介紹了目前信息安全論和技術發展狀況,對ca認證論、信息加以及公共密鑰管理等方面的技術進行了分析和論述。
  12. 2. some protocols in the standard are improved, and one of them, namely the key management protocol based on key distribution center, is applied in the newly designed network interface card with encryption

    2 、改進了標準中的部分密鑰管理協議,並把基於發放中心的密鑰管理協議應用到了新設計的加網卡。
  13. Koal card - issuing management server provides key management functions. it is responsible for security management in the process of card - issuing such as the card key accessing, card key - issuing, card key s backup and retrieve and the key destruct etc

    格爾發卡服務器提供密鑰管理功能,它負責所有卡的接入、發卡服務、卡備份和恢復以及的銷毀等整個發卡過程的安全
  14. The four secure key management mechanisms, including kp ( protect key ), kd & ke ( decrypt & encrypt key ), kw ( working key ) and km ( message key ), which can protect the key " end - to - end " and ensure the key only use once

    採用了保護尤屍、雙(犬d進犬e ) 、工作kw和消息尤材等四級密鑰管理體制。該體制可以保證的端端性和一次一性。
  15. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合加系統主要包括以下模塊:本地密鑰管理模塊、服務器模塊、加和認證模塊、網路socket模塊、其它輔助模塊等。本系統有效解決了基於voip技術的分散式網路多媒體會議系統中信息安全傳輸的問題。
  16. To ensure data security of wlan, the design adopts rijndael algorithm ' s implementation in ocb mode to provide authenticated encryption, presents a double dynamic key management mechanism, and adopt mutual authentication based on public key system

    為了確保安全性,在方案設計中,使用了rijndael演算法的ocb執行模式來實現認證加、提出了雙層動態密鑰管理機制、採用了基於公體系的雙向身份認證機制。
  17. The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice. the emergence of public key cryptography solves the key management problem whereas it introduces another problem, the verification of public key authenticity

    碼體制存在密鑰管理的問題,而公碼體制在有效解決密鑰管理問題的同時卻又帶來了公真實性的問題。
  18. Universal key management system realizes its function through software encryption algorithm and key - memory issuing functions itself through master - card. sjy49 uses key management platform by hardwares. the algorithm used in the generation, diffusion, eduction and transfer of the key is approved by the state competent department. the implementation of algorithm is functioned by the encryption equipment recognized by the state competent department

    通用密鑰管理系統採用軟體碼演算法,存儲分發等採用母卡方式實現; sjy49銀行ic卡密鑰管理系統採用硬體化的密鑰管理平臺,的生成、分散、導出、傳輸等密鑰管理功能使用的演算法是經國家主部門審定通過的演算法,演算法的實現使用經國家主部門審定通過的硬體加設備。
  19. Xml security : the xml key management specification

    Xml安全: xml密鑰管理規范
  20. The mechanism of secret - key management in the mobile ad hoc network

    網路的密鑰管理機制
分享友人