數字簽名標準 的英文怎麼說

中文拼音 [shǔqiānmíngbiāozhǔn]
數字簽名標準 英文
dss digital signature standard
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : Ⅰ名詞1 (標準) standard; guideline; criterion; norm 2 (目標) aim; target Ⅱ動詞1 (依據; 依照)...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  • 簽名 : sign one's name; autograph
  • 標準 : (衡量事物的準則; 榜樣; 規范) standard; criterion; benchmark; pip; rule; ètalon (衡器); merits
  1. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了認證系統的三種類型,即身份認證、和消息認證,剖析了一些經典的方案,並對安全模式與隨機oracle模式做出比較,並基於隨機oracle模式提出了一個新的身份認證演算法及其相應的變形,兩個演算法均在橢圓曲線上實現。
  2. On the consideration of the important function of xml in message communication, security plan and the standard of digital signature in different granularity is given

    鑒于xml在消息通信中的重要作用,研究了不同粒度的安全方案和數字簽名標準
  3. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、和身份證明等)以及新一代的高級加密( advancedencryptionstandard , aes )等。
  4. To ensure that you get success every time you try to verify the digital signatures of logically equivalent xml - irrespective of its physical representation - you must make sure that the xml is in an agreed - upon standard format

    要保證每次驗證邏輯等價的xml不管物理表示如何的都能成功,您必須保證xml使用公認的格式。
  5. W3c xml digital signature standard

    W3c xml數字簽名標準
  6. They wanted to issue a series of strong security cipher standards, including not only block cipher, but also stream cipher, hash function, message authentication code, digital signature, public key cipher and so on

    緊接著, 2001年1月,歐洲啟動了規模更大的nessie工程,希望推出一套不僅包括分組密碼,還包括流密碼、 hash函、消息認證碼、和公鑰加密等在內的強安全性的密碼
  7. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於證書和技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl庫函實現系統的據加密模塊,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  8. Associating java card applet with dll, pkcs # 11 standard interface is realized. the real functions of cryptoapi standard interface is in a csp ( cryptographic service provider ). also, csp is materialized using java card applet, dll and digital signature file

    論文以javacardapplet與動態鏈接庫相結合的形式編碼實現了pkcs # 11介面;以javacardapplet 、動態鏈接庫和文件結合的方式編碼實現了cryptoapi介面所要求的密碼服務提供者csp ( cryptographicserviceprovider ) 。
  9. The elliptic curve digital signature algorithm ( ecdsa ) is the elliptic curve analogue of the digital signature algorithm ( dsa ). it was accepted in 1999 as an ansi standard, and was accepted in 2000 as ieee and nist standards. unlike the ordinary discrete logarithm problem and the integer factorization problem, no subexponential - time is known for the elliptic curve discrete logarithm problem. for this reason, the strength - per - key - bit is substantially greater in an algorithm that uses elliptic curves

    橢圓曲線演算法( ecdsa )是演算法( dsa )的橢圓曲線對等。它先後成為ansi , ieee , nist和iso的,而且其它的一些組織正在考慮成為其。不象普通的離散對問題和因分解問題,橢圓曲線離散對問題沒有已知的亞指演算法,所以使用橢圓曲線的演算法在密鑰的位強度是足夠高的。
  10. The block cipher is one of the two aspects of the modern applied cryptography systems. it has some characteristics - the fast speed, the easy standardization, convenient implement by software and hardware, and so on. the block cipher always is the main parts of the data encryption, digital signature, authentication and key management in the security of information and network

    分組密碼是現代密碼體制發展的兩個方向之一,它具有速度快、易於化和便於軟硬體實現等特點,通常是信息與網路安全中實現據、、認證和密鑰管理的核心體制,因此分組密碼在計算通信和信息系統安全領域中具有廣泛的應用。
  11. The xml signature standard allows the sender to attach a digital signature to the content whose integrity is to be ensured

    Xml signature允許發送者在要保證完整性的內容後面附加
  12. According to some kinds of existed attacking methods that are aimed at the web system, the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol, and the related secure protocol standard. and focusing on cryptography, the paper lucubrates the technology of secure transmission of information such as data encryption, digital signature, identity authentication and data integrality technology

    本文針對web系統中信息傳輸所面臨的安全威脅,從保障網路信息安全傳輸的角度,系統研究了tcp ip各個層次上實現安全通道的可行性及相關的安全協議,圍繞密碼體制,對據加密、、身份認證、據完整性控制等信息安全傳輸技術進行了深入的探討。
  13. Exactly how it uses the web can be syntactically specified as demonstrated in the technical discussion that follows, but that kind of discussion ignores the meta - question of what url to use

    擁有可以通過密碼技術認證的秘鑰是一種方法。我們將討論解決認證問題的常見方法,包括系統。
  14. Represents the uniform resource identifier for the standard namespace for xml digital signatures

    表示與xml空間對應的統一資源識符( uri ) 。
  15. With a public key infrastructure, you can implement standards - based technologies such as smart card logon capabilities, client authentication ( through secure sockets layer and transport layer security ), secure e - mail, digital signatures, and secure connectivity ( using internet protocol security )

    利用公用密鑰結構,可以執行一些的技術,例如智能卡登錄功能、客戶端身份驗證(通過安全套接層協議和傳輸層安全保護) 、安全電子郵件、和安全連接(使用internet協議的安全保護) 。
分享友人