數據密鑰 的英文怎麼說

中文拼音 [shǔyào]
數據密鑰 英文
dek data encryption key
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • 數據 : data; record; information
  1. The id of an asymmetric key in the current database

    庫中非對稱的id 。
  2. Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data

    類派生的類使用一種稱為碼塊鏈接( cbc )的鏈接模式,該鏈接模式需要和初始化向量才能執行的加轉換。
  3. The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data

    基類庫中提供的塊碼類使用稱作碼塊鏈( cbc )的鏈模式,它使用一個和一個初始化向量( iv )對執行加轉換。
  4. These appliances, available from companies such as decru, neoscale, and vormetric, implement very fast encryption - they typically claim to operate at or close to " wire speed. " they also usually include sophisticated key management facilities for controlling the creation and distribution of cipher keys, cycling of keys, and disposition of keys, besides handling general data encryption

    Decru 、 neoscale和vormetric等公司都能提供這些器件,它們實現了非常快的加通常被聲稱速度達到或接近「線速」 。它們還常常包括高級的管理設施,除了用於處理一般的外,還可用於控制的創建和分發、的循環和的銷毀。
  5. Decrypts data with the private key of a certificate

    用證書的私
  6. If no master key exists for the source database,

    如果沒有用於源庫的主,則
  7. Master database, create a database master key

    庫中,創建庫主
  8. B. dropping a credential for a database master key

    B .刪除庫主的憑
  9. The following example creates a database master key for the

    庫創建庫主
  10. Opens the database master key of the current database

    打開當前庫的庫主
  11. Specifies the key used to validate encrypted data

    指定用於驗證加
  12. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、管理ike協議、加認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip包的安全保護。
  13. Typically, secret - key algorithms, called block ciphers, are used to encrypt one block of data at a time

    通常,私演算法(稱為塊碼)用於一次加一個塊。
  14. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根用戶輸入的圖片和個性信息,自動產生基,分別運用公開系統進行交換,使通話各方各自產生完全相同的主,巧妙地解決了分配和加同步的問題,並利用單向散列函的性質,基於相同的演算法產生用於加的一次一會話
  15. One special feature of this paper is that it provides fast implementation means for the all kinds of modular exponentiation algorithms, which facilitate the implementation of the rsa public key algorithms. the paper improved the sliding window algorithm by largely reducing the space complexity. meanwhile this paper represents an efficient combined algorithm to improve the processing of encryption and decryption

    模冪乘運算是實現rsa等公碼的基本運算,其運行效率決定了rsa公碼的性能,文章主要研究了各種模冪演算法的快速實現方法,提出運用組合演算法的思想來減少演算法運行時間;並對滑動窗口取冪演算法進行了部分改進,用線性表來存儲預計算,從而減少了演算法的復雜度,進一步提高了rsa加/解的效率,並在試驗測試中得到較為滿意的結果。
  16. Key agreement is usually mentioned in general static group. based on virtual dynamic subgroup, agreed virtual dynamic subgroup scheme avdsg was proposed, which can manage the virtual dynamic subgroup by using the key information of the group

    基於gdh的協商式虛擬動態子群組管理方案實現了利用原來大群的信息,有效地建立和管理虛擬動態安全子群的方法,與gdh方案相比,減少了很多的傳輸和存儲空間。
  17. Returns the guid of a symmetric key in the database

    返回庫中對稱的guid 。
  18. In this paper, two kinds of public - key cryptography of data transport are presented rsa encryption algorithm and diffie - hellman encryption algorithm

    本文介紹了傳輸中公開演算法中的兩種- rsa加演算法和diffie - hellman加演算法
  19. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整性、機性、來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加和認證演算法、管理等如何合作,共同完成對ip報文的安全保護。
  20. For example, the page might contain a data - bound control that stores item identifiers data keys in view state

    例如,頁可能包含一個綁定控制項,該控制項存儲視圖狀態的項標識符(數據密鑰) 。
分享友人