authentication exchange 中文意思是什麼

authentication exchange 解釋
鑒別交換
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  • exchange : vt 1 (以某物與另一物)交換,調換 (for) 2 互換,交流,交易。3 兌換。 vi 1 兌換 (for) 2 交換;...
  1. We have passed iso9002 quality system authentication on august, 2000. over the years our co have won 50 honoraty titles such as abide by contract and keep good faith enterprise in shandong province, export and gain foreign exchange advanced unit in province, the legal rights strass protected unit in province and one of the 100 strongest export oriented enterprisc in province and so on

    公司已於2000年8月通過了iso9002國際質量體系認證,近50年以來贏得50項榮譽稱號如「山東省重合同、守信用企業單位」 、 「山東省出口和創外匯先進單位」 、 「山東省外向型企業之一」等。
  2. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  3. Property defines whether forms - based authentication should use a cookie to exchange user information

    屬性定義基於窗體的身份驗證是否應使用cookie來交換用戶信息。
  4. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  5. Ike ( internet key exchange ) is the protocol which performs mutual authentication and establishes security associations ( sas ) for ipsec ( ip security ). it is a very important component of the ipsec protocol suite

    因特網密鑰交換( internetkeyexchangeike )協議是ipsec ( ipsecurity )協議簇的重要組成部分,負責動態協商和管理安全聯盟。
  6. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  7. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整性、機密性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加密和認證演算法、密鑰管理等如何合作,共同完成對ip報文的安全保護。
  8. In recent years, as the rapidly development of informatic technologies and the bloom of internet, a large number of transactions appeared in the internet. fingerprint verification technology, as the most efficient, reliable, and low - cost authentication technology, has been more and more widely used in banking, stock exchange and e - business fields besides traditional police applications

    近年來,隨著信息技術和網路技術的飛速發展以及大量internet事務與交易的出現,指紋自動識別這種最快速、開銷最低並且效果良好的認證技術除了在傳統的刑事偵緝領域之外,在銀行、股市和電子商務等行業作為身份鑒別得到更廣泛的應用。
  9. As the discussion, the 802. 1x is easy to extend and supports various authentication mechanisms, among which eap - tls is the most popular one. the eap - tls provides a two - way authentication between the client and server, key exchange and dynamic key in authentication procedure, which make sure the security of the process of authentication

    802 . 1x具有很強的擴展優勢,可以支持多種認證機制, eap - tls就是其中應用最廣的一種,因為eap - tls提供了客戶端和服務器的雙向認證,且在認證過程中進行密鑰交換和生成動態密鑰,在?大程度上?巳現?痰陌踩? =幼盼惱陸檣芰吮痙槳鋼
  10. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線密碼在加密解密、密鑰交換、數字簽名等方面的密碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線密碼在電子拍賣系統、密鑰認證系統方面的實現方案。
  11. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  12. Based on the three elementary business models such as e - shopping, contract signing and receipt for e - goods, the aim of this project is to design, implement and deploy the middleware components such as secure exchange component and user authentication and access control component, which accord with j2ee and corba architecture

    它以常見的交易活動如電子購物、合同簽定、電子簽收作為基本交換模型,為不同應用系統提供具有符合j2ee和corba體系規范的安全交換組件、用戶認證及入口控制組件。
  13. We select rubin logic to formally analyze the authentication and key exchange protocol designed for this transmission platform utilized, and the analysis result indicates that this authentication and key

    對于傳輸平臺所使用的認證和密鑰交換協議,本文選擇rubin邏輯對其進行形式化分析,分析結果表明該認證和密鑰交換協議具有一定的嚴密性。
  14. In this thesis, we deeply research on secure transmission technique in military information system and presented a multipurpose image watermarking algorithm together with a new authentication and key exchange protocol. they can be well used in the transmission platform

    本文深入研究了軍用信息系統安全傳輸技術,設計和實現了一個多功能數字圖像水印演算法和一個認證和密鑰交換協議,並將其應用到傳輸平臺中。
  15. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函數實現系統的數據加密模塊,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  16. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算法、單項散列函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  17. In the same year, the government also set up the straits exchange foundation, which represents the government in handling cross - strait matters such as authentication of documents, joint law enforcement, and protection of intellectual property rights

    又同時成立財團法人海峽交流基金會,代表政府與大陸交涉處理交流中產生之相關問題,例如兩岸文書認證共同打擊犯罪共同進行著作權保護等等。
  18. Logs the user on, either by generating a 302 redirect url or by initiating a passport - aware client authentication exchange

    使用戶登錄,方法是生成302重定向url ,或者啟動識別passport的客戶端身份驗證交換。
  19. Logs the user on by outputting the appropriate headers to either a 302 redirect url or the initiation of a passport - aware client authentication exchange

    使用戶登錄,方法是將適當的標頭輸出到302重定向url ,或者啟動識別passport的客戶端身份驗證交換。
  20. 3. online exchange safety authentication

    3 .可作線上交易的安全驗證
分享友人