authentication key 中文意思是什麼

authentication key 解釋
鑒別密鑰
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. The cryptanalysis of a quantum key distribution and authentication protocol through once quantum communication

    一次量子通信量子密鑰分發和認證協議的安全性分析
  3. With the rapid development of the internet and electronic commerce, it is required that service division should be more and more specialized and fine - sorted. as a result, public - key infrastructure ( pki ), which has both the function for the authentication and the function for the authorization, has become maladjusted in the present information technology society

    隨著internet和全球電子商務的突飛猛進,對服務分工要求越來越細的同時,現有公鑰基礎設施pki框架中同時實現身份認證和授權管理的功能模式,已越來越不適應當代信息社會的發展需求。
  4. This protocol is verified by applying the expanded ban logic, and its reparability is proved as well in the same chapter, and a hierarchical key distribution system model is given out and the corresponding expanded protocol, which we call authentication based hierarchical reparable key distribution protocol, is proposed as well

    研究了層次化密鑰分配模型以及基於鑒證的可修復密鑰分配協議在這種模型下的擴展。軍隊、政府、企業內部都是典型的層次化組織結構,我們提出的基於鑒證的層次化可修復密鑰分配協議非常適宜這些系統的應用。
  5. On the whole, bb84 + quantum cryptographic key distribution project is far from a termless absolute secure one in the perspective of theory, because the efficiency is enhanced on the sacrifice of security decreased. what ' s more, some works are done to strengthen the cryptograph in the field of identity authentication and other sectors, and the enhancement of efficiency strongly supports the cryptograph

    綜合來看, bb84 +量子密鑰分配方案並不是一個理論上無條件絕對安全的方案,他在安全性能上的降低得到的代價卻是效率的極大提高,並且此方案在身份認證和其他環節上對其有所降低的安全性能作了保密加強的工作。
  6. This article describes how to configure openssh for host - based and public key - based authentication for the aix, linux, solaris, and hp - ux operating systems

    本文描述如何為aix 、 linux 、 solaris和hp - ux操作系統上基於主機和基於公鑰的認證配置openssh 。
  7. Presenting a new concept of authentication chain. 2. introducing a asymmetry key into authentication algorithm, especailly in the loss compression field algorithm, to enhance more security

    提出將用非對稱密鑰演算法應用於認證演算法特別是有損壓縮域的認證演算法之中,因此極大提高了所設計演算法的安全性。
  8. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  9. Policy server is not a part of the model of cidf. the policy server refers to kerberos system. it realizes concentrate authentication and key management

    策略服務器的設計參照了kerberos系統,它實現了一種集中式的認證和安全的密鑰分發。
  10. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的數字通信網路中,數字簽名作為數據認證技術中的一項關鍵技術,可以解決否認、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。
  11. In this article, we perform a tri - layer security mechanism ; we improve the form authentication of asp. net in two places ; we also perform a new dynamic authentication based on two factor ; then we perform a new way to send the credential through the soap header ; we solve the problem about the key creation and the key storage and the transmission of the encrypted message ; after analyzing and discussing the soap protocol, we put forward a safely custom authentication through combining the digest authentication and soap protocol and credential

    在web服務安全方面提出了一些新看法,解決了一些新問題: 1 )提出了基於角色的三層安全機制; 2 )對asp , net的表單驗證技術提出了兩處新的改進: 3 )提出一種動態的雙因素口令認證方法,即在單因素(固定口令)認證基礎上結合第二個物理認證因素,以使認證的確定性按指數遞增。在此,本文提出了第二種認證因素?信任憑證。
  12. It investigates the authentication mechanism on diffie - hellman ( dh ), which is why the ike protocol can " t avoid meeting denial - of - service attacks. the weak key confirmation and its key protocol are investigated

    最後,本文探討了弱密鑰認證方式( weakkeyconfirmation )以及基於這種認證方式構造的一種密鑰協商協議。
  13. Evaluated as the first tourist hotel concerning foreign affairs of third grade of leqing through the provincial tourism bureau of zhejiang in january of 2001, the international quality system iso9001 authentication of august of 2001, was appraised as the green hotel in january of 2003, was verified by world gold key hotel alliance in march of 2005, become the only member of world gold key hotel alliance in leqing, according to the standard of high comfort hotel in 2004, hotels invest a huge sum of money to be fitted up in an all - round way again

    2001年1月通過浙江省旅遊局評定為樂清市首家三級涉外旅遊飯店, 2001年8月國際質量體系iso9001認證, 2003年1月被評為綠色飯店, 2005年3月經世界金鑰匙酒店聯盟審核,成為樂清市唯一的世界金鑰匙酒店聯盟成員, 2004年按四星級酒店標準,酒店再投巨資全面裝修。
  14. Enter passphrase for key home drobbins. ssh identity : hurray, rsa authentication configuration complete

    好哇, rsa認證的配置完成了!
  15. Ike ( internet key exchange ) is the protocol which performs mutual authentication and establishes security associations ( sas ) for ipsec ( ip security ). it is a very important component of the ipsec protocol suite

    因特網密鑰交換( internetkeyexchangeike )協議是ipsec ( ipsecurity )協議簇的重要組成部分,負責動態協商和管理安全聯盟。
  16. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  17. Third, this paper introduce the security structure, security system and algorithm of the 3g system, discussing the security measure of 3g system in the aspect of wireless interface in detail, which including user identity confide ntiality, authentication integrality data, etc. finally, the author stress analyzing the 3g authentication, key agreement protocol and its security, finding the security hole and putting forward new authentication and key agreement protocol based on ecc

    介紹了第三代移動通信系統安全結構、安全體制和演算法,詳細論述了3g系統在無線介面方面的各種安全措施包括用戶身份保密、認證與數據完整性等內容。重點分析了3g認證與密鑰分配協議及其安全性,找出了其中的安全漏洞,提出了新的基於橢圓曲線密碼體制的認證與密鑰分配協議。
  18. Subscriber authentication key

    用戶鑒權鍵
  19. The extended trusted computing and forensic services are used in collecting and analysis activity, including forensic sealing, forensic authentication, key recovery and distributed forensic services

    利用可信計算取證服務和改進的分析流程能夠有效解決可信計算環境中的數字取證調查問題。
  20. Propose three key hierarchy, private key session key temporal key, and achieve separation of encryption key and authentication key

    3提出了三級密鑰體系機制,即私鑰、會話密鑰和臨時密鑰,實現了認證密鑰和加密密鑰的分離。
分享友人