key verification 中文意思是什麼

key verification 解釋
鍵校驗
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • verification : n. 1. 證實,證明,確定;核驗,驗證,核對;檢驗,校驗。2. 【法律】訴狀[答辯書]結尾的舉證說明。
  1. The lack of an effective solution to the problem of secret key management inhibited the wide use of secret key cryptography in security practice. the emergence of public key cryptography solves the key management problem whereas it introduces another problem, the verification of public key authenticity

    秘密密鑰密碼體制存在密鑰管理的問題,而公鑰密碼體制在有效解決密鑰管理問題的同時卻又帶來了公鑰真實性的問題。
  2. Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card

    Ecdsa等簽名驗證體制的選取, deffie - hellman等密鑰交換體制的研究。論文也討論了基於有限域上橢圓曲線公鑰密碼系統的若干應用和信息安全產品,如數字簽名,組簽名,在智能卡中的應用。
  3. The parameters negotiated by ike include the arithmetic of encrypt and verification, the key used in encrypt and verification, the protecting pattern of communication ( transfers or tunnel pattern ) and the exist time of key

    Ike協商的安全參數包括加密及鑒別演算法、加密及鑒別密鑰、通信的保護模式(傳輸或隧道模式) 、密鑰的生存期等。
  4. This dissertation is supported by the following projects : national foundation for science research on the theory of sub - deep micro and super high speed multimedia chip design " ( no. 6987601 0 ) national foundation for high technology research & development " interface of vlsi ip core and related design technology " ( 863 - soc - y - 3 - 1 ) a - national r & d programs for key technologies for the 9th five - year plan research on high level language description and embedded technology for mcu " ( 97 - 758 - 01 - 53 - 08 ) national foundation for the ministry of education, prc " research on the optimal theory and methodology of soc software / hardware integration co - design and co - verification " ( moe [ 2001 ] 215 ) national foundation for science and technology publication " design of interface circuit for computer with verilog " [ ( 99 ) - f - l - 011 ] a deep research on system level design methodology of 1c and the design technology of mcu - ip and interface ip are made in this dissertation. the main work and achievements are as follows : 1 building block principle and the building block component maximum principle are brought forward based on the research of developing history of ic design

    本文基於以下科研項目撰寫:國家自然科學基金「深亞微米超高速多媒體晶元設計理論的研究」 ( 69876010 )國家863計劃「超大規模集成電路ip核介面及相關設計技術」 ( 863 - soc - y - 3 - 1 )國家「九五」重點科技攻關「 mcu高層語言描述及其嵌入技術研究」 ( 97 - 758 - 01 - 53 - 08 )國家教育部「 soc軟硬體集成協同設計和驗證優化理論和方法研究」 (教技司[ 2001 ] 215 )國家科技學術著作出版基金「 verilog與pc機介面電路設計」 ( 99 - f - 1 - 011 )論文的主要工作和取得的成果如下: 1 、在研究集成電路設計方法學發展歷史的基礎上,提出了設計的積木化原則和積木元件最大化原則。
  5. Food analysis and safety verification is a key point of food inspection and administration

    摘要食品分析與檢驗是食品安全監督管理的關鍵環節。
  6. In the part of voice encryption, spatiotemporal chaotic system ( ocoml model ) and lfsr are used to generate multidimensional pseudo - random sequence. this sequence has a longer period, better randomicity, passing the verification of fips 140 - 2 security requirements. using the key stream generated by it to encrypt the voice gets a better security

    在語音加密方面,本文利用時空混沌系統(單向耦合映象格子模型)與線性移位寄存器產生了高維的偽隨機序列,該序列周期很長,具有更強的隨機性,通過了fips140 - 2的安全性能驗證,利用其作為密鑰流對語音信號進行加密,獲得了更高的保密性。
  7. During the modeling and verification of the authentication version of needham - schroeder public key protocol with smv, we get more comprehension on the theory of symbolic model checking and small system model, and finally find a flaw in this protocol that corresponds with the one that gavin lowe found with fdr

    通過使用smv對needham - schroeder公鑰協議進行建模和驗證,理解了符號化模型檢驗和小系統模型的原理,並發現了一個協議漏洞,該漏洞與gavinlowe用fdr所發現的相一致。
  8. In order to break through the limitation of small system model, for the verification of woo and lam u symmetric key protocol with smv, a model is built up. an honest agent in the model is allowed to participate in two protocols. finally a flaw is found that an intruder can successfully commit an attack when the responder is allowed to participate in two protocols simultaneously

    為了突破小系統模型的局限性,我們使用smv驗證wooandlam對稱鑰協議時,建立了允許誠實的通信實體運行兩次協議的模型,在這個模型上發現了一個已知的協議漏洞,攻擊者利用誠實通信實體的兩次運行,成功地進行了攻擊。
  9. Design and implementation of a fast round robin scheduler, in which a pipelined barrel shifter and a pipelined priority encoder are used ; testbench development of functional simulation for module verification and system verification, in which the bfm simulation model are used and some reference examples are proposed ; discussing the questions that should be paid attention to when using fpga to design high speed circuits and some design skills ; taking part in the system ' s integration and fpga implementation ; taking part in the system ' s test and verification ; the design of this thesis has provided some key method for inter - communication among different network processors, and also accelerated the development of communication products

    討論了用fpga設計高速電路應注意的問題和一些常用的設計技巧;參與整個轉換邏輯的系統集成和fpga實現;參與系統的驗證工作;通信協議轉換邏輯的設計不僅可以解決不同網路處理器之間互通的問題,而且對于促進國產數據通信產品的研究與開發具有很重要的意義。同時在設計的過程中,進一步地探討了基於fpga的高速電路設計技術,對于fpga的設計有參考價值。
  10. A speaker verification system of digit strings based on key digits and hmm

    的數字串說話人身份確認系統
  11. The key exchange data verification has failed

    密鑰交換數據驗證已失敗。
  12. Under the support of jiangsu province key scientific and technological project, this dissertation does research on nc code preprocess and solid - based verification simulation in noncircular surface nc grinding

    本文以江蘇省科技攻關項目為依託,著重對非圓曲面數控磨削加工模擬中的數控代碼預處理技術和基於實體的模擬驗證技術開展了研究。
  13. The public certificate contains the signer s public key, which is to be used to verify the signature during the verification process

    公共證書包含簽名者的公鑰,此公鑰將在驗證過程用來驗證該簽名。
  14. One solution of the source verification and the secure key management in " multi - transfer source " condition is presented in this paper

    並對在「多播」環境中應用ipsec時遇到的源驗證和密鑰管理問題提出了解決方法。
  15. The characteristic of mpeg - 4 accelerates the development of multimedia. the paper introduces the study background and necessity of mpeg - 4 for one thing. then its system standard is described and the key technique of video encoder in the verification models is analyzed

    本文首先介紹了mpeg - 4的研究背景和研究的必要性,之後簡單的概述了mpeg - 4的系統標準,詳細分析了校驗模型中的視頻編碼,對mpeg - 4的標準有了大概的了解。
  16. This system ' s architecture is based on the advanced pki techniques and encryptions techniques, configured with indispensable hardware for security technology to form a substantial application security platform. this integrated application security platform provides the muti - platform applications systematical uniform security services, mainly including user ' s identification, confidentiality and integrity for data transmission, access control, user ' s digital sign and verification, cryptographic key management etc, to fulfill the trans - computer - type and trans - operation system control & management system, which is independent of different business applications or business procedures

    本設計方案以信息系統安全理論與系統工程學原理為基礎,在網路環境下構建了應用安全平臺,實現了一個跨硬體機型與操作系統臺的、與具體應用部署方式無關的統一的安全策略配置,實現了包括身份認證、訪問控制、數據機密性和完整性控制、應用密鑰管理服務、抗抵賴、安全審計、數據安全等安全服務。
  17. The idea of zero - knowledge proof is used in key updating protocol -, the signature protocol -, validity verification protocol of signature and the verification protocol of forward security. it can guarantee that the new scheme is more secure and efficient than previous schemes

    對新方案的密鑰更新協議、簽名協議、簽名的有效性驗證協議、前向安全性驗證協議用了零知識證明的思想,具有更高的安全性和效率。
  18. Adding an assembly to the skip verification list creates a security vulnerability. a malicious assembly could use the fully specified assembly name assembly name, version, culture, and public key token of the assembly added to the skip verification list to fake its identity

    如果將某程序集添加到跳過驗證列表中,則惡意的程序集可以通過使用該程序集的完全限定程序集名稱來隱藏身份,完全限定程序集名稱由程序集名稱、版本、區域性和公鑰標記組成。
  19. One is to compare the measured topology graph with the graph published by the corresponding isp. the other is to contact the administrator of the corresponding isp for the verification of ip address locations of some key routers

    傳統的ip地址定位技術主要是採用域名信息或者與ip地址塊對應的whois信息來確定一個ip地址所在的地理位置以地理城市為定位粒度。
  20. The private key encrypted version of the message serves as an integrity verification token and it is called a " digital signature.

    該消息的私鑰加密版用作完整性驗證記號,我們將它稱為「數字簽名」 。
分享友人