privacy key 中文意思是什麼

privacy key 解釋
秘密鍵標
  • privacy : n. 1. 隱退,隱避,隱居。2. 〈古語〉隱居處,隱退處。3. 秘密,私下。
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Leather seat, gasoline ( unlead engine ), 4 speed automatic transmission, china specification, air conditioner, amfm radio & cassette, 6 cd changer, dual & side air bag, 16 " 6 - hole alloy wheel, sun roof, leather seat, windshield deicer, head lamp cleaner, wide inner mirror, seat heater, deluxe package ( including sport pedal set, sport scuff plate, privacy glass, sport steering wheel, sport suspension ), abs, remote key, 1 set of tools & spare tyre, front left & right power seats

    ,皮座,汽油(無鉛汽油發動機) ,四擋自動變速, 16 "六孔鋁合金鈴,中國標準規格,空調, amfm收音機及磁帶機,六碟cd音向系統,雙氣囊及側面氣囊式輔助保護系統,合金鈴,天窗,真皮座椅,車頭玻璃溶雪裝置,車頭燈清洗裝置,廣角后視鏡,前排電熱座,豪華型配套(包括:跑車型金屬踏板,車門框金屬裝飾襯板,感光玻璃,跑車型單色設計方向盤,跑車懸架) , abs ,遙控,工具及士啤呔,前左右電動座椅
  2. The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification

    竊聽者通過竊聽所獲取的信息量是決定密鑰傳輸是否成功的重要指標,同時也是保密增強這一技術環節的必要參數。
  3. Digital rights management protects audio and video against privacy by asking the broadcaster to provide a consent key before broadcasting content

    數字權限管理( digitalrightsmanagement )保護了音頻和視頻不受非法翻印的侵害,其方法是在播放內容之前要求播放者提供一個許可密鑰。
  4. Of course, there s a glaring flaw here : we re not using a wep wired equivalent privacy key

    當然,這里有一個明顯的缺陷:我們沒有使用wep (有線對等保密, wired equivalent privacy )密鑰。
  5. My study involves two areas in quantum key distribution protocol. first, in the field of the b92 protocol, it is first calculated and analyzed for the holevo upper bound of b92 protocol to noise and eavesdropping, the fidelity, a lower bound on the guaranteed privacy and the capacity for classical information over phase flip channels. it is computed and validated for that projective measurements increase quantum entropy

    本文主要涉及兩個方面:一、 b92量子密鑰分配協議方面,計算分析了b92協議對噪聲和竊聽的holevo上界,以及通過相位翻轉通道的通道保真度,通道可靠的保密性量子熵下界和對經典信息的容量,計算驗證了定理投影測量增加量子熵,分析了測量前後量子狀態的變化,並用計算機模擬繪制了圖形,能夠清楚直觀地分析比較。
  6. Cryptography technology provides the basis for such a mechanism. symmetric cryptosystems can provide privacy service ; hash functions and message authentication codes can provide integrity service ; asymmetric cryptosystems ( public key cryptosystems ) can provide authentication service

    對稱密鑰密碼技術提供了機密性服務;雜湊函數和消息認證碼提供了完整性服務;非對稱密鑰密碼技術(公鑰密碼技術)提供了身份認證服務。
  7. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加密系統,該系統將對稱加密演算法3des與非對稱加密演算法rsa相結合對數據加密,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加密、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別性、完整性及不可否認性。
  8. Such a secret - key agreement over a public channel usually consists of three phases, advantage distillation, information reconciliation and privacy amplification , but advantage distillation is n ' t required for the quantum secret - key agreement

    利用有擾通道的密鑰協商一般可以分為優先提取、信息協調和保密增強三個階段,而量子密鑰協商中只有后兩個階段。
  9. While public key cryptography addresses issues of data integrity and transaction privacy, certificates address concerns in authentication and access control

    公匙加密技術是解決數據完整及交易保密的問題,而數碼證書則能處理認證及接達控制的問題。
  10. Employs personal certificate and three - lever privacy key management to implement the certificate signature with java technique

    採用個人證書管理和三級密鑰管理機制用java實現了數字證書的產生及簽名。
  11. 3 brings forward the ways of the user certificate management and two - layer privacy key ' s management, which ensures the reality and credibility of the privacy key and realizes the dynamic management of the privacy key

    提出了個人證書管理和兩級密鑰管理的辦法,保證了密鑰自身的真實可靠性,並實現了密鑰的動態管理。
  12. The shared key authentication method requires that the wired equivalent privacy algorithm be used on both the wireless device and the access point

    共享密鑰認證( shared key authentication )方法要求在無線設備和接入點上都使用有線對等保密( wired equivalent privacy )演算法。
分享友人