public key systems 中文意思是什麼

public key systems 解釋
公開密鑰系統
  • public : adj (opp private)1 公共的,公眾的,公用的;人民的,社會的,國家的;政府的,公營的,公立的。2 (...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • systems : 國體
  1. This article describes how to configure openssh for host - based and public key - based authentication for the aix, linux, solaris, and hp - ux operating systems

    本文描述如何為aix 、 linux 、 solaris和hp - ux操作系統上基於主機和基於公鑰的認證配置openssh 。
  2. It is believed that in modern cryptography, any algorithm of encryption and decryption in cryptographical systems could be public, and the security should rely on the secure key

    現代密碼學認為,任何加密體系的加密和解密演算法都可以公開,其安全性在於密鑰的保密性。
  3. Public education is not a peripheral part of our work. money and banks are essential features of everyday life, and public confidence in our monetary and banking systems is a key factor in their stability

    由於貨幣及銀行觸及每個人的日常生活,而公眾信心是維系貨幣及銀行體系穩定的重要支柱,因此公眾教育並不只是金管局所旁及的工作。
  4. Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms

    大多數數位簽章系統將公鑰密碼學和密碼雜湊演演算法結合使用。
  5. In a typical web - enabled infrastructure, software running leading - edge enterprise systems needs to handle browser redirects between authorization servers ; http post commands between server domains, public key infrastructure encryption, and digital certificates ; and a mutually agreed - upon mechanism that states the trust level for any given user or group

    在典型的支持web的基礎結構中,運行業界領先的企業系統的軟體需要處理權限服務器之間的瀏覽器重定向、服務器域之間的http post命令、公鑰基礎結構( public key infrastructure , pki )加密和數字證書,以及聲明任何給定用戶或組的信任級別的相互同意( mutually agreed - upon )機制。
  6. On the base of researching in several application security systems, this paper did much work on researching in symmetrical cryptographic system, public key cryptographic system, digital signature system and the digital certificate application technology in the contemporary cryptography, and issued a suitable security application framework taking account of the characteristics of the rfmdms, several key technologies in constructing were discussed also

    本文在對國內外各種安全應用系統調查研究的基礎上,圍繞現代密碼學中對稱式密碼系統、公開密鑰密碼系統、數字簽名系統、數字證書應用技術等進行了深入研究,並結合rfmdms體系結構方面的特點,提出了適合rfmdms的安全應用系統框架,而且對系統實現中的關鍵技術進行了研究。
  7. Both systems are used to decrease the damages due to the compromise of secret key. a new strong ( t, n ) - key - insulated public - key encryption scheme based on the cdh assumption is proposed according to the ( t, n ) - key - insulated public - key encryption model and security definition presented by yevgeniy - jonathan - moti. the new scheme has been proved against chosen - cipertext attack in random oracle

    採用yevgeniy - jonathan - moti提出( t , n )密鑰隔離公鑰加密的一般模型和安全性定義,提出基於cdh假設的強( t , n )密鑰隔離公鑰加密方案,並依據其安全性定義證明新方案在隨機神諭模型下是抗選擇密文攻擊的。
  8. Pkp holds the patents and exclusive licensing rights to all public - key systems on behalf of rsa data security, mit, stanford university, and others

    Pkp代表rsa數據安全公司、麻省理工學院、斯坦福大學和其它機構,擁有所有公開密鑰系統的專利權和唯一的許可發放權。
  9. The author introduces the message digest algorithm, digital signature and x. 509 certificate which are the foundations of authentication in public - key systems. next, ssl protocol is analyzed

    本文首先介紹了密碼學方面的基礎知識,接著介紹了身份認證中的消息摘要演算法和數字簽名的原理以及x
  10. Because, at the bit - length of typical keys, very few numbers are primes, public - key systems must use very large keys to prevent exhaustive searches that try to guess the prime numbers used or to factor the keys

    就典型鑰匙的位長而言,因為素數的數目是非常少的,故公開密鑰系統必須使用非常大的密鑰,以防止窮盡研究把使用的素數猜出來或把密鑰的因子算出來。
  11. Public key cryptographic systems

    公開密鑰加密系統
  12. At present, there exist some conflicts or contradictions concerning some related policies and legal systems, esp. in the realm of rational design of the input of ecological public welfare forest compensation and its mechanism of benefit guarantee, which remains the key to comprehensively promoting the construction of ecological public welfare forests

    但相關的政策法律機制仍存在需要解決的問題,特別是合理設計生態公益林效益補償的投人與利益保障機制,是關繫到能否全面推進生態公益林建設的關鍵。
  13. Public benefit type ( including social medical aid model and national health services model ), insurance type ( including social medical insurance model and market oriented medical insurance model ) and self - security type ( individual saving medical security ). it further argues that medical security systems of all countries are derived from different combinations of these five models. this abstract categorization method emphasizes key points and characteristics making the complicated relationship between medical security schemes and medical security systems in various countries clearer to facilitate comparative analysis of systems in different medical security systems

    在對17個案例國家和地區醫療保障制度體系分析研究的基礎上,本文歸納出了構成各國醫療保障制度體系的最基本的制度單元? ?五種制度模式,即社會醫療救助制度模式、社會醫療保險制度模式、國家衛生服務保障制度模式、市場醫療保險制度模式、個人儲蓄醫療保障制度模式,並將這五種制度模式進一步歸並為福利型(社會醫療救助制度模式和國家衛生服務保障制度模式) 、保險型(社會醫療保險制度模式和市場醫療保險制度模式) 、自保型(個人儲蓄醫療保障制度模式)三種體制類型。
  14. Meanwhile, various head office departments also provide worldwide support in key areas such as corporate communications and public relations, marketing communications, strategic planning and research, industry training and human resources, financial management, systems management and administration

    同時,香港總辦事處的各部門就多個主要范疇支援全球辦事處,包括企業傳訊市場傳訊策略籌劃及市場研究業界培訓及人力資源管理財務管理資訊系統管理及行政事務。
  15. Information technology - open systems interconnection - the directory : public - key and attribute certificate frameworks

    信息技術.開放式系統互連.號碼薄:公鑰和屬性證書框架
  16. The highest safety strength of private key per bit in the public - key cryptography systems is the elliptic curve cryptography at present. under similar secure conditions, the ecc has the advantages such as : less computation amounts, shorter length of private key, smaller storing and bandwidth. moreover, it has been declared as standard documents adopted by many international standard institutions and regarded as the most universally used public key system

    橢圓曲線密碼體制是目前公鑰體制中每比特密鑰安全強度最高的一種密碼體制,在相同安全強度條件下,橢圓曲線密碼體制具有較短的密鑰長度,較少的計算量、存儲量、帶寬等優點,而且橢圓曲線密碼體制已經被許多國際標準化機構作為標準化文件向全球頒布,被認為是下一代最通用的公鑰密碼系統。
分享友人