public-key 中文意思是什麼
public-key
解釋
公用密鑰, 公用關鍵字-
Some public key cryptosystem extended to abelian group
一些公鑰密碼體制在阿貝爾群上的擴展 -
Public - key traitor tracing based on the bilinear map
基於雙線性映射的公鑰叛逆者追蹤 -
The difficulty of decoding based on cryptograph and public key is equal to the difficult } " of dividing the product of two big prime numbers
從一個公開密鑰和密文中恢復出明文的難度等價于分解兩個大素數之積。 -
Cryptology is the core of the information security. modern cryptograph divides into the public key system and the private key system
密碼學是信息安全技術的核心,現代密碼體制分為公鑰體制和私鑰體制兩大類。 -
Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin. it ' s the foundation of many secure applications
公鑰密碼技術結合傳統的對稱密碼技術及信息摘要技術,可提供信息的保密性、完整性和信源確認,是多種安全應用的基礎。 -
Digital signatures rely on public key cryptography
數字簽名依賴于公共密鑰加密學。 -
The public - key cryptography of data encryption
基於配對函數的對稱加密演算法 -
Public - private key combination is at the heart of public key infrastructure, and is based on asymmetric cypher
公鑰-私鑰組合是公共密鑰基礎設施的核心,建立在非對稱密碼的基礎上。 -
The main contributions of this dissertation include : firstly, deeply research on underlying techniques of pki system, emphatically analyze dissymmetrical public - key cryptography ecc and compare it with other cryptography techniques
本文首先對pki體系的底層技術進行深入研究,重點分析了非對稱密碼橢圓曲線密碼體制,並將它與其他密碼技術進行了比較。 -
For strongly named assemblies, equivalency requires the assembly name, version, public key token, and culture to be identical
對于具有強名稱的程序集,等效性要求程序集名稱、版本、公鑰標記和區域性均應相同。 -
Pki public key infrastructure practices and policy framework
公共密鑰的基礎設施 -
This article firstly presents some introductive materials, including public - key cryptography and the motivations and the developments of the elliptic curve cryptosystems
本文首先介紹了橢圓曲線的研究背景、國內外研究現狀、發展動態以及橢圓曲線密碼技術的歷史與現狀。 -
The third party uses the message, the key signature and the known public key to verify the source as trusted
第三方再根據該訊息、金鑰簽章與已知的公開金鑰,認證該訊息具有可信賴的來源。 -
A knap sack public - key cryptosystem based on factoring big integer problem
一種基於大數難解問題的背包公鑰密碼體制 -
With the rapid development of the internet and electronic commerce, it is required that service division should be more and more specialized and fine - sorted. as a result, public - key infrastructure ( pki ), which has both the function for the authentication and the function for the authorization, has become maladjusted in the present information technology society
隨著internet和全球電子商務的突飛猛進,對服務分工要求越來越細的同時,現有公鑰基礎設施pki框架中同時實現身份認證和授權管理的功能模式,已越來越不適應當代信息社會的發展需求。 -
Because this sequence has the properties of super increasing sequence, it can be applied to general public key cryptosystems of the trapdoor knapsack
並利用它們的超遞增序列特性,將其應用在常規的陷門背包公鑰密碼體制中。 -
This article describes how to configure openssh for host - based and public key - based authentication for the aix, linux, solaris, and hp - ux operating systems
本文描述如何為aix 、 linux 、 solaris和hp - ux操作系統上基於主機和基於公鑰的認證配置openssh 。 -
Information technology. security techniques. entity authentification mechanisms. part 3 : entity authentification using a public key algorithm
信息技術.安全技術.實體鑒別機制.第3部分:使用公共鍵演算法進行實體鑒別 -
In this paper, members serving system, popular web developing technology and pki ( public key infrastructure ) are introduced firstly. then, after analyzing the system in detail the author makes the conclusion that using mvc architecture based on jsp technology to build members serving system is a good method. furthermore, the method of system analysis and design using uml with rational rose tools is introduced
文中將首先介紹期貨交易所會員服務系統,當今流行的電子商務平臺的開發技術,及pki公開密鑰基礎設施技術,之後從期貨交易所會員服務系統的功能需求出發,經過詳盡的分析確定以jsp技術為基礎的mvc框架結構,並結合使用rationalrose工具描述了如何利用uml語言進行系統分析與設計。 -
The communication cost for one round execution of the protocol is 2mk, where k is bit length of public key n and m is the number of users in the group
執行協議每輪需要的通信量為2mk ,其中k為公鑰n的比特長度, m為群體用戶的個數。
分享友人