密鑰傳輸 的英文怎麼說

中文拼音 [yàozhuànshū]
密鑰傳輸 英文
key exchange
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : 傳名詞1 (解釋經文的著作) commentaries on classics 2 (傳記) biography 3 (敘述歷史故事的作品)...
  • : Ⅰ動詞1 (運輸; 運送) transport; convey 2 [書面語] (捐獻) contribute money; donate 3 (失敗) l...
  1. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略的機性,完整性。
  2. The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol

    量子協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準原理兩大理論基礎上的,但也正是由於量子的這兩種特性導致在bb84協議中存在了效率低下、操作復雜、假冒身份攻擊等方面的問題。
  3. Built upon the project designing voip terminal based on coldfire platform, my task is designing two protocol modules : the secure real - time transport protocol ( srtp ) and multimedia internet keying ( mikey ), and then implements them on target platform

    本課題是在「基於coldfire平臺的voip終端設計」項目背景下,設計並實現該項目中的兩個協議模塊:安全的實時協議srtp和多媒體網際網路的協議mikey 。
  4. Key agreement is usually mentioned in general static group. based on virtual dynamic subgroup, agreed virtual dynamic subgroup scheme avdsg was proposed, which can manage the virtual dynamic subgroup by using the key information of the group

    基於gdh的協商式虛擬動態子群組管理方案實現了利用原來大群的信息,有效地建立和管理虛擬動態安全子群的方法,與gdh方案相比,減少了很多的數據存儲空間。
  5. In this paper, two kinds of public - key cryptography of data transport are presented rsa encryption algorithm and diffie - hellman encryption algorithm

    本文介紹了數據中公開演算法中的兩種- rsa加演算法和diffie - hellman加演算法
  6. The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification

    竊聽者通過竊聽所獲取的信息量是決定密鑰傳輸是否成功的重要指標,同時也是保增強這一技術環節的必要參數。
  7. Class defines key transport recipient information

    類定義密鑰傳輸收信方信息。
  8. A design scheme of cryptogram transmission system based on fpga is presented, which is used to implement the simulation of the quantum transmission channels. furthermore, a circuit of fpga power - on configuration is realized

    提出了基於fpga的系統的設計方案,用於模擬高斯在量子通道上的,並完成了fpga上電配置電路的設計。
  9. One of the key techniques is the detection of near infrared ( 1310nm and 1550nm ). because the quantum key is transmitted by one photon, and 1310nm and 1550nm infrared are the lost loss wavelength in fiber. we can detect the visible light now, but it is difficult to detect the near infrared because of its low energy

    量子通信的關鍵技術之一就是紅外( 1310nm 、 1550nm )單光子探測,這是因為光量子密鑰傳輸是採用單個光子來實現的, 1 . 3微米和1 . 5微米是現在所使用的光纖通信中損耗最小的波長,現有成熟的單光子探測器工作波長都是在可見光波段,而紅外光子因為能量小,信號非常微弱,極易被噪聲淹沒,因而非常難探測到。
  10. In a real world scenario, alice and bob use public key asymmetric encryption to transfer a secret symmetric key and use secret key encryption for the remainder of their session

    在一個實際方案中,小紅和小明使用公(不對稱)加私(對稱),而對他們的會話的其餘部分使用私
  11. Key transport recipient information

    密鑰傳輸收件人信息。
  12. Contemporary, with the basic of ca authentication, digital signature, public - key cryptography and secret - key cryptography, this thesis bring forward a basic model of user registration and c / s, b / s resource accessing under the mechanism that using cryptography to transfer and memory the user ' s password

    同時,在結合pki模式中ca認證、數字簽名以及公開與對稱演算法技術的基礎之上,提出了和存儲口令機制下的用戶注冊和c s 、 b s模式資源訪問的基本模型,以實現c s和b s的安全機制。
  13. Property retrieves the encrypted key for this key transport recipient

    屬性檢索該密鑰傳輸收信方的加
  14. An int value that represents the version of the key transport

    一個整數值,表示密鑰傳輸
  15. Property retrieves the version of the key transport recipient

    屬性檢索密鑰傳輸收信方的版本。
  16. Key transport algorithms typically use the

    密鑰傳輸演算法一般使用
  17. Version property retrieves the version of the key transport recipient

    屬性檢索密鑰傳輸收信方的版本。
  18. Object that stores the identifier of the recipient taking part in the key transport

    存儲參與密鑰傳輸過程的收信方標識符的
  19. Object establishes a cryptographic key by a key agreement algorithm or a key transport algorithm

    對象是按協議演算法還是密鑰傳輸演算法建立加
  20. This is in contrast to key transport algorithms, in which one party generates the key unilaterally and sends, or transports it, to the other party

    這與密鑰傳輸演算法不同,在密鑰傳輸演算法中,將由一方單獨生成,然後將發送或給另一方。
分享友人