密鑰傳輸 的英文怎麼說
中文拼音 [mìyàozhuànshū]
密鑰傳輸
英文
key exchange-
In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control
模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol
量子密鑰協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準原理兩大理論基礎上的,但也正是由於量子的這兩種特性導致在bb84協議中存在了傳輸效率低下、操作復雜、假冒身份攻擊等方面的問題。Built upon the project designing voip terminal based on coldfire platform, my task is designing two protocol modules : the secure real - time transport protocol ( srtp ) and multimedia internet keying ( mikey ), and then implements them on target platform
本課題是在「基於coldfire平臺的voip終端設計」項目背景下,設計並實現該項目中的兩個協議模塊:安全的實時傳輸協議srtp和多媒體網際網路的密鑰協議mikey 。Key agreement is usually mentioned in general static group. based on virtual dynamic subgroup, agreed virtual dynamic subgroup scheme avdsg was proposed, which can manage the virtual dynamic subgroup by using the key information of the group
基於gdh的協商式虛擬動態子群組密鑰管理方案實現了利用原來大群的密鑰信息,有效地建立和管理虛擬動態安全子群的方法,與gdh方案相比,減少了很多的數據傳輸和密鑰存儲空間。In this paper, two kinds of public - key cryptography of data transport are presented rsa encryption algorithm and diffie - hellman encryption algorithm
本文介紹了數據傳輸中公開密鑰演算法中的兩種- rsa加密演算法和diffie - hellman加密演算法The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification
竊聽者通過竊聽所獲取的信息量是決定密鑰傳輸是否成功的重要指標,同時也是保密增強這一技術環節的必要參數。Class defines key transport recipient information
類定義密鑰傳輸收信方信息。A design scheme of cryptogram transmission system based on fpga is presented, which is used to implement the simulation of the quantum transmission channels. furthermore, a circuit of fpga power - on configuration is realized
提出了基於fpga的密碼傳輸系統的設計方案,用於模擬高斯密鑰在量子通道上的傳輸,並完成了fpga上電配置電路的設計。One of the key techniques is the detection of near infrared ( 1310nm and 1550nm ). because the quantum key is transmitted by one photon, and 1310nm and 1550nm infrared are the lost loss wavelength in fiber. we can detect the visible light now, but it is difficult to detect the near infrared because of its low energy
量子通信的關鍵技術之一就是紅外( 1310nm 、 1550nm )單光子探測,這是因為光量子密鑰傳輸是採用單個光子來實現的, 1 . 3微米和1 . 5微米是現在所使用的光纖通信中損耗最小的波長,現有成熟的單光子探測器工作波長都是在可見光波段,而紅外光子因為能量小,信號非常微弱,極易被噪聲淹沒,因而非常難探測到。In a real world scenario, alice and bob use public key asymmetric encryption to transfer a secret symmetric key and use secret key encryption for the remainder of their session
在一個實際方案中,小紅和小明使用公鑰(不對稱)加密來傳輸私(對稱)鑰,而對他們的會話的其餘部分使用私鑰加密。Key transport recipient information
密鑰傳輸收件人信息。Contemporary, with the basic of ca authentication, digital signature, public - key cryptography and secret - key cryptography, this thesis bring forward a basic model of user registration and c / s, b / s resource accessing under the mechanism that using cryptography to transfer and memory the user ' s password
同時,在結合pki模式中ca認證、數字簽名以及公開密鑰與對稱密鑰演算法技術的基礎之上,提出了密文傳輸和存儲口令機制下的用戶注冊和c s 、 b s模式資源訪問的基本模型,以實現c s和b s的安全機制。Property retrieves the encrypted key for this key transport recipient
屬性檢索該密鑰傳輸收信方的加密密鑰。An int value that represents the version of the key transport
一個整數值,表示密鑰傳輸Property retrieves the version of the key transport recipient
屬性檢索密鑰傳輸收信方的版本。Key transport algorithms typically use the
密鑰傳輸演算法一般使用Version property retrieves the version of the key transport recipient
屬性檢索密鑰傳輸收信方的版本。Object that stores the identifier of the recipient taking part in the key transport
存儲參與密鑰傳輸過程的收信方標識符的Object establishes a cryptographic key by a key agreement algorithm or a key transport algorithm
對象是按密鑰協議演算法還是密鑰傳輸演算法建立加密密鑰。This is in contrast to key transport algorithms, in which one party generates the key unilaterally and sends, or transports it, to the other party
這與密鑰傳輸演算法不同,在密鑰傳輸演算法中,將由一方單獨生成密鑰,然後將密鑰發送或傳輸給另一方。分享友人