密鑰恢復 的英文怎麼說

中文拼音 [yàohuī]
密鑰恢復 英文
key recovery
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  1. Allow a key to be exported for archival or recovery

    允許導出以便存檔或
  2. The difficulty of decoding based on cryptograph and public key is equal to the difficult } " of dividing the product of two big prime numbers

    從一個公開文中出明文的難度等價于分解兩個大素數之積。
  3. Paper on the risks of key recovery, escrow, etc

    有關密鑰恢復、契約等風險的文章。
  4. Information that is encrypted only by an irretrievable key will be lost

    僅由不可的信息將會丟失。
  5. Use the force option only if the master key is irretrievable or if decryption fails

    請僅在主無法或解失敗時,才使用force選項。
  6. This paper is at introduction foundation of cryptography, analyzes x. 509 certificate, has explained the principle of pki and function of each part, and combines the author ' s project development, explains the running environment and systematic characteristic of jy _ ca, it is to divide jy _ ca into ca initial module, certificate requisition module, certificate signature module, certificate revocation module, certificate inquiry module, privat key recovery module and management module. the realization of each module has been explained briefly at the same time

    本文在介紹碼學知識的基礎上,剖析了x . 509證書的證書結構,詳盡闡述了pki的原理和各個組成部分的功能,並結合作者的項目開發,對jyca的運行環境和系統特點作了整體說明,把jyca劃分為ca初始化模塊、證書申請模塊、證書簽發模塊、證書吊銷模塊、證書查詢模塊、密鑰恢復模塊及管理模塊,同時對各個模塊的實現要點作了扼要說明。
  7. Koal card - issuing management server provides key management functions. it is responsible for security management in the process of card - issuing such as the card key accessing, card key - issuing, card key s backup and retrieve and the key destruct etc

    格爾發卡管理服務器提供管理功能,它負責所有卡的接入、發卡服務、卡備份和以及的銷毀等整個發卡過程的安全管理。
  8. A group - key distribution protocol is designed which has the capability of self - recovery and coalition - attack - resisting, particularly suitable for highly lossy transmission environment such as wireless sensor networks

    摘要構造一個具有自能力和抵禦合謀攻擊能力的組群發布協議,該協議特別適合於高度易失傳輸環境,例如無線傳感器網路。
  9. Verify a sound, robust key recovery policy

    驗證一個良好的、健壯的密鑰恢復策略:
  10. Make sure that the xkms service provider has a sound and robust key recovery policy as it has a direct impact on signed document repudiation and encrypted document authenticity

    確保xkms服務提供程序具有一個良好的、健壯的密鑰恢復策略,因為這直接影響著簽名文檔的否認和加文檔的可靠性。
  11. Kmc management control desk is responsible for the checkup of key recovery, the checkup of key destruct and the checkup of key trusteeship

    Kmc管理控制臺負責密鑰恢復審核、銷毀審核、託管審核。
  12. It is used for the management of the key recovery. kmc control desk can be divided into two parts, that is, kmc management control desk and judicial key recovery

    Kmc控制臺是kmc的一部分,用於密鑰恢復的管理, kmc控制臺分為kmc管理控制臺和司法密鑰恢復兩部分。
  13. After ra operator receives the recovery request, he is able to see it through the kmc control desk. kmc operator should startup the kmc control desk regularly and browse the requests for the key recovery, and determine whether approve them or not

    Ra操作員錄入用戶的證書請求后, kmc操作員就可以在kmc控制臺看到。 kmc操作員應當定期啟動kmc控制臺,瀏覽密鑰恢復申請,決定批準還是拒絕用戶的證書申請。
  14. This system provides support for group sending of military emails belonging to the same security domain as well as point to point transfer. it also supports functions such as distribution, refreshment and recovery of keys

    系統支持同一安全域內軍用郵件的組間群發及點對點互發,支持分級的分發及更新和等功能。
  15. A feature designed to allow messages to be recovered even if a key has been lost

    密鑰恢復( key recovery )即使丟失也可以允許消息的特性。
  16. At present, pki which used in enterprise environment is still rare. jy _ ca is the pki product that we developed on the basis of openssl " s function library, it is formed of ca and ra. it realizes main function of typical pki / ca, which has certificate requisition, certificate signature, certificate revocation, certificate inquiry, private key recovery etc., it can meet the needs of different application occasions

    目前,企業使用的pki還不多見, jyca是我們基於openssl函數庫開發的pki產品,它由ca和ra構成,實現了一個典型的pki ca的主要功能,有證書申請、證書簽發、證書吊銷、證書查詢、密鑰恢復等,可以滿足各種應用場合的需要。
  17. Kerberos is essentially a secure network authentication protocol that employs a system of shared secret keys and is able to provide robust security against impersonation and reply attacks

    Kerberos實際上是一種安全網路認證協議,採用共享的系統,並且能提供健壯的安全性,以防止偽裝攻擊和攻擊。
  18. Managing the encryption keys consists of creating a backup copy, and knowing when and how to restore, delete, or change the keys

    創建對稱的備份副本,並了解應何時以及如何在部署或方案中使用備份副本至關重要。
分享友人