密鑰服務器 的英文怎麼說

中文拼音 [yào]
密鑰服務器 英文
key server
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : 服量詞(用於中藥; 劑) dose
  • : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 服務器 : client-server
  • 服務 : give service to; be in the service of; serve
  1. Policy server is not a part of the model of cidf. the policy server refers to kerberos system. it realizes concentrate authentication and key management

    策略的設計參照了kerberos系統,它實現了一種集中式的認證和安全的分發。
  2. The key management server of key management subsystem assumes the core function of key management. it offers the retraction and filing etc. the server cipher machine ensures the safety generation and safety issuing of the keys

    管理子系統中的管理承擔了管理的核心功能,同時提供了撤消、歸檔等功能,碼機保證了用戶的安全產生和安全分發。
  3. A three - tier system is used in which encrypted tickets provided by a separate server called the kerberos key distribution center, or kdc for short are exchanged between the application server and client, rather than text userid and password pairs

    Kerberos使用一種三層系統,在這個三層系統中,應用與客戶機之間交換加的票據(單獨由一個名為kerberos分發中心,簡稱kdc的提供) ,而不是交換文本形式的用戶id -碼對。
  4. Communication between the client and the web server is encrypted using a combination of the encryption keys sent by the client and keys provided by the web server

    客戶端和web之間的通信是通過組合使用客戶端發送的加和web提供的來加的。
  5. Once logged on to the offsite storage machine, use the ssh - keygen program to create a public private key pair using the - t dsa option

    登錄到離線存儲以後,使用ssh - keygen程序並給出- t dsa選項來創建一個公/對。
  6. Koal card - issuing management server provides key management functions. it is responsible for security management in the process of card - issuing such as the card key accessing, card key - issuing, card key s backup and retrieve and the key destruct etc

    格爾發卡管理提供管理功能,它負責所有卡的接入、發卡、卡備份和恢復以及的銷毀等整個發卡過程的安全管理。
  7. As the discussion, the 802. 1x is easy to extend and supports various authentication mechanisms, among which eap - tls is the most popular one. the eap - tls provides a two - way authentication between the client and server, key exchange and dynamic key in authentication procedure, which make sure the security of the process of authentication

    802 . 1x具有很強的擴展優勢,可以支持多種認證機制, eap - tls就是其中應用最廣的一種,因為eap - tls提供了客戶端和的雙向認證,且在認證過程中進行交換和生成動態,在?大程度上?巳現?痰陌踩? =幼盼惱陸檣芰吮痙槳鋼
  8. Specifies the algorithm used to create keys shared by the client and server

    指定演算法,該演算法用於創建客戶端和的共享
  9. However, when you update the server key file to use a new private key and certificate signed by some signer, you must ensure that the java clients can verify those certificates

    然而,當您更新文件以使用新的私和由簽署者簽署的證書時,您必須確保java客戶端能夠驗證這些證書。
  10. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合加系統主要包括以下模塊:本地管理模塊、密鑰服務器模塊、加和認證模塊、網路socket模塊、其它輔助模塊等。本系統有效解決了基於voip技術的分散式網路多媒體會議系統中信息安全傳輸的問題。
  11. Do not create a master key credential for a database that must be inaccessible to

    和其他特權級別高的主體無法訪問的數據庫,不要為其創建主憑據。
  12. For example, if a report server database contains key information for three report server instances, all three instances are considered to members of the same scale - out deployment

    例如,如果報表數據庫包含三個報表實例的信息,則所有這三個實例均被視為同一擴展部署的成員。
  13. 2. authentication server distributes encrypted temporal key to ap and station, which greatly increases security of temporal key. 3

    在臨時的分發過程中,實現了全加的分發,即認證向ap和用戶分發臨時都進行加
  14. At last, the implementation of a wlan authentication system based on the 802. 1x, in which eap - tls certification protocol and the ellipse key algorithm are used, is given. the authentication system includes applicant system in client, authentication system and servers using radius. in the implementation, the ecc signature algorithm is used to create certification, and the ecmqv is used in key negotiation stage

    最後文章結合eap - tls認證協議以及橢圓曲線演算法實現了802 . 1x無線局域網認證系統,包括了客戶端申請者系統、認證者系統以及radius認證系統,在實現過程中採用ecc簽名演算法來生成證書,協商階段採用ecmqv協商協議。
  15. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽web雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公數字證書對握手連接信息進行數字簽名驗證。
  16. Used to manage encryption keys on a report server

    用於管理報表上的加
  17. If you want, you can upload your keys to a key server

    如果你想,你也可以上傳你的到一個密鑰服務器中。
  18. Key servers store your public keys for you so that your friends can decrypt your messages

    密鑰服務器為你保存你的公,以便你的朋友可以解開你的信息。
  19. If you choose not to use a key server, you can manually send your public key, include it in your signature file, or put it on your own web page

    如果你不選擇使用密鑰服務器,你也可以手動發送你的公,將它包括在你的簽名文件中,或將它放入你的個人主頁。
  20. You can give your public key to anyone you want to receive encrypted messages, or put it on a public key server so that people can look it up before contacting you

    你可以把你的公給任何你想接收加信息的人,或將它放在一個公上以便人們可以在聯系你之間找到它。
分享友人