密鑰結構 的英文怎麼說

中文拼音 [yàojiēgòu]
密鑰結構 英文
key structure
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : 結動詞(長出果實或種子) bear (fruit); form (seed)
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • 結構 : 1 (各組成部分的搭配形式) structure; composition; construction; formation; constitution; fabric;...
  1. In sna products, a key used to encipher operational keys that are to is used at a node

    在系統網路體系( sna )產品中,對將要在某個網點上使用的操作鍵標進行加的一種鍵(也稱鍵標,也就是) 。
  2. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由控制」的變分組碼,該演算法區別于其它大部分分組碼最大的特點是它的s -盒不是固定不變的而是由控制產生;第二種是基於smn ( d )陣列編碼的變分組碼,該演算法充分利用了smn ( d )陣列編碼具有碼距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析果認為這兩個變演算法正確、有效且安全。
  3. In this dissertation we make a study of subliminal channels that conclude the progress, the application, the model, the construction, the stego - key, the capacity, the security, the way to realize subliminal - freeness, and so on

    本文對閾下通道技術進行了比較全面的總和研究,包括閾下通道的發展狀況,應用前景,閾下通道的模型,造方法,隱匿,容量,安全性以及封閉方法等。
  4. Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on

    研究了公系統中的橢圓曲線加理論,詳細闡述了有限域上橢圓曲線的及其基本運算; 3
  5. This protocol is verified by applying the expanded ban logic, and its reparability is proved as well in the same chapter, and a hierarchical key distribution system model is given out and the corresponding expanded protocol, which we call authentication based hierarchical reparable key distribution protocol, is proposed as well

    研究了層次化分配模型以及基於鑒證的可修復分配協議在這種模型下的擴展。軍隊、政府、企業內部都是典型的層次化組織,我們提出的基於鑒證的層次化可修復分配協議非常適宜這些系統的應用。
  6. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、管理ike協議、加認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  7. In this paper, members serving system, popular web developing technology and pki ( public key infrastructure ) are introduced firstly. then, after analyzing the system in detail the author makes the conclusion that using mvc architecture based on jsp technology to build members serving system is a good method. furthermore, the method of system analysis and design using uml with rational rose tools is introduced

    文中將首先介紹期貨交易所會員服務系統,當今流行的電子商務平臺的開發技術,及pki公開基礎設施技術,之後從期貨交易所會員服務系統的功能需求出發,經過詳盡的分析確定以jsp技術為基礎的mvc框架,並合使用rationalrose工具描述了如何利用uml語言進行系統分析與設計。
  8. Key agreement scheme for dynamic secure multicast based on connected dominating set

    的動態安全組播協商方案
  9. This paper is at introduction foundation of cryptography, analyzes x. 509 certificate, has explained the principle of pki and function of each part, and combines the author ' s project development, explains the running environment and systematic characteristic of jy _ ca, it is to divide jy _ ca into ca initial module, certificate requisition module, certificate signature module, certificate revocation module, certificate inquiry module, privat key recovery module and management module. the realization of each module has been explained briefly at the same time

    本文在介紹碼學知識的基礎上,剖析了x . 509證書的證書,詳盡闡述了pki的原理和各個組成部分的功能,並合作者的項目開發,對jyca的運行環境和系統特點作了整體說明,把jyca劃分為ca初始化模塊、證書申請模塊、證書簽發模塊、證書吊銷模塊、證書查詢模塊、恢復模塊及管理模塊,同時對各個模塊的實現要點作了扼要說明。
  10. The platform puts emphasis on the implementation of m - gdh. 2 protocol, and realizes such functions as follows : peer to peer network connection, dynamically displaying network topology, key generation, secure communication, help - online and so on

    該平臺以m - gdh . 2協議為開發重點,實現了網路對等連接、動態顯示網路拓撲生成、安全通信以及聯機幫助等功能。
  11. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬果表明,該方法可以產生具有良好統計特性的流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組碼rijndael演算法的單向hash函數的造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加模塊,所得的果再加入到反饋端,參與下一分組輸入的異或運算,迭代束時的rijndael加果即為所求的hash函數值。
  12. The paper analyzes the secure problem existing in the tcp / ip protocol, discusses the possibility and superiority of secure transmission in network layer, researches the architecture of protocol ipsec, presents the design thought of using ipsec to realize the secure transmission within the pbc ' s intranet under the windows. the paper gives a schema of secure transmission system in the pbc ' s intranet, realizes it using the windows kernel program technology and obeying the specifications of ndis and ipsec. the secure transmission system promotes the secure extent of the pbc ' s intranet

    論文針對人民銀行內聯網面臨的信息和數據安全傳輸問題,分析了tcp / ip協議存在的安全問題,探討了在tcp / ip網路層實現安全傳輸的可能性和優越性,認真研究了ipsec協議體系和esp協議、 ah協議、 ike交換協議的原理,在既要保護已有投資,又要提高安全程度的前提下,提出了在windows操作系統下採用ipsec實現人民銀行內聯網安全傳輸的設計思想。
  13. The system structure of certificate authority and the function modules of the system are introduced in the system structure part. therefore the article introduces the detailed methods of establishing certificate authority and the establishment of data certificate. meanwhile, the article discusses the actual functions of digital certificate in office automatic system on web, and the key management security of the digital certificate

    在系統總體中,主要討論了ca認證體系的體系和系統的主要功能模塊;在系統的具體實現中,討論了ca認證中心的建立的技術以及ca認證中心生成數字證書的方法;在系統的實際應用中,合mthsca的特點,討論了數字證書在某摩托化步兵師網上自動化辦公系統中的具體應用;在系統安全性方面,討論了數字證書的安全管理。
  14. The service master key is the root of the sql server encryption hierarchy

    服務主為sql server加層次的根。
  15. This means that you do n ' t have to depend on commercial client authentication services, although you can integrate commercial client authentication into your public key infrastructure if you choose.

    這意味著無需依靠商業的客戶端身份驗證服務,如果願意,還可以將商業的客戶端身份驗證集成到自己的公用密鑰結構中。
  16. Public key infrastructure, certificate services, and smart card support

    公用密鑰結構、證書服務和智能卡支持
  17. Using certificate services and the certificate management tools in windows 2000, you can deploy your own public key infrastructure

    使用windows2000中的證書服務和證書管理工具,可以實施自己的公用密鑰結構
  18. Windows 2000 introduces support for kerberos v5, public key infrastructure ( pki ), and smart card logon support, providing flexible, enterprise - strength security for your entire organization

    Windows2000支持kerberosv5 、公用密鑰結構( pki )和智能卡登錄,從而為整個單位提供了靈活、具有企業級強度的安全措施:
  19. The idea and theory has applied to the building of tianjin ic security system, the solution of the ic application and management is realized in the agriculture bank of tianjin, meanwhile, ic security system which has reasonable structure, security, credibility and perfect function is provided for the evolution of tianjin financial ic, " single card using everywhere in city " of tianjin city and the integration with other application of domain in this paper

    建立了一套完善、適用的ic卡安全管理系統。論文針對天津農行金融ic卡應用的特點,提出了ic卡具體的密鑰結構、發行和管理以及業務應用中的安全實現方案,該方案為天津農行金融ic卡的順利發展,並最終與天津市「城市一卡通」及其它非金融應用行業的有效合提供了合理、安全可靠、功能完善的ic卡安全管理體系。
  20. With a public key infrastructure, you can implement standards - based technologies such as smart card logon capabilities, client authentication ( through secure sockets layer and transport layer security ), secure e - mail, digital signatures, and secure connectivity ( using internet protocol security )

    利用公用密鑰結構,可以執行一些標準的技術,例如智能卡登錄功能、客戶端身份驗證(通過安全套接字層協議和傳輸層安全保護) 、安全電子郵件、數字簽名和安全連接(使用internet協議的安全保護) 。
分享友人