自密鑰密碼 的英文怎麼說

中文拼音 [yào]
自密鑰密碼 英文
autokey cipher
  • : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. These meeting rooms are self - serviced venues. bookings for saturday mornings can be made with cass in advance. users shall collect the door password or door key from cass one day in advance and return the key on the following monday

    這些會議室屬助形式,部門如欲在星期六上午借用,可預先向庶務組申請,並於開會前一天向庶務組索取開門的匙,于下星期一交回匙。
  2. Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it

    接收者利用發送者的公開和他們己的秘的結合,解開該報文的秘,並解之。
  3. The sequences have good pseudorandomness as binary ones. just as q - ary generalized self - shrinking sequences, two parameters are chosen as the section key to strengthen the cryptosystem

    和q元廣義縮序列一樣,在加的時候也可以選擇兩個參數作為使體制更加牢固。
  4. The operating process of network cipher computer and kdmc are discoursed firstly, then the tcp / ip stack of linux is introduced, and an ipsec realization method with using a cipher card is put forward. triplex key system is adopted for internet key exchange ( ike ). the database and other modules are also designed and implemented

    論文論述了網路機和管理中心的工作流程,接著介紹了linux下tcp / ip內核協議棧,提出了加卡方案,採用了三重管理體系實現了internet動交換,進行了中心數據庫設計與實現,最後對其它模塊進行了實現。
  5. In the process of designing and realizing the system, the author, through revising the kernel source code of linux " s system, resolved successfully the transparent embedding of vpn equipment, the support to various kinds of encryption identity algorithm, the driver of encryption equipment based on pci bus, the resource competition of encryption equipment, the automatic communication of the encryption keys, which give security n stabilityn high - efficiency and transparency to the total system

    在系統的設計實現過程中,作者通過修改linux操作系統的核心源代,成功解決了vpn設備透明接入問題、對多種加認證演算法的支持問題、基於pci總線的加設備驅動問題、加設備資源競爭問題、加動協商問題,使得整個系統具有安全、穩定、高效、透明等特性。
  6. Since whitfield diffie and martin e. hellman firstly brought forward public key cryptography in their new direction in gryptography in 1976, public key cryptography has developed rapidly and so has public key infrastructure. in today ' s pki framework, public keys are maintained by ca through issuing digital certificate while private keys are maintained by key escrow agent

    從1976年whitfielddiffie和martine . hellman在《加的新方向》一文中最早提出公開術以來,公開術如今已經得到了廣泛的應用,而與之緊相關的公基礎設施( publickeyinfrastructure , pki )也得到了很大的發展。
  7. When the encrypt with password control is checked, then the key is not generated and set automatically but is rather derived from a password that has been " salted "

    選中「 encrypt with password 」 (用)控制項時,不會動生成和設置,而是從已「 salted 」的中派生一個。
  8. These chargeback issues - where people acknowledge that they had an agreement or some contact with the merchant but claim that the merchant did not performed in some or all aspects as promised like nothing delivered, or the order was cancelled, or some other reason - are part of the credit card issuer s business model and beyond the scope of an xml signature specification

    首先,術中的概念直接來其硬體對等物的比喻- -沒有就無法加鎖或解鎖特定數據。在汽車示例中,攻擊者有50分之一的機會使給定的匙工作,而在術中,通常有上十億個可能的(對于大多數演算法類型,該數字通常是2
  9. Using the interaction between cellular automata, a cryptography system based on the coupled toggle cellular automata is proposed to enlarge the key space and the strength of the system

    摘要利用元胞動機之間的相互作用,提出耦合觸發元胞動機的加技術,增加空間和增強系統的強度。
分享友人