認證密碼 的英文怎麼說

中文拼音 [rènzhèng]
認證密碼 英文
verification key
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全機構,第五章介紹了信息加技術以及各國立法對技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論了數據電訊制度產生的必然性;第八章通過對各國立法對電子據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和、完整性控制、技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. In the end, quick implementation of kasumi, f8 and f9 are simulated under the condition of windows 98 with celeron 633 and 128m memory, the simulation data show that the f8 algorithm is capable of achieving the encryption rate up to 1. 9mbit / s, while f9 algorithm only takes 20ms to compute the mac with the length of 5114 bits, both of which can reach the basica requirement of 3g

    在本文的最後我們對kasumi , f8演算法和f9演算法的快速實現進行了具體的模擬, f8演算法的具體實現是在windows98 ,賽揚633mhz和128m內存的環境下其加速率可以達到1 . 9mbps ,而f9演算法在同樣的條件下計算5114比特的字元串的消息所需時間僅為20毫秒,這些速率基本上可以滿足3g中高速率傳輸的要求。
  4. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份,使用國內專用演算法來進行數據的加解
  5. The primary research contents are summarized as follows : 1. vpn cryptographical system is concerned with cryptographical technology, authentication technology and vpn implementation protocols. symmetrical cryptographical algorithms, non - symmetrical cryptographical algorithms and domestic cryptographical algorithms are discussed

    研究的主要內容包括以下幾個方面: 1 、 vpn系統的構建涉及幾個方面的技術,包括加技術、技術、實現協議等。
  6. In a word, by integrating the user " s fingerprint identification with the cryptological authentication protocol, a secure, reliable and effective approach to identifying the users in the network environment can be provided

    把以指紋特徵為代表的生物識別技術與基於體制的身份協議有機結合,向最終用戶提供一種更加安全、可靠、便捷的身份手段,將是成功地實現網路安全和信息系統安全的有效途徑。
  7. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰體制rsa和ecc演算法及加解實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份方案。
  8. The only way around this is to require a keyed message authentication code such as sha - 1 hmac, which the 802. 11 standard does not

    它的唯一變通方法是需要一個加的消息(如sha - 1 / hmac ) ,而802 . 11標準不需要它。
  9. Adds a custom attachment. this can be used to attach " virtual files " like a generated text string or certificate etc

    添加一個自定義附件,這將可以發送一個虛文件用來作為等。
  10. Parsing certificate is anthetication to a user and process of getting information. research and developing pki certificate discriminator make us iucubrate pki and standard algorithm in cryptography so it is significance both in theory and practice

    解析數字書就是對用戶身份的和用戶公鑰的提取過程,研究和開發pki數字書鑒別器,促使對pki體系和學標準演算法的深入研究,具有理論和實踐上的雙重意義。
  11. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線在加鑰交換、數字簽名等方面的協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了橢圓曲線在電子拍賣系統、系統方面的實現方案。
  12. The pki environemt including development interface such as pem and der encoding and decoding, symmetry cryptography, rsa algrothm, random numeric generate, certificate request pkcs # 10 encoding and decoding, x. 509 certificate encoding and decoding, digital abstract, digital signature and verifying signature, digital envelope and advance services such as certificate authority and register authority

    為滿足設計需要的pki底層支持和上層服務平臺,本文設計和實現了pki環境,包括底層開發介面: pem與der編解、對稱加、隨機數產生、 rsa演算法、書請求pkcs # 10封裝與解、 x 509書和黑名單編解、數字摘要、數字簽名與驗、數字信封等和上層服務:中心和注冊中心。
  13. The module of customer certification adds one - off password certification to the traditional sheet certification, and replaces stored password with stored digest of user password to guard against attacks and keep secrets

    用戶模塊在傳統基於表單的方式上增加一次性口令,並且在存儲時以存儲用戶消息摘要替代本身,從而達到防攻擊和保的目的。
  14. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文為,色度dc系數是魯棒性非常好的參數,因而選擇色度dc系數作為水印信息載體,同時,採用可變的步長選擇部分系數,保了水印的隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,根據用戶輸入的id號和,利用本文構造的混沌系統產生的混沌序列對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽隨機序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。
  15. I hereby confirm that i have received the private key relating to the certificate details above

    本人確已接收?有關以上詳?電子書之私人匙。
  16. In this new protocol, the authentication code of the its initiator depend on the shared long term key, but the authentication code of the its responder relies on session key, and the session key is a hashed value of concatenation of the long - term shared key, the scalar multiplication of the long - term private key and ephemeral public key, and the scalar multiplication of the private key and long - term public key, which ensure that the protocol resists key - compromise impersonation

    在新協議中,協議起始方的依賴于長期共享鑰,但協議的應答方的依賴于會話鑰,且會話鑰是由長期共享鑰、長期私鑰與臨時公鑰的積和臨時私鑰與長期公鑰的積三部分串起來的哈希值,這就保它具有鑰泄漏的安全性。
  17. The e - tax password formerly known as " multi - purpose password " is a password to authenticate an individual s identity in using the inland revenue department s electronic services

    稅務易通行前稱多用途通行是當個別人士使用稅務局的電子服務時,用作他她身分的個人
  18. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  19. Confirm password verify password

  20. Consider other methods of verifying password transactions, such as sending a confirmation code and a return url that requires users to use the url to complete the transaction

    考慮使用驗事務的其他方法,如發送確和返回url ,要求用戶使用該url完成這一事務。
分享友人