通信密鑰 的英文怎麼說

中文拼音 [tōngxìnyào]
通信密鑰 英文
communication key
  • : 通量詞(用於動作)
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • 通信 : communication; communicate by letter; correspond
  1. The cryptanalysis of a quantum key distribution and authentication protocol through once quantum communication

    一次量子量子分發和認證協議的安全性分析
  2. Given the sensitive nature of the information in the keystore, even placing it on a shared network accessible file system is inadvisable

    考慮到存儲庫中息的敏感性,即使將它放在可過網路訪問的共享文件系統中,也是不妥當的。
  3. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片和個性息,自動產生基,分別運用公開系統進行交換,使話各方各自產生完全相同的主,巧妙地解決了分配和加同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加的一次一會話
  4. The crux of secret communication is the secrecy of secret key. it has been pointed out that declassification can be realized by reconstructing phase space

    實現保的關鍵是的保性,己有文獻指出,可以利用相空間重構理論實現保的解
  5. The platform puts emphasis on the implementation of m - gdh. 2 protocol, and realizes such functions as follows : peer to peer network connection, dynamically displaying network topology, key generation, secure communication, help - online and so on

    該平臺以m - gdh . 2協議為開發重點,實現了網路對等連接、動態顯示網路拓撲結構、生成、安全以及聯機幫助等功能。
  6. Lkh and iolous schemes were proposed to account for the issue of group communication key management, and these two shemes become the basic ideal for more and more shemes to improve

    Lkh和iolus方案對組管理提出了解決的方案,成為許多管理方案改進的基礎。
  7. Information is bound to a key pair through key binding

    綁定將息與一個對綁定。
  8. Object from the key information from an xml string

    過xml字元串中的息初始化
  9. Communication between the client and the web server is encrypted using a combination of the encryption keys sent by the client and keys provided by the web server

    客戶端和web服務器之間的過組合使用客戶端發送的加和web服務器提供的來加的。
  10. The secret key transmission method adopting ternary optical fiber communication was proposed

    6 、提出了利用三值光纖實現安全傳送的方法。
  11. The information gained by the eavesdropper through interception is a very important criterion for judging the success of the key transmission and a necessary parameter for the privacy amplification

    竊聽者過竊聽所獲取的息量是決定傳輸是否成功的重要指標,同時也是保增強這一技術環節的必要參數。
  12. Quantum cryptology is a new method for secret communications. this new method utilizes the quantum nature of single photons. data can be transferred with a proven security via the protocols of quantum key distribution

    量子碼術是一種實現秘的新方法,它利用單光子的量子性質,藉助量子分配協議可實現數據傳輸的可證性安全。
  13. In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router

    在對安全的研究中,本文分析了diffie - hellman交換協議中易受攻擊的地方,提出了基於端對端協議及cookie機制的交換新方法,並在路由器上實現了交換和ip報文的安全
  14. With the development of internet and electronic commerce, there is a high demand for information security. with the traditional encryption technology, the distribution of key still has n ' t a perfect solution. pki technology based on public key system resolves it through issuing the certificates by ca ( certification authority )

    但是在傳統的息加技術中,的分發一直沒有得到很好的解決,而基於公體制的pki ( publickeyinfrastructure ,即公基礎設施)技術過簽證機關(即ca : certificationauthority )發布證書的方式較好地解決了這一問題。
  15. Object by providing the xkms key data and authorization information

    過提供xkms數據和授權息,創建
  16. The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient

    數字包裝器最被認可的形式是數字封,這些代碼主要完成電子郵件的加,把想打開封而沒有正確數字的入侵者擋在外面,數字封主要由碼加或軟體演算法加的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。
  17. The models of unconditional security from quantum channels and noisy channels are two typical methods now. two parties begin the secret - key agreement over a public channel

    目前最典型的方法是利用有擾道或量子道建立無條件安全模型,雙方在公共道上進行協商。
  18. It is unconditionally secure ( i. e. secure against a spy who has sufficient time and computer power ), and needless of any private key exchange before the actual communication

    量子碼具有無條件安全的特性(即不會遭受擁有足夠時間和計算機能力的竊聽者攻擊的危險) ,而在實際發生之前,不需要交換私
  19. Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad

    現在常的做法是雙方使用有擾道或量子道建立無條件安全模型,然後在公開認證道上交互息進行協商,雙方把協商之後的安全的作為雙方共享的使用一次一體制進行保
  20. The presented scheme could efficiently update the traffic encryption key ( tek ) in the environment of lack of trusted centre and mobility of nodes

    方案在缺少可中心和網路拓撲結構動態變化的環境中能有效地更新組通信密鑰
分享友人