authentication algorithm 中文意思是什麼

authentication algorithm 解釋
文電鑒別演算法
  • authentication : n. 確定,鑒定,證明;認證。n. -ticator 確定者,認證者。
  • algorithm : n. 【數學】演算法;規則系統;演段。
  1. A practical efficient one - time password authentication protocol is presented which based on the symmetric algorithm, which conquers common challenge - response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack

    該方案克服了通常的質詢響應認證方案的弱點,可以用在網路環境下,實現通信雙方的相互認證,防止重放攻擊和冒充攻擊,實現簡單,執行效率高。
  2. 2. designing a authentication algorithm based on self - embedded watermarking, for needs of electrionic authentication

    針對應用於電子證據等場合的實際需要,設計了基於自嵌入水印的認證演算法。
  3. With the reference of digital signature theroy, presenting a practical authentication algorithm based on fragile watermarking. the algorithm has applied patent right

    借鑒數字簽名的思想,提出一種基於脆弱水印的實用認證演算法。該演算法已經提出專利申請。
  4. 3. analyzing the character of the authentication algorithm in the compression field and designing a secure authentication algorithm in the jpeg compression field

    針對網際網路上圖像傳播的需要,分析了壓縮域中認證演算法所應有的特徵,並設計了在jpeg壓縮域中的安全認證演算法。
  5. Presenting a new concept of authentication chain. 2. introducing a asymmetry key into authentication algorithm, especailly in the loss compression field algorithm, to enhance more security

    提出將用非對稱密鑰演算法應用於認證演算法特別是有損壓縮域的認證演算法之中,因此極大提高了所設計演算法的安全性。
  6. A elliptic curve digital signature and authentication algorithm of independent knowledge property right is designed and implemented on computer in this theme. data integrality and user authenticity is ensured

    本課題中設計了一種擁有自主知識產權的橢圓曲線數字簽名和驗證演算法,並在微機上進行了實現,確保了數據的完整性和用戶身份真實性。
  7. The paper abstracts out the palmprint mainline characteristic owing to palmprint image gradation by the gray value characteristic property method, defining the online palmprint characteristic space with the form of the polar coordinate and compressing the dimension, at last we use the neural network to accomplish the design of identification authentication system with the on - line palmprint as the mating algorithm. based on this, a fast and reliable system of identification authentication can be built

    採用基於掌紋圖像灰度特性的方法提取出掌紋的主線特徵,以極坐標的形式定義在線掌紋的特徵空間並降維處理,最後用神經網路作為匹配演算法完成在線掌紋身份驗證系統的設計,以此為基礎建立了快速、可靠的新型身份認證系統。
  8. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn密碼系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份認證,使用國內專用密碼演算法來進行數據的加解密。
  9. This paper applies ldap to email user authentication and management, which improve the efficiency and security of the email system. with linux virtual server, this paper implements load balance based on layer - 4 switch, and puts forward a new request dispatching algorithm and its implementation

    應用linux虛擬服務器實現了基於第四層交換的郵件系統的負載均衡,在此基礎上,提出並實現了最大穩定剩餘連接優先的請求分配演算法,並且進行了性能分析。
  10. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  11. Then it discusses hmac algorithm and generation of message authentication keys

    研究消息鑒別碼的hmac演算法和消息鑒別碼密鑰的產生。
  12. The algorithm for certificates path construction that it is suitable for pki with bridge certification authority and cross authentication is proposed based on the theory of breadth first search algorithms for graphs

    基幹圖的寬度優先搜索理論,提出了適用於具有橋接ca和交叉認證的pki系統中的證書路徑構造演算法。
  13. In order to implement copyright protection and content authentication of the vq compressed data, the research work of this thesis focuses on the vq based watermarking algorithm

    為了實現對矢量量化編碼多媒體數據的版權保護和內容認證,本文研究基於矢量量化的數字水印演算法。
  14. To ensure data security of wlan, the design adopts rijndael algorithm ' s implementation in ocb mode to provide authenticated encryption, presents a double dynamic key management mechanism, and adopt mutual authentication based on public key system

    為了確保安全性,在方案設計中,使用了rijndael演算法的ocb執行模式來實現認證加密、提出了雙層動態密鑰管理機制、採用了基於公鑰體系的雙向身份認證機制。
  15. First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘密密鑰密碼體制、公開密鑰密碼體制、 hash函數以及基於x . 509的公鑰證書等基礎密碼學理論;其次,論文描述了幾種典型的證書體系和鑒別機制;最後給出了一個電子政務證書管理系統的具體實現例子。
  16. At last, the implementation of a wlan authentication system based on the 802. 1x, in which eap - tls certification protocol and the ellipse key algorithm are used, is given. the authentication system includes applicant system in client, authentication system and servers using radius. in the implementation, the ecc signature algorithm is used to create certification, and the ecmqv is used in key negotiation stage

    最後文章結合eap - tls認證協議以及橢圓曲線密鑰演算法實現了802 . 1x無線局域網認證系統,包括了客戶端申請者系統、認證者系統以及radius認證服務器系統,在實現過程中採用ecc簽名演算法來生成證書,密鑰協商階段採用ecmqv密鑰協商協議。
  17. The functions of the smc, such as authentication, accessing the database, commucation between the sever and the client, the encrypting information transmission between clients, have almost all been realized, and the algorithm has passed the compiling and linking and proved to be practical in function

    安全管理中心的各項功能,如認證,訪問,保密通信等均得到了實現。加密演算法程序以動態連接庫的形式實現,通過編譯和連接,能夠完成文件的加密和解密。
  18. At last, these functions are used to advance sha - 1, and a new hash function called csha is proposed. unit 4 : at present, cryptography hash algorithm for applications such as digital fingerprinting of messages, message authentication, and key derivation is commonly iterative processed which hash inputs of arbitrary length by processing successive fixed - size blocks of the input. the iterative process is commonly serial construction

    在系統分析了雜湊函數機制后,我們利用j . seberry等人提出的方法,構造出了同時滿足平衡性、高度非線性及嚴格雪崩特性的並且容易實現的雜湊輪函數,並利用這些雜湊輪函數,在原sha - 1雜湊函數的基礎上,設計出了新的雜湊演算法csha 。
  19. Second, emphases were put on set authentication research, an architecture of set authentication was proposed to expound the intelligent architecture design theory fitting with layered model. then, with displaying the protocol model, the process control principle was analysed, and more attention was taken to discuss the mathematic model of rsa algorithm and integration of various model methods, to give the component model based on main - program / sub - process architecture family and formalized description. next, by establishing the usercase model, activity model, object structure model and sequence model in order, and based on the data model, a lot of measure were taken to optimize these models. finally, the main framework of set authentication in acme template was given, with the java implement and aop implement for typical applications together

    然後重點對set認證的領域模型進行了研究與分析,提出set認證的領域框架,闡述了與層次模型相適應的智能軟體構架設計思想;進而提出set認證的協議模型,分析其過程式控制制原理,並且進一步探討了rsa安全演算法的數學模型和多種建模機制的綜合應用,給出基於主程序/子過程體系結構風格和形式描述的構件模型。在依次建立set認證的用例模型、活動模型、對象結構模型、順序模型的基礎之上,分析得到了系統的數據模型,然後使用多種手段對模型進行優化。最後給出了set認證系統主要框架的acme描述,以及set認證系統中的典型應用的java實現和面向方面實現。
  20. Then analyses the security and speed performance of md5, which is a representative one - way hash algorithm. points out its limitation and puts forward improved schemes. finally, analyses, designs and realizes the authentication mechanism of electronic commerce with improved md5

    之後介紹了在認證中要使用的單向哈希演算法,描述了其作用及設計準則,並重點討論了代表性的演算法md5 ,分析了其安全和速度性能,並針對其缺陷提出了自己的改進意見。
分享友人