cryptographic technology 中文意思是什麼

cryptographic technology 解釋
密碼技術
  • cryptographic : 關于暗號的, 用密碼寫的
  • technology : n. 1. 技術,工程,工藝。2. 製造學,工藝學。3. 術語(匯編)。
  1. Information technology - security techniques - entity authentication mechanisms - mechanisms using a cryptographic check function

    信息技術.安全技術.實體鑒定機構.加密檢驗功能機構
  2. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  3. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  4. On the base of researching in several application security systems, this paper did much work on researching in symmetrical cryptographic system, public key cryptographic system, digital signature system and the digital certificate application technology in the contemporary cryptography, and issued a suitable security application framework taking account of the characteristics of the rfmdms, several key technologies in constructing were discussed also

    本文在對國內外各種安全應用系統調查研究的基礎上,圍繞現代密碼學中對稱式密碼系統、公開密鑰密碼系統、數字簽名系統、數字證書應用技術等進行了深入研究,並結合rfmdms體系結構方面的特點,提出了適合rfmdms的安全應用系統框架,而且對系統實現中的關鍵技術進行了研究。
  5. Information technology - security techniques - data integrity mechanism using a cryptographic check function employing a block cipher algorithm

    信息技術.保密技術.採用數據塊密碼運演算法的加密檢驗功能的數據集成機構
  6. Information technology - security techniques - entity authentication - part 4 : mechanisms using a cryptographic check function

    信息技術安全技術實體鑒別第4部分:採用密碼校驗函數的機制
  7. Information technology - security techniques - cryptographic techniques based on elliptic curves - general

    信息技術.安全技術.基於橢圓曲線的密碼技術.總則
  8. Information technology - security techniques - cryptographic techniques based on elliptic curves - digital signatures

    信息技術.安全技術.基於橢圓曲線的密碼技術.數字簽名
  9. Information technology - security techniques - cryptographic techniques based on elliptic curves - part 1 : general

    信息技術.保密技術.基於橢圓曲線的密碼技術.第1部分:總則
  10. Information technology - security techniques - cryptographic techniques based on elliptic curves - key establishment

    信息技術.安全技術.基於橢圓曲線的密碼技術.密鑰匙的確定
  11. Information technology - security techniques - cryptographic techniques based on elliptic curves - part 2 : digital signatures

    信息技術.保密技術.基於橢圓曲線的密碼技術.第2部分:數字簽名
  12. Information technology - security techniques - cryptographic techniques based on elliptic curves - part 3 : key establishment

    信息技術.保密技術.基於橢圓曲線的密碼技術.第3部分:密鑰的建立
  13. The launch marked the university s full support to the community and to the cryptographic technology developed locally

    這標志著香港大學全力支持本地開發加密技術。
  14. However, the application of cryptographic technology adds a heavy computational burden to today s server platforms

    然而密碼技術應用程序給當今的服務器平臺添加了沉重的運算負擔。
  15. We test it by many examples. we hope that our work will benefit the development and application of elliptic curve cryptographic technology

    我們希望我們所做的工作能對橢圓曲線密碼技術的發展和應用起到積極的作用。
  16. Through studying the basis knowledge of the cryptographic, analysing the platform structure, the platform based on digital watermarking technology and fair exchange protocol is presented in this paper

    本系統根據數字作品網上交易中出現的問題做了分析,得出主要需解決的兩方面:版權問題和公平交易問題。
  17. This system ' s architecture is based on the advanced pki techniques and encryptions techniques, configured with indispensable hardware for security technology to form a substantial application security platform. this integrated application security platform provides the muti - platform applications systematical uniform security services, mainly including user ' s identification, confidentiality and integrity for data transmission, access control, user ' s digital sign and verification, cryptographic key management etc, to fulfill the trans - computer - type and trans - operation system control & management system, which is independent of different business applications or business procedures

    本設計方案以信息系統安全理論與系統工程學原理為基礎,在網路環境下構建了應用安全平臺,實現了一個跨硬體機型與操作系統臺的、與具體應用部署方式無關的統一的安全策略配置,實現了包括身份認證、訪問控制、數據機密性和完整性控制、應用密鑰管理服務、抗抵賴、安全審計、數據安全等安全服務。
  18. To test the randomness, we introduced the " a statistical test suite for random and pseudorandom number generators for cryptographic applications ", which was published by the nist ( national institute of standard and technology ) and as the criterion to test the candidates of aes

    在檢驗序列的隨機性方面,本文詳細討論了由nist提出的作為測試aes加密演算法的16中隨機性測試方法。對于其中的遊程測試,離散傅立葉變換測試和lempel - ziv壓縮測試,討論了其不恰當的地方。
分享友人