public key technology 中文意思是什麼

public key technology 解釋
公開鑰技術
  • public : adj (opp private)1 公共的,公眾的,公用的;人民的,社會的,國家的;政府的,公營的,公立的。2 (...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • technology : n. 1. 技術,工程,工藝。2. 製造學,工藝學。3. 術語(匯編)。
  1. Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin. it ' s the foundation of many secure applications

    公鑰密碼技術結合傳統的對稱密碼技術及信息摘要技術,可提供信息的保密性、完整性和信源確認,是多種安全應用的基礎。
  2. With the rapid development of the internet and electronic commerce, it is required that service division should be more and more specialized and fine - sorted. as a result, public - key infrastructure ( pki ), which has both the function for the authentication and the function for the authorization, has become maladjusted in the present information technology society

    隨著internet和全球電子商務的突飛猛進,對服務分工要求越來越細的同時,現有公鑰基礎設施pki框架中同時實現身份認證和授權管理的功能模式,已越來越不適應當代信息社會的發展需求。
  3. Information technology. security techniques. entity authentification mechanisms. part 3 : entity authentification using a public key algorithm

    信息技術.安全技術.實體鑒別機制.第3部分:使用公共鍵演算法進行實體鑒別
  4. In this paper, members serving system, popular web developing technology and pki ( public key infrastructure ) are introduced firstly. then, after analyzing the system in detail the author makes the conclusion that using mvc architecture based on jsp technology to build members serving system is a good method. furthermore, the method of system analysis and design using uml with rational rose tools is introduced

    文中將首先介紹期貨交易所會員服務系統,當今流行的電子商務平臺的開發技術,及pki公開密鑰基礎設施技術,之後從期貨交易所會員服務系統的功能需求出發,經過詳盡的分析確定以jsp技術為基礎的mvc框架結構,並結合使用rationalrose工具描述了如何利用uml語言進行系統分析與設計。
  5. So it is necessa1y to studyil1g deeply of natiol1al appropriative opefation information network security under tl1e studying of security system principle w1ich is universal relation, aj1d tl1e real circumstances of such nets of naoin, this tl1esis advances a secllrity demand al1d tactics to meet the naoin. lt laid special stress on sttlciyi11g basic principle and technology of pkl / ca ( public key infi ' astructlire / certificatiol1 autllority ), and tl1e way wliich cai1 be used i11 naoin. and it dctailed discuss tl1e way that would be coming tttie in u1e tra1sfornlil1g believable cl1viro11mel1t of inner naoin, wllich is using parca tech11ique

    本文通過對普遍適用的安全體系原理及國家專用業務信息網這類特定信息系統的實際情況的研究,提出滿足國家專用業務信息網的安全需求和安全策略;重點研究了pki ca的基本原理和技術,及其在國家專用業務信息網中的實現方法,詳細論述了利用pki ca技術改造本單位專用業務信息網的可信任環境的實現方法;最後對基於ca的pmi (授權管理基礎設施)及其與pki的關系進行了探討。
  6. This article describes the situation of information security theory and technology, and discusses the theories of ca, information encryption, and public key system

    本文介紹了目前信息安全理論和技術發展狀況,對ca認證理論、信息加密以及公共密鑰管理等方面的技術進行了分析和論述。
  7. This article combines the details of information network system of a certain motorization infantry division, discusses the design and realization of mthsca, which is based on public key infrastructure and supplies the safety support technology for the automatic office system

    本文結合某摩托化步兵師信息網路系統的具體情況,討論了一個基於pki體系的摩托化步兵師ca認證系統( mthsca )的設計和實現,為網上自動化辦公系統提供技術安全支持。
  8. It is impossible for the electronic signature technology to resolve the problems of the certainty of the public key and the possibility of the private key holders denying the signed document

    但是如何解決公共密鑰的確定性以及私人密鑰持有者否認簽發文件的可能性問題,則是電子簽名技術本身無法解決的問題。
  9. With the development of internet and electronic commerce, there is a high demand for information security. with the traditional encryption technology, the distribution of key still has n ' t a perfect solution. pki technology based on public key system resolves it through issuing the certificates by ca ( certification authority )

    但是在傳統的信息加密技術中,密鑰的分發一直沒有得到很好的解決,而基於公鑰體制的pki ( publickeyinfrastructure ,即公鑰基礎設施)技術通過簽證機關(即ca : certificationauthority )發布證書的方式較好地解決了這一問題。
  10. The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use

    論文主要論述了pki基礎技術的一般知識和概念;討論了現代密碼學的基本知識和基本原理;對各種加解密演算法的主要特點、速度、加密強度進行了簡要的介紹和比較;論述了公開密鑰體制在pki體系中的應用:數字信封、數字簽名,以及數字證書定義、格式及用途。
  11. In the electronic filing process, the return information will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key

    報稅表資料在傳送到稅務局前,系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密。
  12. In the return filing process, the return data will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key so that data confidentiality can be preserved

    系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密,以達保密效果。
  13. This article combines the details of internet system of zhongnan university of economics and law, discusses the design and realization of znelca, which is based on public key infrastructure and supplies the safety support technology for the automatic office system

    本文結合中南財經政法大學網上辦公系統的具體情況,討論了一個基於pki體系的ca認證系統( znelca )的設計和實現,為自動化辦公系統提供技術安全支持。
  14. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  15. An extension to ntfs, the encrypting file system uses public key technology to encrypt files and folders

    基於對ntfs文件系統的擴展,這種加密文件系統使用公用密鑰技術對文件和文件夾進行加密。
  16. It then describes how you can achieve authentication based on public key technology, using the new gss - api security mechanisms with the customizable db2 udb security plug - ins

    然後還將描述:如何通過使用新的具有可定製的db2 udb安全插件的gss - api安全機制來實現基於公鑰技術的身份驗證。
  17. This paper mainly deals with the rsa public key technology, the principle and technology underlying encryption algorithm, and also the security of rsa public key in its application and the ways to maintain security

    摘要闡述了公開鑰密碼系統rsa演算法的原理及實現技術,並討論了其在應用過程中的安全性及相應防範措施。
  18. While there are many technologies which meet some of these requirements, only one provides the tools for meeting all of them : public key technology, implemented in the form of a public key infrastructure ( pki )

    有許多技術能夠滿足其中一些需求,而利用公開密碼技術構建的公開密鑰基礎設施( pki )提供的工具能夠滿足全部這些需求。
  19. The major difference between kerberos and spkm - 3 lipkey is that the former is a purely symmetric key - based security mechanism, while the latter is a blend of symmetric key - based security mechanisms and public key technology

    Kerberos和spkm - 3 / lipkey的主要區別是:前者只是基於對稱密鑰的安全機制,而後者則是基於對稱密鑰的安全機制與公鑰技術的混合體。
  20. With the support for these forthcoming gss - api mechanisms spkm3 and lipkey, the use of gss - api plug - ins will avail db2 udb administrators to have db2 udb authentication based on either the public key technology or the traditional symmetric - key mechanism without much code change

    有了對這些未來的gss - api機制( spkm3和lipkey )的支持,使用gss - api插件將有利於db2 udb管理員基於公鑰技術或傳統對稱密鑰機制進行db2 udb身份驗證,而不需要做太多的代碼修改。
分享友人