英语人>网络例句>key signature 相关的网络例句
key signature相关的网络例句

查询词典 key signature

与 key signature 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

The article mainly research cryptography applying in digital encrypts technique base on PKI and mainly includes three steps: public key encipher, digital signature and key distribution.

本论文主要是对密码学在信息加密技术中的应用进行研究,主要是基于PKI公钥密码体制来对公钥数据加密、数字签名和密钥分配这三个方面进行研究。

The main interest of this dissertation is on the theory and method of digital signature and its application. The research focuses on some key problems of digital signature.

本文比较系统地对数字签名理论、方法和应用进行了研究,重点研究了数字签名中的若干关键技术问题。

The key of the signature is generated from TA,and TA can forge a signature successfully.

由于签名者用于签名的密钥是由TA生成的,TA可以伪造签名者的签名。

Digital signcryption is a new kind of digital signature which integrates public key encryption and signature simultaneously in a logic step.

数字签密是一种带加密功能的数字签名,它是公钥加密算法和数字签名在更高层次上的结合。

The scheme has some features such as undeniable and unforgeable of the digital signature,and the size of key and signature are short.

该方案具有签名不可伪造性和不可否认性、签名和密钥长度短等特点。

Harn and Kiesler proposed a public-key cryptosystem, digital signature and authentic encryption scheme based on Rabin's cryptosystem, in this chapter, we will analyze the security of H-K digital signature scheme and H-K authentic encryption scheme, and point out that these cryptosystem are insecure.

Shao设计了两种数字签名方案,并称这两种数字签名的安全性建立同时在离散对数和素因子分解问题之上。

What's more, the signature scheme can conveniently add or delete the chain grantor and defend the secret key of the chain grantors and signature verifier.

此外,该方案可以方便地增删链式验证授权组中的成员和维护链式验证授权者和签名验证者的私钥。

Keywords: ring signature;secret sharing;threshold ring signature;bilinear parings;key escrow

该方案能保证不诚实的PKG无法伪造环签名,有效避免了密钥托管问题。

A hierarchical IDbased proactive threshold signature scheme is presented. The scheme has the structure of hierarchical PKGs, so a lowerlevel PKG can share the workload of secret information generation and identity authentication with a higherlevel PKG. At the same time the scheme has the property of proactive security, that is, the whole lifetime of signature is divided into several time periods, and the shares of private key need to be renewed in each time period.

方案具有分层的PKG结构,低层PKG可以分担高层PKG的秘密信息产生和身份认证的任务;同时具有动态安全的特性,将签名的整个生命周期分成若干时间段,每个时间段都对密钥份额进行更新,更新后的份额重构的密钥保持不变。

第3/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

Objective To investigate the effects of interleukin-1 β converting enzyme gene on the biologic characteristics of ovarian cancer cells.

目的 探讨白细胞介素-1 β转换酶的表达,对卵巢癌细胞生物学特性的影响。

Campylobacter: This illness is the most commonly identified cause of diarrheal illness in the world.

弯曲:这种病是最常见的原因查明腹泻病,在世界上。

Gangs fill the daily lives of many of our poorest and most vulnerable citizens with a terror that the court does not give sufficient consideration, often relegating them to the status of prisoners in their own homes.

法院没有充分的考虑到黑社会的猖獗所带来的恐怖,这使得我们最穷、最可怜的市民每天生活在他们的阴影当中,成为在家的囚犯。