英语人>网络例句>机密性 相关的搜索结果
网络例句

机密性

与 机密性 相关的网络例句 [注:此内容来源于网络,仅供参考]

To satisfy the demands of the data security, confidentiality and so on, several arithmetic schemes for data security are discussed.

针对数据在传输及存储过程中的机密性、完整性、可获取性、真实性和持久性的要求,探讨了安全方案。

DES, together with its ciphering algorithm, and basic theory of stream cipher are associated with, and the misled application of DES is also taken into account.

信息安全技术主要是研究计算机系统信息的机密性、完整性、可获取性和真实性,它的核心是加密技术。信息是一种资源,也是一种财富。

The objectives of security are to provide availability,integrity,and confidentiality protection to data and resources.

安全的目标是对数据和资源提供可用性,一致性和机密性的保护。

Finally, the theorems of data confidentiality and origin of confidential data are utilized to reanalyze NSPK protocol, the reason why the attack exists is explained.

最后,应用数据机密性和机密数据起源性定理,重新分析了NSPK协议,说明了其存在攻击的原因。

"I think it's driven by the individual agencies, which have bureaucratic sensitivities to protect," said Steven Aftergood of the Federation of American Scientists, editor of the online weekly Secrecy News."But it was clearly encouraged by the administration's overall embrace of secrecy."

&我认为是个别部门推动了该计划,它们总有官僚性的敏感去保护一些东西,&美国科学家联盟成员,网络周刊机密新闻的编辑斯蒂芬阿富特先生说道,&不过另一方面该计划因为行政部门对机密性的亲睐而受到鼓励,这是十分明显的。&

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

Users' certificates are signed by CA and then respectively sent to each user to keep.The message and its digital signature are encrypted to transmit in the network without disclosure.The scheme proposed provides mutual authentication between the sender and the recipient,and the confidentiality,integrity and nonrepudiation of the interchanged messages are ensured.

通信的各方产生自己的私钥和公钥对,用户的证书由CA签发后交给用户保存,交换的消息和其签名等信息采用压缩加密传输,避免了消息在传输的过程中被第三者窃取或篡改,保证了数据的机密性、完整性和不可否认性。

Elliptic Curve Signature Algorithmis used to provide unforgeability of user public key.

采用椭圆曲线签名算法保证用户自主生成公钥的不可伪造性,利用用户公钥生成的会话密钥以对称加密算法加密明文,保证明文的机密性,对明文空间的大小没有严格限制。

Proved the proposed scheme to be message confidentiality non-repudiation and unforgeability under the random oracle model.

在随机预言机模型下给出了该方案的安全性证明,证明结果表明该方案满足抗适应性选择密文攻击下的机密性、不可伪造性和不可否认性。

Keep the privacy and confidential of the information which have been consigned to us.

保护委托给我的信息的隐私性和机密性

第1/4页 1 2 3 4 > 尾页
推荐网络例句

Means the parent directory, so this command means to execute "toolchain.sh," which is in the current directory.

代表父目录,所以这个命令就是执行当前目录下的"toolchain.sh"。

Yes,In fact,I'm on our city ream.

是的。事实上我是我们市队的。

The strong ionospheric disturbances caused by the significant magnetic storm appeared on the whole world.

用欧亚大陆地面电离层垂测站资料考察1989年3月12~16日磁暴期间的电离层暴形态及其发展变化。