encryption protocol

英 [ɪnˈkrɪpʃ(ə)n ˈprəʊtəkɒl] 美 [ɛnˈkrɪpʃən ˈproʊtəkɑːl]

网络  加密协议; 加密协定

计算机



双语例句

  1. Application of Petri Nets in Modelling and Analyzing of Encryption Protocol
    Petri网在密码协议建模和分析中的应用
  2. In this paper, the hidden trouble in the encryption for OSPF protocol is analyzed and the existing encryption schemes improved.
    文章分析了OSPF协议加密措施存在的安全隐患,并对现有的加密方案进行了改进。
  3. Introduce the SSL protocol based on encryption algorithms and encryption protocol.
    通过密码算法和密码协议,初步介绍SSL协议。
  4. This paper introduces the characteristics of V.17 protocol and the principle of fax encryption technology, proposes the key problems of fax encryption in support of V.17 protocol, and presents the method for resolving the related key technical problems.
    介绍了v.17协议的特点和传真加密技术的实现原理,给出了支持v.17协议的传真加密技术的关键问题,并提出了解决这些关键技术问题的方法。
  5. And the encryption protocol takes a little bit of time.
    和加密协议花了一点时间。
  6. For each client, you specify trusted public certificates, the type of encryption, and the network protocol.
    对于每个客户端,请指定受信任公共证书、加密类型和网络协议。
  7. Using the authenticated encryption protocol as a sub-protocol, a quantum message authentication scheme was addressed.
    利用该认证加密协议作为子协议,构造了一个量子消息认证方案,并证明了其安全性。
  8. Three kinds of security methods are analyzed and compared in this paper including symmetric key cryptography, public key cryptography and the hybrid encryption protocol.
    分析和比较了3种可在协同工作中采用的安全机制,包括基于单钥体制、基于公钥体制,以及基于混合方式的安全机制。
  9. We propose Enhanced Layer Two Tunneling Protocol which extends L2TP protocol and ensures the data confidentiality with the help of Microsoft Point to Point Encryption Protocol.
    故提出增强型第二层隧道协议eL2TP解决方案,该方案扩展了L2TP协议,借助微软点到点加密协议MPPE保证数据的机密性。
  10. A Secure and Efficient Encryption Protocol of RSA with Small Public Key and its Applications
    一种安全有效的小公钥RSA加密协议及其应用
  11. This paper describes those schemes, such as data encryption system, key agreement protocol and digital signature.
    本文描述了基于椭圆曲线的数据加密体制、密钥交换方案和数字签名方案。
  12. At the same time, the thesis brings forword a new quantum encryption protocol and analyses its security. The protocol that combines error correcting code, traditional cipher and quantum mechanics uses shared key and single quantum to transfer private message.
    本文利用纠错编码、传统密码与量子原理相结合提出了一个基于单量子的量子加密协议,并且分析了量子加密协议的安全性。
  13. Based on the analysis of the current security characteristic in Aglet system, an extension framework is proposed to perfect the Aglet using encryption and Transport Layer Security protocol.
    在简单介绍了其现有安全特性的基础上,提出了混合利用签名认证、加密和传输层安全协议等技术来完善Aglet的安全体系。
  14. A classical message authenticated encryption protocol based on quantum one-way functions was proposed.
    给出了一个基于量子单向函数的非交互式经典消息认证加密协议。
  15. A Novel Public Key Encryption Based Authentication Protocol for Mobile Communication Systems
    一种基于公钥加密的移动通信认证协议
  16. A New Hybrid Encryption Protocol for Authentication and Its Analysis
    一种混合密码体制的认证协议及分析
  17. Time-Stamping Protocol is a message encryption protocol based-on Hash function.
    时间戳协议是一种基于Hash函数的报文加密协议。
  18. Date Encryption Technique and SET Protocol
    数据加密技术与SET协议
  19. The research designs a unique encryption protocol, implements the encryption mechanism that integrates the distribution of the security keys and the validation of the user identification, and guarantees the feasibility and safety of this network exam system.
    本研究设计了独特的加密协议,实现了密钥分配和用户身份验证为一体的加密体制,保证了此网络考试系统的可行性和安全性。
  20. Research and Application on Fast Encryption Communication Protocol Using Difference Mode
    基于差分法的高速加密通信协议的研究与实现
  21. Design of Video Encryption Gateway Based on H.323 Protocol
    基于H.323协议的视频加密网关的设计
  22. The modified T30 communication protocol was introduced, which combined symmetric and nonsymmetric encryption algorithm with T30 protocol;
    介绍了通过改造T30通信协议,把对称、非对称密码算法结合到T30协议中;
  23. The results show that 3-D secure protocol reduces complex encryption technology used in SET protocol, so it is weaker in security, thus a scheme is proposed to strengthen it.
    分析结果表明,由于3-DSecure协议精简了SET协议中复杂的加密技术,导致安全性减弱,针对这一点提出了一个安全性加强方案。
  24. Then, based on the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides.
    然后,基于RSA签名算法,设计了一个双方不可否认的小公钥RSA加密协议。
  25. Research of Encryption Methods in SET Protocol
    SET协议中加密方法的研究
  26. At the same time, independent research and development of the encryption algorithm used in SET protocol process, the formation of the nested type cryptographic algorithm.
    同时将自主研发的加密算法应用于SET协议的流程中,形成嵌套式加密算法。
  27. There are many security mechanisms such as authentication, message digest and encryption in the protocol to ensure the security of data transfer.
    本文提出的子系统间数据传输协议是一个私有协议,该协议实现了一系列安全机制如身份验证,报文摘要,加密等来保证数据传输的安全。
  28. Based on this key management scheme, the dissertation designs an encryption authentication-based security routing protocol CBSRP.
    在此密钥管理方案基础上,设计了基于加密认证的安全路由协议(CBSRP)。
  29. SCPS-SP protocol standard, authentication protocol draft, encryption protocol draft and secret key management draft were analyzed by using formalization analysis method, and security features and its potential loopholes were pointed out. 4.
    应用形式化分析方法分析了CCSDS发布的SCPS-SP协议标准、认证协议草案、加密协议草案和密钥管理方案草案和安全性,指出其安全特性和存在隐患。