privacy key

英 [ˈprɪvəsi kiː] 美 [ˈpraɪvəsi kiː]

网络  专用键; 秘密密钥

计算机



双语例句

  1. Of course, there's a glaring flaw here: We're not using a WEP ( Wired Equivalent Privacy) key.
    当然,这里有一个明显的缺陷:我们没有使用WEP(有线对等保密,WiredEquivalentPrivacy)密钥。
  2. To preserve the privacy and integrity of the data that traverses the network, you must have network segregation, which is a key security feature.
    要保留在网络中传输的数据的隐私和完整性,必须具有网络隔离功能,这是一项重要的安全特性。
  3. How to establish the rule between the disclosure of bank information and the protection of Financial Privacy Right becomes a key problem.
    如何协调两者之间的关系,确立两者协调的规则成为了不得不解决的难题。
  4. Application of Privacy Amplification to Unconditional Secure Secret-Key Agreement
    保密增强在无条件安全密钥协商中的应用
  5. Employs personal certificate and three-lever privacy key management to implement the certificate signature with java technique.
    采用个人证书管理和三级密钥管理机制用Java实现了数字证书的产生及签名。
  6. Focus on this paper describes in detail the information privacy, authentication, acces control and the authentication key protocol in personal communication systems.
    文章的重点是描述个人通信系统中的信息保密、鉴别、访问控制和鉴别密钥协议。
  7. Security Issues and Improvement of Privacy Key Management Protocol of IEEE 802.16
    IEEE802.16密钥管理协议的安全问题分析与改进方案
  8. Bilinear Pairings and elliptic curve become hot points in the researches of cryptography, and meanwhile blind signature and threshold signature scheme plays important roles in protecting the senders 'privacy and secret key sharing.
    双线性对和椭圆曲线在密码学研究中成为热点,同时盲签名和门限签名方案在实际应用中起着保护消息发送方隐私权和密钥分享的重要作用。
  9. In earlier version, authentication and key management protocol is called Privacy Key Management ( PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.
    早期规范中的认证与密钥管理协议为保密密钥,管理(PKM),数据保密机制包含基于DES-CBC和AES-CCM的两个解决方案。
  10. After analyzing the threatens for privacy are brought by certificate-based authentication and access control, the paper shows some important technologies such as the key-oriented authorization certificate, the certificate reduction, temporary and task-specifi key so as to reduce threatens for privacy in using digital certificate.
    论文深入分析了基于证书的认证和访问控制所带来的对隐私的威胁,应用面向密钥的授权证书、证书约简、临时和任务特定密钥等技术以减少使用数字证书带来对隐私的威胁。
  11. Wireless Metropolitan Area Network ( WMAN) is faced with some security risks. Privacy sub-layer is defined in IEEE 802.16 to achieve identity authentication, key management and data protection.
    无线城域网(WMAN)面临着各种安全威胁,其规范IEEE802.16中定义了保密子层实现认证、密钥协商与数据保密。
  12. The Key Management of IC Card Based on the Privacy Key
    基于私钥体制IC卡的密钥管理
  13. It is demonstrated that this approach, which improves data privacy, data integrality, access control and key management, has better performance based on better security.
    该方法在数据保密性、数据完整性、访问控制以及密钥管理等方面做了改进,并被证明在保证更好的安全性的基础上提高了性能。
  14. Building trust online is proposed as solution to consumers 'privacy concerns. Drawin from relationship marketing and social exchange theory this study examined several key mechanisms that ca help increase customers' trust of e-commerce an decrease privacy concerns.
    在线诚信建设作为解决消费者隐私的方法已被提出从关系营销和社会交换理论出发,对几个能够提高消费者对电子商务诚信,解决隐私问题的关键机制进行研究。
  15. To protect individual privacy and prevent from the consumer committing, ZHANG et al ( 2003) proposed one-off blind public key based on ID.
    为保护用户的隐私又可以避免用户犯罪,ZHANG等提出了基于ID的一次性盲公钥协议。
  16. The safety and maintenance of land and resources, the relationship between the share and the secrecy of information, the open and the protection of privacy, interlinkage and the part isolation are key factors of the development of the E-government.
    政务系统中的安全与维护,信息共享与保密性的关系、开放性与保护隐私的关系、互连性与局部隔离的关系,是电子政务发展的关键因素。
  17. As a powerful public key based encryption tool, PGP ( Pretty Good Privacy) has been used widely, but wrongful trust assumptions often undermine its security.
    PGP(PrettyGoodPrivacy)作为强有力的公钥加密工具,已经得到广泛的应用,但不正确的信任假设常常会破坏PGP的安全性。
  18. This paper describes the security protocol of 802.16. Based on the privacy sub-layer, it analyzes the procedure of authentication request from the subscriber station to the base station. Also it describes the procedure of key exchange and way of data encryption.
    分析了它的安全机制,从协议栈的安全加密子层着手,分析了用户站向基地站认证过程,认证之后的会话密钥交换过程以及获取会话密钥之后的数据加密方式。
  19. It also analyzes problems about data security in no stop electronic toll collection system, selects RSA encryption algorithm to encrypt privacy key of AES in system and implements in computer language.
    剖析了不停车收费系统中存在的数据安全问题,选择RSA加密算法对系统中使用的AES密钥进行加密并通过语言实现。
  20. Data privacy is a key problem.
    其中,数据隐私保护是首要问题。
  21. In order to realize mutual authentication, usability and privacy, there are one public key in the π OTP protocol that maintained both in the tag and the back end database that is updated by universal hash function after each successful authentication.
    为了实现双向认证性、正确性和隐私性,πOTP协议设有一个公有密钥,由安全的通用哈希函数产生,同时保持在标签和后端数据库中,每次成功认证后进行更新。
  22. Temporality is important for privacy data and the key factor in some access control policies.
    时态性是隐私数据的重要特性,也是隐私数据的访问控制策略中关键性的因素。
  23. A symmetric cryptography algorithm is used to ensure the data privacy, and the key only can be calculated by sender and receiver.
    加密使用对称密码算法,密钥可以利用通信双方的信息计算。
  24. It guarantees privacy, integrity and authenticity of information exchanged between a Web server and a Web browser based on a multiple of public key cryptographical techniques and symmetrical encryption techniques.
    SSL协议以多种公钥密码技术和对称加密技术为基础,实现Web服务器和Web浏览器之间的信息交换的秘密性、完整性和认证性的通信目标。
  25. Some progress has been made on research of cloud storage service system, however, how to protect security and privacy of data in the cloud is still a key point and an urgent problem of future research.
    尽管云存储服务系统目前已经取得了一定的研究成果,但对于如何保障云中数据的安全和隐私这一问题,仍是今后研究的重点,也是亟待解决的难题。