助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   密码安全 的翻译结果: 查询用时:0.029秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
互联网技术
电信技术
更多类别查询

图标索引 历史查询
 

密码安全
相关语句
  cryptographic security
     Analysis of a new cryptographic security architecture applied in mobile e-business
     应用于移动e-商务中一种新密码安全体系的分析
短句来源
     Yet, the most common attacks on cryptographic security mechanisms are 'system attacks' where the cryptographic keys are directly exposed, rather than cryptoanalytical attacks (e.g., by analyzing ciphertexts).
     然而,在密码安全机制中,最通常的攻击是“系统攻击”,而不是密码分析的攻击。
短句来源
     The project named "Cryptographic Security Service Platform (CSSP)" appears in the background of these problems.
     密码安全服务平台就是在这样的背景下应运而生的。
短句来源
     Some new indexes about cryptographic security are introduced, and their relationships are discussed.
     引入了密码安全的一些新度量指标,讨论了这些指标之间的关系。
短句来源
  cryptography security
     The Generation of Pseudo-random Numbers and Application in Computer Cryptography Security
     伪随机数生成及其在计算机密码安全中的应用
短句来源
     Miller-Rabin algorithm is the main stream probabilistic primality test algorithm, and is very important in constructing cryptography security system.
     Miller-Rabin算法是目前主流的基于概率的素数测试算法,在构建密码安全体系中占有重要的地位。
短句来源
     When lots of primality test algorithms have been compared and Miller-Rabin algorithm has been researched in detail ,it is proved that Miller-Rabin algorithm is the best choice to be used in constructing cryptography security system to perform primality test.
     通过比较各种素数测试算法和对Miller-Rabin算法进行的仔细研究,证明在计算机中构建密码安全体系时,Miller-Rain算法是完成素数测试的最佳选择。
短句来源
  cipher secure
     Cipher Secure Application Middleware Support Local Encryption Algorithm For Windows
     支持国产密码算法的Windows下密码安全应用中间件
短句来源
     The paper gives a solution for developing a cipher secure application middleware for Windows, in which is included in four middlewares: basic cipher service middleware, PKI application middleware, MS- Office secure encrypt middleware and certifica- tion middleware for logging in Windows system
     本文提出一个在Windows操作系统下开发密码安全应用中间件的解决方案,包括四种中间件:“基本密码服务中间件”、“PKI应用中间件”、“MS-Office安全加密中间件”和“Windows系统登录认证中间件”。
短句来源
  “密码安全”译为未确定词的双语例句
     This paperintroduces general data encryption model and the generation of pseudo-random number, which contributes to the security of cryptography system.
     本文介绍了一般的数据加密模型,以及密码安全中伪随机序列的生成,强调了伪随机序列生成密钥性能的好坏直接影响到密码系统的安全。
短句来源
     Design and Analysis of Cryptographic Secure Hash Algorithm
     密码安全杂凑算法的设计与分析
短句来源
     Research on cryptography to fully distributed system
     一种基于完全分布式系统的密码安全体制研究
短句来源
     The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks,and is feasible in practice.
     对该密码安全体制进行安全分析后表明:该体制能有效地抵御网络中的消息重放攻击和中间人攻击,并在实际应用中有较高的可行性。
短句来源
     500 Directory, Light directory access protocol, The principal of Kerberos and resolves key security and certification by means of Kerberos.
     500目录系统、轻量级目录访问协议、Kerberos系统的基本原理和用Kerberos技术来解决密码安全和身份验证,实现了具有LDAP客户与LDAP服务器的安全绑定、X.
短句来源
更多       
查询“密码安全”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  cryptographic security
A partially non-cryptographic security routing protocol in mobile ad hoc networks
      
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach.
      
Sidelnikov in 1994 and combines high cryptographic security, transmission rate close to one, and moderate complexity of both enciphering and deciphering.
      
This paper examines the cryptographic security of fixed versus random elliptic curves over GF(p).
      
We show that the standard cryptographic security definition for digital signatures is not sufficient to ensure that such proofs are still valid if the idealized signatures are implemented with real, provably secure signatures.
      
更多          
  cipher secure
A chosen-cipher secure encryption scheme tightly as secure as factoring.
      


Three security criteria of public key cryptosystem have been proposed:polynormal security, semantic security,A.C.Yao security.All of them are equivalent and used in probabilistic key cryptosystems.In this paper,a new security.statistic security and its equivalent form,is given. The new security can be used in any public key cryptosystem to satisfy the needs of the different custom.

现有的公开钥密码的安全性标准主要有三个;多项式安全、语义安全、A.C.Yao 安全.这些安全性标准实质上都是等价的.而且仅适宜于概率型公开钥密码.本文给出一种新的安全性标准:统计安全性及其等价形式,新标准能用来测定任何公开钥密码的安全强度,以满足不同用户的需要.

This paper introduces current technologies and future directions of cryptographic security in five areas of the Internet infrastructure.

从因特网(Internet)基础结构的五个领域介绍了密码安全的实现技术及未来方向。

Some important indicators for evaluating the security of cryptographic Boolean functions consist of balancedness, nonlinearity, algebraic degree, propagation characteristics and linear structure. Also, the number of these functions should be taken into consideration in designing a cryptosystem based on some Boolean functions. Orthomorphic permutation has the property of certain halving effect which may be useful in cryptography. On the basis of such permutation, we construct a family of Boolean functions with...

Some important indicators for evaluating the security of cryptographic Boolean functions consist of balancedness, nonlinearity, algebraic degree, propagation characteristics and linear structure. Also, the number of these functions should be taken into consideration in designing a cryptosystem based on some Boolean functions. Orthomorphic permutation has the property of certain halving effect which may be useful in cryptography. On the basis of such permutation, we construct a family of Boolean functions with perfect cryptographic characteristics, and present the lower bound on the enumeration of such functions. The results obtained may show a direction for the application of orthomorphic permutation to cryptography.

平衡性、非线性度、代数次数、扩散特性和线性结构是衡量密码安全布尔函数的重要指标,这种密码函数的个数对于密码体制的设计也是应当考虑的.正形置换的对分效应具有一定的密码学意义.该文基于正形置换构造了一类密码性能良好的布尔函数,并给出了这种函数的计数下界.这些结果为正形置换的密码学应用开辟了一个方向.

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关密码安全的内容
在知识搜索中查有关密码安全的内容
在数字搜索中查有关密码安全的内容
在概念知识元中查有关密码安全的内容
在学术趋势中查有关密码安全的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社