助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   private keys 的翻译结果: 查询用时:0.18秒
图标索引 在分类学科中查询
所有学科
电信技术
互联网技术
更多类别查询

图标索引 历史查询
 

private keys
相关语句
  私钥
     A Design for Certificates and Private Keys Roam System and its Analysis of Security
     证书及私钥漫游系统的设计与安全性分析
短句来源
     Research on Distributed Generation Algorithm of Virtual CA Private Keys for MANET
     基于MANET虚拟CA私钥生成分布算法研究
短句来源
     A DESIGN FOR CERTIFICATES AND PRIVATE KEYS ROAM SYSTEM
     证书和私钥漫游系统的设计方案
短句来源
     And the number of private keys which users have to keep reduced from O(logN) to O(1) because of the key hierarchical generation in HIBE algorithm.
     同时该算法利用HIBE中的层次密钥算法,使得用户所需的私钥存储空间从O(logN)减少到O(1).
短句来源
     In today's PKI framework, public keys are maintained by CA through issuing digital certificate while private keys are maintained by Key Escrow Agent.
     在现有的PKI体系中,由PKI下的证书权威(Certificate Authority,CA)提供证书来维护公钥,由密钥托管代理(Key Escrow Agent,KEA)来维护私钥
短句来源
更多       
  “private keys”译为未确定词的双语例句
     thirdly, embed watermarking, the R,G,B bands of differentresolution multi-spectral image was decomposed by orthogonal waveletpacket,then embedded different intensity of watermarking in sub-bandswavelet packet coefficients separately, and during the course of embeddingwatermarking two private keys were generated;
     第三,水印嵌入:对不同分辨率的多光谱遥感影像采用正交小波包对 R、G、B 三个波段进行分解,然后根据不同的图像在 R、G、B 三个波段的敏感程度,在不同的小分解系数中嵌入不同强度的水印,在水印嵌入过程中产生两个个私有密钥,以备后面检测时使用;
短句来源
     On encryption layer,exchange of private keys based on prime field GF(p)(p=2192-264-1), ELGamal encryption and elliptic curve digital signature are performed.
     在密码层上实现了基于大素数域GF(p)(p=2~(192)-2~(64)-1)的密钥交换、ELGamal加密和椭圆曲线数字签名。
短句来源
     The validity of domain parameters、 public and private keys of elliptic curve should be verified so as to avoid weaknesses, and this paper applies CA authentication、 password encryption techniques PBE and elliptic curve key agreement ECMQV to ensure the correlative security.
     其次椭圆曲线域参数和公私钥要进行有效性验证以确保不产生漏洞,论文应用CA认证技术、口令加密技术PBE和椭圆曲线密钥交换协议ECMQV(Elliptic Curve Menezes-Qu-Vanstone)来确保相关的安全。
短句来源
     This novel DCT-based approach has three keys, the doubly stochastic matrix along with its coefficients are used to embed watermarking and play the role of private keys, while summation of transformation matrix of watermarking serves as public key.
     在水印的嵌入与检测过程中用到了 3个密钥 ,双随机矩阵和嵌入尺度作为秘密钥保证了水印嵌入的安全性 ,DCT系数矩阵之和则作为公开钥用于水印信息的部分认证 文中算法实现了将图像作为水印信息隐藏到载体图像中 ;
短句来源
     Thirdly, the paper studies USBKEY, and on the basis the paper implements the equipment management, the public and private keys management, user management, algorithm management, and encrypted data etc.
     同时研究USBKEY,在此基础上实现了USBKEY设备管理、公私钥管理、用户管理、算法管理、数据加密等功能。
短句来源
更多       
  相似匹配句对
     A DESIGN FOR CERTIFICATES AND PRIVATE KEYS ROAM SYSTEM
     证书和私钥漫游系统的设计方案
短句来源
     Private Space
     私人空间
短句来源
     The Keys to the Problem
     问题解答
短句来源
     Public-Key Cryptosystem Design Based on Two Private Keys
     基于双秘钥的高强度公钥密码体制的研究
短句来源
     On the Private Remedy
     略论私力救济
短句来源
查询“private keys”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  private keys
In addition, the system ensures more security because the embedded watermarks are protected with private keys.
      
The distinct feature of our scheme is that when traitors are found, we can revoke their private keys (up to some threshold z) without updating the private keys of other receivers.
      
We consider systems where the keys for encrypting messages are derived from the pairwise intersections of sets of private keys issued to the users.
      
In this paper a generalized (basis-independent) decryption algorithm is given, which shows that there are many equivalent private keys, and a method of efficiently obtaining such an equivalent private key is given.
      
Hence in an elliptic cryptosystem, it is safe for many users to share the same curve, with different private keys.
      
更多          


A Semi -ring is introduced to describe input memory finite automata and their compositions; an algebraic treatment is given to the weak invertibility theory of nonlinear finite automata,relative basic decomposition and the concept of nonlinear kernel are introduced. As applications, a method called"nonlinear kernel attack "is proposed to analysis of the public key cryptosystem FAPKC3([l]); to resist this attack,three criterions for the nonlinear kernel of a private key in this scheme are proposed...

A Semi -ring is introduced to describe input memory finite automata and their compositions; an algebraic treatment is given to the weak invertibility theory of nonlinear finite automata,relative basic decomposition and the concept of nonlinear kernel are introduced. As applications, a method called"nonlinear kernel attack "is proposed to analysis of the public key cryptosystem FAPKC3([l]); to resist this attack,three criterions for the nonlinear kernel of a private key in this scheme are proposed ,and it is pointed out that, whether there exist enough (to make a key bank)keys fitting into these criterions and how to construct them is still a problem to be further investigated.

引入半环描述输入存贮有限自动机及其复合运算,对非线性有限自动机的弱可逆性理论进行了代数化处理,提出相对基本分解并引出非线性核的概念等。作为应用,对FAPKC3公钥体制(文献[1])提出称之为“非线性核攻击”的攻击方法,由此提出该体制中私钥的非线性核必须符合的三条准则,并指出是否存在以及如何构造足够多的符合这些准则的密钥是有待研究的问题。

Secure authenticated exchange is essential to network security. Two way authentication is often needed between two parties in a communication network, but the two way authentication is not simply twice the one way. This paper investigates protocols for two way authentication by using only private key cryptosystems, and discusses the security of such authentication protocols.

安全可靠的通信交流是网络通信的基本要求.在网络的通信双方之间,常常需要进行对等的双向相互认证,但是双向认证并不简单等于两次使用单向认证.文中讨论了采用对称密码体制实现双向认证以及有关的安全问题.

A new key authentication scheme was proposed. This new scheme is based on the intractability of elliptic discrete logarithms. The key is combination of password and private key. The scheme is highly secure and its process is very simple.

本文利用椭圆曲线上离散对数难解问题,提出了一种新的密钥认证方案,密钥由用户口令和秘密密钥组成。该方案安全可靠且认证过程简单。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关private keys的内容
在知识搜索中查有关private keys的内容
在数字搜索中查有关private keys的内容
在概念知识元中查有关private keys的内容
在学术趋势中查有关private keys的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社