助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   secure password 的翻译结果: 查询用时:0.007秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

secure password
相关语句
  安全口令
     Some Polices for Secure Password
     安全口令选择策略
短句来源
  安全的密码
     To describe Security Configuration of Operating System and Microsoft SQL Server 2000. And to talk some must be attended questions, those relate to security and uses of SQL Server 2000. Discusses nine ways in Security Configuration of SQL Server 2000 . Includes strategy of using secure password, strategy of using secure account and management of extended Procedure, and so on.
     介绍了操作系统和微软SQL Server2000数据库的安全配置的方法,以及在相关的安全和使用方面需注意的问题,其中数据库的安全配置包括了使用安全的密码策略、使用安全的账号策略和管理扩展存储过程等九个方面。
短句来源
  “secure password”译为未确定词的双语例句
     But it is impossible forus to ensure the cryptographical method not to be leaked. So people used to make themethod open and ensure the security of information by the security of securepassword. The management and exchange of the secure password is also a keytechnique of the information secure.
     当前信息安全涉及很多方面,其中密码算法的安全性是一个重要环节,但是如果要完全保证密码算法不被泄漏是不可能的,所以当前信息安全领域一般公开密码算法,而通过其用来加密的密钥的保密性来确保信息的安全,所以密钥的管理和交换也是信息安全的一个关键技术。
短句来源
     Encrypted key exchange protocol’s goal is to establish a high secure key used for further encryption and authentication through a low secure password.
     密钥加密协议的目的是利用安全性低的口令协商安全性高的密钥,进而利用密钥对以后的通信进行加密或身份认证,从而实现安全通信.
短句来源
  相似匹配句对
     Secure the Password of MIS
     信息管理系统的口令安全方案
短句来源
     Some Polices for Secure Password
     安全口令选择策略
短句来源
     Secure E-mail
     安全电子邮件
短句来源
     Research on Secure Programming
     安全编程研究
短句来源
     The password safety management
     口令安全管理
短句来源
查询“secure password”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  secure password
This application is provided via a secure password protected internet connection.
      
This practice includes creating secure password policies, maintaining active and accurate log files, and disabling any unused features.
      
This will be entered in conjunction with an 8-16 digit authenticated secure password.
      
This is one example why all users need to have ensure they practise secure password practices.
      
Modeling products were exchanged by facsimile and by posting results on a secure password protected web site hosted by Canada.
      
更多          


SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol. By using verifier but not plaintext-equivalent to the password itself, SRP prevents an attacker who captures the password database from easy compromising the security of the system. SRP and it also offers perfect forward secrecy and resists active or passive dictionary attacks. But SRP does not adequately consider the case that protocol information can be tampered. The system will suffer...

SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol. By using verifier but not plaintext-equivalent to the password itself, SRP prevents an attacker who captures the password database from easy compromising the security of the system. SRP and it also offers perfect forward secrecy and resists active or passive dictionary attacks. But SRP does not adequately consider the case that protocol information can be tampered. The system will suffer from active DoS attacks until SRP is improved. This paper presents an improvement on enhancing SRP's resistance to active DoS attacks.

SRP(安全远程密码协议)是一种安全的新型密码鉴别和密钥交换协议。由于采用了鉴别符而不是密码的明文等价,攻击者即使得到了鉴别符数据库也难以破坏系统的安全性。同时,协议也提供了完善的向前保密性(PFS),能抵抗主动或者被动的字典攻击。但是SRP未充分考虑到协议信息被篡改的情况,如果对此不做改进,系统将无法抵抗主动式拒绝服务攻击。因此提出了一种改进措施,提高了SRP协议对抗主动式拒绝服务攻击的能力。

This paper exposes several common policies for secure password, of which the proactive password analysis is considered the best policy. Therefore, this paper focuses on the proactive password analysis as well as its two typical methods: Markov Model, Bloom Filter.

本文指出了用户在选择口令时存在的弱点,介绍了用户选择安全口令的几种策略,并简述了前置式口令检查策略的两种实现技术。

In this paper, how passwords work and the basic technique of encryption processing on passwords are introduced simply. Then why and how passwords are vulnerable are indicated and the popular techniques about password attack in the present are described. Finally, how to create more secure passwords, some concerned password policies to guard passwords, and some alternatives to passwordonly authentication for high security environments are given based on passwords′...

In this paper, how passwords work and the basic technique of encryption processing on passwords are introduced simply. Then why and how passwords are vulnerable are indicated and the popular techniques about password attack in the present are described. Finally, how to create more secure passwords, some concerned password policies to guard passwords, and some alternatives to passwordonly authentication for high security environments are given based on passwords′ vulnerability.

简单介绍了密码的工作原理 ,对密码进行加密处理的基本技术基础上 ,指出了密码易遭受攻击的原因所在 ,并简述了当前流行的密码攻击技术。最后 ,针对密码的脆弱性提出了如何创建更加安全的密码 ,保护密码安全的相关策略以及在高安全要求环境中补充密码验证的其他可选方法。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关secure password的内容
在知识搜索中查有关secure password的内容
在数字搜索中查有关secure password的内容
在概念知识元中查有关secure password的内容
在学术趋势中查有关secure password的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社