查询词典 digest digital
- 与 digest digital 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It is generically known as a digest, digital signature, one-way encryption, hash or checksum algorithm.
它一般地作为一种摘要,数学签名,单向加密,哈希表或校验和算法。
-
Digital digest; digital signature; electronic payment; payment gateway
数字摘要;数字签名;电子支付;支付网关
-
Electronic authentication means a service that is based on encryption technology, electronic signature, digital certificate, digital digest and so on, which are to be used to identify the signatory and the credibility and integrity of the document.
从字面上理解,凡是能颁发认证证书的机构都可以称之为认证机构。但本文的认证机构具有特定的含义,它专指电子商务中对用户的电子签名颁发数字证书的机构,它已经成为开放性电子商务活动中不可缺少的信用服务机构。
-
The full text has a overview of smart card technology and information security knowledge, focused on the respects of two classic DES and RSA key system, authentication technology, massage digest,, digital signatures.
全文对系统涉及的智能卡技术及信息安全知识作了简要说明,重点介绍了DES和RSA两种经典密钥体制、认证技术、消息摘要、数字签名。
-
Second, we design and implementation the tax-controlled system and whole security of data of the system. We integrate application the encrypted algorithms technology, digital signature, key managing and digital digest, etc. And combine such hardware equipment as CPU card and POS machine, has solved the systematic security wholly.
然后对税控系统的整体系统及整体安全性进行设计与实现,综合应用密码技术、数字签名、密钥管理和数字文摘等,结合CPU 卡和税控器等硬件设备,整体解决了税控系统的安全性。
-
The main content of this thesis includes six parts. First of all, it is a comprehensive systematic introduction about RSA algorithm including the present application situation and principle of RSA algorithm----producing big prime numbers and secret keys, the encryption arithmetic for information and the decryption for secret information, which establish the theory foundation for achieving concrete; secondly, it introduces some basic conception of RSA digital signature and theory of digital signature realizing process; thirdly, it introduces the basic principle of MD5 algorithm; fourthly, it states design and realization of RSA digital signature in detail. The main modules includes producing RSA secret keys, implementation of RSA encryption algorithm and decryption algorithm, producing message digest and realizing digital signature and verification by RSA; the fifth, it carries on testing entirely, analyzing and improving for this system;The sixth, it analyses the security of RSA digital signature and points out the development direction of RSA digital signature.
本文主要研究的内容包括:第一,对RSA算法进行了全面系统的介绍,包括RSA算法的应用现状和原理—大素数的产生、密钥对的产生、对明文的加密运算和密文的解密运算,为具体实现打下了理论基础;第二,介绍了RSA数字签名的一些基本概念和数字签名的理论实现过程;第三,对MD5算法基本原理的介绍;第四,详述了RSA数字签名的设计与实现,主要实现的模块包括RSA密钥的产生,RSA加密算法和解密算法的实现,消息摘要MD的生成以及利用RSA算法实现数字签名和签名的验证;第五,对该系统进行了整体的测试和分析改进;第六,分析了RSA数字签名的安全性,指出了RSA数字签名的发展方向。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
Authentication ; message digest ; digital signature
身份认证;报文摘要;数字签名
-
Chapter 3 dissertates the structure, trust model, security performance and development of PKI, then discusses the correlated technologies of PKI which includes message digest, digital signature, digital time stamp, digital certificate, SSL, SET and IPSec protocol.
首先分析了PKI的体系结构、信任模型、安全性能和发展方向,然后讨论了PKI的相关技术:包括消息摘要,数字签名,数字时间戳,数字证书,SSL协议,安全电子交易(Secure Electronic Transaction,SET)协议,和Internet安全协议(Internet Protocol Security,IPSec)。
-
Checksum, CRC, hash algorism, message digest, digital autograph and public denskey system are thetechnology to transmit relative data, confidential information and veracity confirmation through compuer or internet, and couldbe applied to the government network.
校验和、循环冗余校验码、散列算法、消息摘录、数字化签名和公共密钥加密系统是可用于INTERENT网或用计算机传送的有关数据、信息加密和真实性确认的技术。
- 推荐网络例句
-
The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.
采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。
-
By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.
通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。
-
Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.
有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。