网站首页  词典首页

请输入您要查询的英文单词:

 

单词 PKI
释义

PKI

美 
英 
  • 网络公钥基础设施(Public Key Infrastructure);公钥基础结构;公共密钥基础设施
abbr.
1.
public key infrastructure

例句

释义:
1.
All the XML code points to this vendor's servers to provide information, sort of like a non-public PKI infrastructure.
所有XML程式码都指向该供应商的伺服器以提供讯息,这有点像非公用的PKI基础结构。
www.ibm.com
2.
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
www.ibm.com
3.
PKI consists of two keys -- a public key and a private key -- used to authenticate the user and encrypt the data.
PKI由两个密钥组成-公钥和私钥-用于认证用户和加密数据。
www.ibm.com
4.
Certification authorities (CAs ) are the central component of the public key infrastructure ( PKI ) of an organization .
证书颁发机构(CA)是某组织公钥基础结构(PKI)的中心组件。
www.bing.com
5.
Unfortunately, the answer is not as simple as choosing one of the many available PKIs and integrating with it.
不幸的是,答案并不像选择某种可用的PKI并与之集成那么简单。
www.ibm.com
6.
In the case of a PKI public and private key pair, there is a mathematical relationship between the keys in question.
对于PKI公共和私有密匙,它们之间存在一个数学关系式。
www.ibm.com
7.
In the digital world, PKI certificates issued by trusted certificate authorities can be seen as providing a "proof" of a claimed identity.
而在数字世界中,由可信的证书权威机构发放的PKI证书可以被视为提供了一个所声称的身份的“证据”。
www-128.ibm.com
8.
mr wong said the government played an active role in promoting standardisation on the adoption of technologies , including pki.
黄志光指出,政府积极推广在使用公匙基建等科技时,采用划一的标准。
www.ichacha.net
9.
The next topic focuses on another important component of the XML security infrastructure -- PKI.
下一个话题是XML安全基础设施的另一个重要部分——PKI。
www.ibm.com
10.
Around the key management and authentication, it basically forms three technical systems, which are PKI, IBE and CPK.
围绕密钥管理和认证问题,基本上形成PKI、IBE和CPK三种技术体系。
www.boshuo.net
1.
The link between the ESB and provider services may be secured by network architecture, by ESB credentials or by encryption using PKI.
ESB和提供者服务之间的链路可能由网络体系结构、ESB凭据或使用PKI的加密进行保护。
www.ibm.com
2.
Another would be to share a PKI private key among the service providers.
另一种解决方案是在服务提供者之间共享PKI私钥。
www.ibm.com
3.
PKI provides us with a secured and trusted environment for the conduct of electronic transactions.
公匙基建能为我们提供一个稳妥可靠的环境进行电子交易。
www.info.gov.hk
4.
This enables you to use a PKI that resembles a third-party certificate vendor, but is less expensive.
这使您能够使用与第三方证书供应商相似的PKI,但成本较低。
technet.microsoft.com
5.
PKI is entrusted with managing everything related to the creation, manipulation, and management of these keys.
PKI受委托管理与这些密钥的创建、处理和管理有关的一切事情。
www.ibm.com
6.
The SSL protocol provides authentication, data encryption, and data integrity, in a public-key infrastructure (PKI).
SSL协议在一个公共密钥基础设施中提供认证、数据加密和数据完整性。
www.ibm.com
7.
The authentication model eases bottlenecks for PKI frameworks, while guaranteeing authentication security and integrity.
该认证模式在缓解PKI瓶颈问题的同时,较好地保证了认证的安全性和完整性。
www.71155.com
8.
To overcome this limitation and make the scenario more interesting, we decided to carry out a PKI.
为了克服这个限制,同时也为了让这个场景更有意义,我们决定采用PKI。
www.ibm.com
9.
Key generation and distribution are the most vulnerable parts of PKI systems.
密钥产生和发布是PKI系统最易攻击的部分。
blog.sina.com.cn
10.
Certificate Services is required to deploy a Windows PKI and can be installed through Add or Remove Programs in Control Panel.
需要使用证书服务部署WindowsPKI,证书服务可以通过“控制面板”中的“添加或删除程序”安装。
technet.microsoft.com
1.
This paper studies how the 3G radio access network side PKI applications to achieve the confidentiality of the identity of the user.
本文主要研究了如何在3G的接入网端应用无线PKI来实现用户身份的机密性。
www.okqikan.com
2.
This proxy leads to a real thin client and accelerates the application and development of PKI.
通过该代理服务器,能够构建出真正的公钥基础设施(PKI)瘦客户端,促进PKI的应用和发展。
www.ecice06.com
3.
The criteria can be different for each PKI, but once the CSR is approved, the CA fulfils the request by issuing a certificate.
对于每个PKI,标准可能各不相同,但在批准CSR之后,CA将通过颁发证书来完成请求。
www.ibm.com
4.
to secure the data exchange and payment transactions , the system uses pki technology.
这系统使用了公匙基建技术,以保障数据交换和付款交易的安全。
www.ichacha.net
5.
SAML is built on a foundation that requires SSL certificates to provide digital signing and encryption of SAML assertions.
SAML构建在需要公钥基础结构(PKI)的基础之上,以提供数字签名和SAML断言的加密。
www.ibm.com
6.
PKI is the data structure which bind the identity of entity with its public-key.
公钥证书是将实体的身份和公开密钥绑定在一起的一种数据结构。
www.fabiao.net
7.
PKI; sub-Cryptosystem; KMC; Key Management; Certificate Management; Physical security.
密码子系统;KMC;密钥管理;证书管理;物理安全性。
www.edu-hb.com
8.
Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce.
PKI的标准仍然处于发展之中,尽管如此,它们仍然广泛地在作为电子商务的必要元素来进行实施。
technet.microsoft.com
9.
PKI management services in achieving safety standards, while also help to reduce the management of enterprises and financial burden.
PKI管理服务在实现安全标准的同时,还有助于减少企业的管理和财务负担。
www.brar.cn
10.
With the designed PKI, any internet entities are provided with mechanisms to get certificates and to verify their authenticity and validity.
借助于所设计的PKI,任何互联网实体都得到了一些机制,用于获得证书和验证它们的真实性和有效性。
women.zhishi.sohu.com
1.
Secondly, the author analyzes briefly the methods of cryptographic technology and the component of PKI correlative with this design.
然后文章对与本设计相关的密码技术的基本原理和PKI组件作了简要介绍,并予以论述与分析。
www.fabiao.net
2.
Although the PKI in network security is the most promising, However, it still faces a number of economic and mobility of challenges.
尽管PKI在网络安全方面是最有发展前途的,但它仍然面临着一些经济和流动性方面的挑战。
www.brar.cn
3.
Actually, key management center, which provides key management services, is the crucial part of PKI system.
而密钥管理中心是PKI信任体系的一个至关重要的部分,为证书认证系统提供密钥管理服务。
www.zidir.com
4.
Unfortunately, no system is 100 percent foolproof - not our monetary system, not the banking system, and not a PKI system.
遗憾的是,没有一个系统是100%绝对安全的包括我们的货币系统、银行系统以及PKI系统。
www-128.ibm.com
5.
PKI can provide code transformation of the digital unit and allows the receiver to judge the source of the data and test its authenticity.
按照上述定义PKI可以提供数据单元的密码变换,并能使接收者判断数据来源及对数据进行验证。
proftrans.com
6.
A PKI enables users with no prior contact to authenticate each other by accepting the CA as a trusted third party.
PKI使用户能够不用提前联系进行相互身份验证,即可作为受信任的第三方接受CA。
www.ibm.com
7.
This would mean implementing a PKI on a massive scale, something not likely to happen.
这意味着要大规模地实施PKI(公共密钥加密),这是不大可能的。
www2.ccw.com.cn
8.
Download the trusted root certificate for your PKI.
下载PKI的信任根证书。
technet.microsoft.com
9.
Storage of personal and confidential materials, e. G. PKI and important commercial information.
能储存个人和高机密的资料,比如PKI,和重要商业信息;
woozoo.b2b.hc360.com
10.
Certificate has become the managing tool of PKI. End entity must validate certificate's creditability before communication.
PKI以数字证书为密钥管理工具,终端实体之间进行通信之前必须要验证数字证书的可信性。
www.fabiao.net
1.
The establishment of an application system of PKI is processed around these components.
构建实施一个PKI的应用系统也将围绕这些部分来进行。
www.waiwenfanyi.com
2.
The trusted third party hosts the XKMS service while providing a PKI interface to the client applications.
这个受信任的第三方在提供一个到客户机应用程序的PKI接口的同时驻留了XKMS服务。
www-128.ibm.com
3.
The two core elements of PKI comprise of public key cryptography and certification authority.
公匙基建的两个核心部分是公开密码匙密码技术及核证机关。
www.info.gov.hk
4.
Is an effort to define a framework for providing and managing PKI-based Web services.
是一种用于为提供和管理基于PKI的Web服务定义框架的措施。
www-128.ibm.com
5.
These qualities provide a solid infrastructure for all the certificates in your organization.
PKI的这些组成部分可以为组织中的所有证书提供坚实的基础结构。
technet.microsoft.com
6.
The users make communication via the security service offered by the PKI platform.
用户利用PKI平台提供的安全服务进行安全通信。
www.waiwenfanyi.com
7.
To make best use of PKI to ensure the safety of network, scientists have done many researches.
如何更好利用PKI来解决网络信息安全问题,国内外都做了大量的研究。
paper.dic123.com
8.
Public Key Infrastructure (PKI) can provides a series of security services for computer-based patient record information system.
利用PKI技术提供的信息安全服务能够解决电子病历系统安全中所遇到的一系列问题。
www.chemyq.com
9.
Create an abstract layer between the application and the PKI solution.
在应用程序与PKI解决方案之间创建一个抽象层。
www-128.ibm.com
10.
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure.
规划PKI:部署公钥基础结构的最佳实践指南。
technet.microsoft.com
1.
First outlined the basic knowledge of wireless PKI, a certificate, as well as access to the version of the way.
首先概要介绍了无线PKI的基本知识,证书的版本以及获取方式。
www.okqikan.com
2.
Therefore we have further design and study RIL layer and CSP layer in PKI system of mobile phone by applying the high security of SIM cards.
进一步结合SIM卡的高安全性对手机PKI系统中CSP层与RIL层进行详细的设计与实现。
www.fabiao.net
3.
The overall security level depends on how LDAP and DNSSEC PKI are managed.
整个的安全水平取决于LDAP和DNSSECPKI如何加以管理。
women.zhishi.sohu.com
4.
The Public Key Infrastructure (PKI) is the key to resolve the series of problem.
证书撤销一直是公钥基础设施(PKI)研究和应用中的一个难点问题。
www.dictall.com
5.
Compared with the mobile agent security scheme based on PKI, this scheme simplify the certificate management and cross-certification.
同时,该方案与基于PKI技术的移动代理安全方案相比,简化了证书管理和交叉认证问题。
www.ceps.com.tw
6.
Based on the public key cryptosystem and PKI technology criterion , in the thesis, put forward a one-time signature scheme based on ECDLP.
基于公钥密码思惟和PKI技术规范,本文提出了基于椭圆曲线离散对数题目的一次签名计划。
www.starlunwen.net
7.
At present, Public Key Infrastructure(PKI)is the most popular and effective scheme to solve this problem.
公钥基础设施(PKI)是解决信息安全不足的一种有效的策略。
www.zidir.com
8.
PKI or commercial certificate with the longest expiration period.
具有最长过期期限的PKI证书或商业证书。
technet.microsoft.com
9.
To improve PKI efficiency, a caching authentication model was developed.
为了解决PKI存在的效率问题,提出一种缓存认证模式。
www.71155.com
10.
Similar bridge CA structure model satisfies the requirement of PKI system's extending.
类桥CA结构模型满足了PKI体系大范围扩展的需求。
www.fabiao.net
1.
Now, XKMS provides an easy mechanism for using and integrating PKI with applications.
现在,XKMS为使用PKI和将PKI与应用程序集成提供了一种容易的机制。
www.ibm.com
2.
Combining with PKI and multi-layer digital watermarking technology, a kind of new electronic seal system is brought up.
结合PKI和多层数字水印技术给出了一种新的电子签章系统。
www3.chkd.cnki.net
3.
This allows even small footprint devices to take advantage of PKI.
这样一来,即使是占用内存很少(smallfootprint)的设备也可以利用PKI。
www.ibm.com
4.
PKI is a trusted Public Key Infrastructure which is composed of public key technology digital signature, CA and security strategy.
PKI是由公开密钥密码技术、数字证书、证书认证机构和安全策略等基本成分共同组成的安全基础设施。
kns50.chkd.cnki.net
5.
Confer with the PKI administrator to find out how user's digital certificates will be made available to the client system.
请咨询PKI管理员以了解如何使用户的数字证书可以被客户端系统使用。
technet.microsoft.com
6.
Clients can request and receive certificates from a PKI on the internal network.
客户端可通过内部网络从PKI请求或接收证书。
technet.microsoft.com
7.
However, if the use of PKI management services combining smart card technology can solve many problems.
不过,如果利用PKI管理服务结合智能卡技术就可以解决很多问题。
www.brar.cn
8.
After gaining a basic understanding of PKI, try to answer the following cases.
对公匙基建有一个基本概念后,你可尝试解答以下的个案。
www.info.gov.hk
9.
Reporter: Below cloud environment, what change will our PKI produce?
记者:在云环境下,我们的PKI将会发生什么变化?
pjprimer.com
10.
New credentials in the underlying PKI are generated using this operation.
可以使用该操作生成底层PKI中的新凭证。
www.ibm.com
1.
The LTPA token is easy to configure compared to a full Public Key Infrastructure (PKI).
与完整的公钥基础结构(PKI)相比,LTPA令牌比较容易配置。
www.ibm.com
2.
How is the asymmetric algorithm type used in PKI?
如何在PKI中使用非对称算法类型?
www.ibm.com
3.
It is assumed that the reader is familiar with the concepts of PKI and SSL in particular.
假设读者熟悉PKI和SSL的概念。
www.ibm.com
4.
PKI is effective because it uses a mathematical correlation with the two passwords -- the public key and private key .
PKI之所以有效是因为它使用了两种与数学相关的密码——公钥和私钥。
www.bing.com
5.
What PKI needs is the real accountability to punish these people and compensate those who were wronged.
PKI所需要的是真正用来惩罚这些人并补偿那些受损失人的责任。
www-128.ibm.com
6.
On the DB2 UDB server: an X. 509 certificate, a PKI environment, and a LIPKEY-enabled server-side GSS-API security plug-in.
在DB2UDB服务器中:一张X.509证书,一个PKI环境,以及一个支持LIPKEY的服务器端GSS-API安全插件。
www.ibm.com
7.
The paper researches the PKI, PMI and access control technology.
本论文主要研究和分析了PKI与PMI系统和访问控制技术。
www.fabiao.net
8.
On the DB2 UDB client: an X. 509 certificate, a PKI environment, and a SPKM-enabled client-side GSS-API security plug-in.
在DB2UDB客户机中:一张X.509证书,一个PKI环境,以及一个支持SPKM的客户端GSS-API安全插件。
www.ibm.com
9.
It's a game played by children, but it's also a serious attack that can occur on public key infrastructures (PKI).
虽然这是孩子们玩的一个游戏,但却也是在公钥基础设施(PKI)上可能发生的一种很严重的攻击。
www.ibm.com
10.
A PKI enables organizations to publish their own certificates.
通过PKI,组织可发布自己的证书。
technet.microsoft.com
1.
Import the trusted root certificate from your PKI on each device.
在每台设备上导入从PKI得到的信任根证书。
technet.microsoft.com
2.
A security data exchange system based on XML was designed and realized by the use of public key infrastructure(PKI) technology.
利用公钥基础设施PKI技术,设计和实现了XML数据的安全交换系统。
kns50.chkd.cnki.net
3.
The following story will explain the basic concepts and functions of PKI.
以下的故事将会简单介绍公匙基建的运作及概念。
www.info.gov.hk
4.
In addition, mary schools have professionals in using and maintaining PKI system.
另外,学校具备使用和维护PKI系统的专业人员。
www.fabiao.net
5.
Traditional wireless network identity authentication scheme based on PKI which is low efficiency and bad compatibility.
传统的基于PKI无线网络身份认证方案效率较低、适用性较差。
lib.cqvip.com
6.
So, to summarize the use of PKI in XML encryption and XML digital signature. . .
因此,总结一下PKI在XML加密和XML数字签名中的使用。
www.ibm.com
7.
Traditional universal authentication systems, such as Kerberos and PKI, have been implemented in some situation.
传统的统一身份认证技术如Kerberos和PKI己经在一定的范围内得到了应用。
www.juhe8.com
8.
Usually, the people that achieve this the most effective way is to use PKI model.
通常,人们认为实现这点最有效的方法就是采用PKI模型。
www.brar.cn
9.
Keys are a critical element of PKI.
密钥是PKI中至关重要的部分。
www.ibm.com
10.
It is the best way to provide identification service by building certificate authentication system based on PKI.
提供身份认证服务最好的办法就是建立基于PKI的证书认证系统。
www.zhaona.com
1.
And then introduced under the PKI authentication.
然后介绍了PKI环境下的认证方式。
www.okqikan.com
2.
The major reasons to hinder the development of PKI are difficulty of certificate authorities (CA)managing certificates.
CA对证书管理的困难性是影响PKI发展的主要原因。
stae.com.cn
3.
When you use a PKI certificate to implement mutual TLS, you must copy the required certificates to the IP gateways or IP PBXs.
使用PKI证书实施Mutual-TLS时,须将必要的证书复制到IP网关或IPPBX上。
technet.microsoft.com
4.
PKI technology is based on the modern cryptology, which authenticate user through issue digital certificate for them.
PKI技术依赖于现代密码学的公开密钥算法,通过颁发数字证书认证用户,是目前国内外流行的主流安全技术之一。
www.lw23.com
5.
We'll use PKI keys and certificates at two levels.
我们将在两个级别中使用PKI密钥和证书。
www.ibm.com
6.
This paper proposes an improved PKI system based on the combine of the IBE and the one-way hash chain.
本文结合基于身份的加密算法与单向哈希链,提出一种改进的PKI系统。
www.dictall.com
7.
PKI has been around for many years, but has not yet made it into typical IT departments.
PKI问世已经有多年了,但是它还没有走进一般的IT部门。
www-128.ibm.com
8.
Kerberos and PKI already support GSS-API, and in fact, Kerberos authentication in DB2 is implemented using the GSS-API model.
Kerberos和PKI已经支持GSS-API,实际上,DB2中的DB2Kerberos身份验证是使用GSS-API模型实现的。
www.ibm.com
9.
Included with Domino 6 is a PKI management process.
在Domino6中包括一个PKI管理进程。
www-128.ibm.com
10.
In order to resolve this problem, we bring up a research policy on PKI system generality based on atomic unit.
本文提出了基于原子单元的PKI系统通用性研究策略,以解决PKI系统的通用性问题。
www.ceps.com.tw
1.
This may include techniques such as PKI using smart cards, secure tokens, biometrics, or a combination of efforts.
其中可能用到如使用公钥(PKI,PublicKeyArchitecture)的智能卡,安全令牌,生物检测或多合一的技术手段。
www.bing.com
2.
If no valid PKI certificates are found, the first self-signed certificate is used.
如果未找到有效的PKI证书,则使用第一个自签名证书。
technet.microsoft.com
3.
After the course study, students can know the development trends of PKI, and understand the key technologies and related knowledge.
学生通过本课程的学习,能够了解PKI的发展趋势,并对其关键技术及相关知识有一定认识和掌握。
www.gs.sjtu.edu.cn
4.
This is a basis for PKI-based digital signatures.
这是基于PKI的数字签名的基础。
www.ibm.com
5.
Grid security is based on the PKI certificate X. 509 mechanism.
现有网格的安全尺度采取了基于X.509证书的PKI机制。
www.starlunwen.net
6.
We can discuss with Uncle Ray how good PKI is tonight.
今晚我们可以和叔叔详谈公匙基建的好处了。
www.info.gov.hk
7.
At about the same time SMTP was defined, PKI was developed.
差不多在定义SMTP的同时,PKI也发展起来了。
www-128.ibm.com
8.
The first valid public key infrastructure (PKI) certificate that is found in this list is used.
使用从此列表中找到的第一个有效公钥基础结构(PKI)证书。
technet.microsoft.com
9.
Research of a Few Certificate Retraction Technologies in the PKI
PKI中几种证书撤消技术的研究
service.ilib.cn
10.
The Public Key Infrastructure PKI and its Application in the Security of Electronic Government Affair
公钥基础设施PKI及其在电子政务安全建设中的应用
service.ilib.cn
1.
Study of a Secure College and University Teaching Transaction Management System Based on PKI
基于PKI的高校安全教务管理研究
ilib.com.cn
2.
Network Security Protocol by PKI Structure and Security Analysis of Its Typical Cryptosystem
PKI结构下网络安全协议模型及典型密码体制安全性分析
www.ilib.cn
3.
Application of PKI Encryption Technology in an E-Goverment-Networks Security
PKI加密技术在电子政务网络安全中的应用
ilib.cn
4.
Analysis and Comparison of Directory Service Technique and Its Implementation in PKI
目录服务技术的分析比较及在PKI中的实现
www.ilib.cn
5.
Digital signature; RSA arithmetic; PKI; Relay protection setting value management; Online bidding;
数字签名;RSA算法;PKI;继电保护定值管理;网上招投标;
www.zidir.com
6.
Design and Implementation of the Railway Ticket and Reservation Network Security PKI Subsystem
铁路客票网络安全系统PKI子系统的设计与实现
www.ilib.cn
7.
Study of Safe System of Exchange System of the Official Document under PKI Structure
PKI结构下公文交换系统安全体系研究
www.ilib.cn
8.
Analysis and Implementation of a Hybrid Multi-level PKI Trust Model
一种PKI混合多级信任模型的分析和实现
service.ilib.cn
9.
Application of PKI-Based CA Authentication Center in Digital Forestry Information Security System
基于PKI的CA认证中心在数字林业信息安全系统中的应用
scholar.ilib.cn
10.
PKI framework in the application of fingerprint and identification certification
指纹身份认证应用中的PKI构架
www.ilib.cn
1.
Research on an Atomic- unit- based General PKI Support Platform
基于原子单元的PKI通用支持平台的研究
service.ilib.cn
2.
Research on Security Middleware Encapsulated PKI Technologies for E-Government
封装PKI技术的安全中间件在电子政务中的研究
www.ilib.cn
3.
Analysis of open password system PKI and its application into police's special net
公开密钥体系PKI及其在公安专网中的应用分析
scholar.ilib.cn
4.
Study on Authenticated Dictionary and Its Applications in PKI
认证字典及其在PKI中的应用研究
www.ilib.cn
5.
Understand basic strengths, weaknesses, and purpose of PKI and digital certificates
了解PKI和数字证书基本的优点、缺点和用途
www-128.ibm.com
6.
PKI-Based Research and Application of Firewall Security Authentication System
基于PKI的防火墙安全认证系统设计
ilib.cn
7.
PKI and Its Application in Electronic Commerce Research
PKI技术及其在电子商务中的应用研究
www.ilib.cn
8.
Security Design of a PKI-Based Marking System on the Internet
基于PKI的远程网上阅卷系统安全设计
www.ilib.cn
9.
Directory Access Technology and Its Application in PKI
目录服务技术及其在PKI中的应用
www.ilib.cn
10.
Algorithm Design for an Improved PKI Trust Valuation Model
一种新的PKI信任度模型算法设计
www.ilib.cn
1.
Implementing PKI Technology in Banking Network Wage Management System
银行网上工资管理系统中的PKI技术实现
ilib.cn
2.
Assessing algorithm for network security performance under PKI system
PKI体系下的网络安全性能评估算法
www.ilib.cn
3.
Build PKI- based enterprise information application
基于PKI的企业信息化应用的构建
www.ilib.cn
4.
E-government information security management through PKI system
在PKI体系下进行电子政务信息的安全管理
ilib.cn
5.
PKI Supported Equipment Attestation Switch Module Project
全面支持PKI体系的设备认证开关模块项目
www.cnnc.info
6.
PKI-Based Mutual Connections Constrained with Discrepancy of Trust Domains
差异性条件约束下基于PKI的信任域互连
www.ilib.cn
7.
A Model of PKI-based Information Communication with Martial Real-time Data Communication
基于PKI的军用实时信息通信架构
www.ilib.cn
8.
In electronic government affairs PKI system research and application
电子政务中的PKI体系研究及应用
ilib.cn
9.
The Design and Implementation of PKI-Normative General Certificate System
基于PKI规范的通用认证系统的设计与实现
www.ilib.cn
10.
formalizing pki interoperability trust models with trust logic
互通信任模型形式化
www.ichacha.net
1.
Research and improvement of certificate revocation mechanism in PKI
公钥基础设施中证书撤销机制的研究与改进
service.ilib.cn
2.
PKI Trust Mechanisms and Its Application in Trust Models
PKI信任机制及在信任模型中的应用
ilib.cn
3.
Application of PKI to Information Network Security for Electric Power Systems
PKI在电力系统信息网络安全中的应用
ilib.cn
4.
The Design and Implementation of PKI-based Digital Authentication System
基于PKI的数字认证系统的设计与实现
service.ilib.cn
5.
Application of PKI encryption method to identification system
公开密钥加密法在认证系统中的应用
service.ilib.cn
6.
Design and Implementation of the Security Infrastructure Based on PKI in Global Distributed Storage Systems
基于PKI的广域存储虚拟化系统的安全设计和实现
ilib.cn
7.
Construction of PKI-Based Encrypted Mail Transmission System
建设一个基于PKI的加密邮件传输系统
service.ilib.cn
8.
pki public key infrastructure practices and policy framework
公共密钥的基础设施
www.ichacha.net
9.
PKI-based Application in Information Security Industry
PKI技术在信息安全产业的应用
ilib.cn
10.
Application of PKI Technology and Development Analysis
PKI的应用与发展分析
www.ilib.cn
1.
Analysis and construction of certificate path in distributed certificate system based on PKI interoperability
基于PKI的分布式认证系统证书路径的构建
ilib.cn
2.
Research on the network information security and the application of PKI technology
基于PKI的网络信息安全的研究与应用
ilib.cn
3.
Research on PKI System Architecture and Application of PKI Technology
基于PKI的网络信息安全体系架构及应用研究
ilib.cn
4.
Application of PKI in Railway Informationization Construction
PKI在铁路信息化建设中的应用
www.ilib.cn
5.
Research of the PKI- based Electronic Seal in Network Transfer
基于PKI的网络传输中电子印章的研究
www.ilib.cn
6.
Application of information security by PKI technology
PKI技术在信息安全中的应用
ilib.cn
7.
PKI and Certificate and Application of Certificate on Embedded WEB Server
PKI与数字证书及其在嵌入式WEB服务器上的应用
www.ilib.cn
8.
PKI Technology Applying to the Safety Management of Campus Network
PKI技术在校园网安全管理中的应用
www.ilib.cn
9.
The safety of traditional credit card and the improvement basing on PKI public key encryption
传统信用卡应用的安全性及基于PKI公钥加密的改进
www.ilib.cn
10.
PKI and Its Application for Grade Management System on Internet
PKI技术及其在网上成绩管理系统中的应用
www.ilib.cn
1.
PKI-based security for computer-based patient record information system
基于PKI的电子病历系统安全
service.ilib.cn
2.
Development of a PKI Network Security Platform
PKI网络安全平台的研制与开发
www.ilib.cn
3.
A conditional predicate calculus logic for PKI trust model analysis
PKI信任模型的条件谓词逻辑推理
ilib.cn
4.
The PKI Technology and Analysis of the Existing Problems
PKI技术及其存在问题的分析
www.ilib.cn
5.
Research and Evaluation of the E-commerce Security Based PKI
基于PKI的电子商务安全研究
www.ilib.cn
6.
Researching of PKI Adopted In Documents Exchanging System
PKI在文件交换系统中的应用研究
www.ilib.cn
7.
The Secure Electronic Government Constructed by PKI
PKI构建的安全电子政务
www.ilib.cn
8.
PKI Committee of Internet Security Technology Forum
互联网安全技术论坛委员会主席
www.anlang.com
9.
Research on application of PKI technology in network security
PKI技术在网络信息传输安全上的应用研究
ilib.cn
10.
Research on the Algorithm of Certificate Path Construction in PKI
PKI中证书路径构造算法研究
www.ilib.cn
1.
Application in the Safe and Secret System of e-commerce of Digital Signature Technology on the Basis of PKI
基于PKI的数字签名技术在电子商务安全保密系统中的应用
ilib.cn
2.
Comparison of PKI Truss of Bridge Between China and Foreign Countries
中外桥接式PKI架构之比较
www.ilib.cn
3.
Application of PKI Security Technology in Web Stock Exchange
PKI技术在证券网上交易中的应用
ilib.cn
4.
Research on Interoperability of PKI in E-government Services
网上报税中PKI互操作性的研究
www.ilib.cn
5.
Security of E-Government: Extensive Implementation of PKI is the Key
电子政务安全:实施PKI是关键
service.ilib.cn
6.
Key Management Technology and Realization Scheme of PKI
PKI体系中的密钥管理技术及实现方案
ilib.cn
7.
Analysis and research of PKI secure certification model
PKI安全认证模型的分析与研究
www.ilib.cn
8.
Secure Electronic Commerce Structured by PKI
PKI构建的安全电子商务
www.ilib.cn
9.
An Online Exchange Secure Middleware and Its Implementation Based on PKI
基于PKI的网上交易安全中间件的研究与实现
www.ilib.cn
10.
Robust Image Authentication Method Combing SVD and PKI
奇异值分解与PKI结合的鲁棒图像认证方法
www.ilib.cn
1.
application of pki in distributed firewall system
技术在分布式防火墙系统中的应用
www.ichacha.net
2.
The Application of PKI Technology in the Enterprise Network
浅谈PKI技术在企业网络中的应用
ilib.cn
3.
The research on application of PKI technology in Internet taxpaying system security
PKI技术在网上报税系统中的应用
ilib.cn
4.
A PKI Based Security Solution for Credit Management System
基于PKI技术的学分制管理系统的安全解决方案
ilib.cn
5.
Study of document exchanging system security based on PKI
基于PKI体系的公文流转系统安全的研究
service.ilib.cn
6.
PKI Trust Model Analysis Based on Probabilistic Model and Conditional Predicate Calculus Logic
基于概率和条件逻辑的PKI信任模型推理
ilib.cn
7.
Implementing and Maintaining PKI to Support Message Security in Exchange 2003
在Exchange2003中实现并维护PKI以支持邮件安全性
technet.microsoft.com
8.
Design and Implementation of PKI for Campus Networks
园区网PKI的设计与实现
168.160.184.82:8080
9.
A PKI-based Security Mechanism of Network Management
一种公钥认证的网络管理安全机制
www.ilib.cn
10.
Multipath Construction Methods of PKI
公钥基础设施的多路径构造方法
www.ilib.cn
1.
Research on the WAP PKI Wireless Authentication
无线认证的研究
service.ilib.cn
2.
The Design of a Safety Electronic Politics System Based on PKI
基于PKI的安全电子政务系统的设计
ilib.cn
3.
The application of PKI for social insurance e-government
PKI技术在社保电子政务中的应用
www.ilib.cn
4.
Study on Private Key Protection Mechanism in PKI System
PKI体系私钥保护机制研究
service.ilib.cn
5.
Assessment Method Based on PKI Security Level Assurance Assessment Criteria
基于PKI系统安全等级保护评估准则的评估方法
www.ilib.cn
6.
Analysis and Construction of Repository in PKI
PKI中证书库的分析与构建
www.ilib.cn
7.
A certificate revocation mechanism in PKI
一种新的PKI证书撤销机制
www.ilib.cn
8.
The optimizal path building algorithm with policy constraints for PKI
PKI中优化的带策略约束的路径构造算法
www.ilib.cn
9.
A dynamic evaluating method of confidence within CA in PKI system
一种PKI系统中CA间信任度的动态评估方法
ilib.cn
10.
Research on PKI Technology and E-Commerce Security
PKI技术与电子商务安全研究
www.ilib.cn
1.
Design and Realization of PKI System in Campus Network
校园网内PKI系统的设计与实现
service.ilib.cn
2.
The Application of PKI in Securities Business
PKI在证券行业中的应用
www.ilib.cn
3.
Realization of security information transmitting system based on PKI
基于PKI的安全信息传输系统的实现
ilib.cn
4.
The Design and Realization of PKI for Information System
信息系统的PKI体系设计与实现
www.ilib.cn
5.
Designing And Implementation Of Security Digital Sign Service Platform Based On PKI
基于PKI技术的安全数字签章服务平台的设计与实现
www.ilib.cn
6.
An authentication design of PKI based on some cryptography algorithms analysis
一种基于加密算法分析的PKI身份认证方案
www.ilib.com.cn
7.
A Design of a Secure Electronic Mail Protocol Based on PKI
一种基于PKI的安全电子邮件协议的设计
ilib.cn
8.
Software Generation of the PKI Key Based on Object-Oriented Techniques
基于面向对象技术的PKI密钥的软件生成
www.ilib.cn
9.
A PKI Model for the Scheme of Contract Signing on the Net
一种网上合同签署方案的PKI模型
www.ilib.cn
10.
Analysis and Research of Multi-level Trust Models in PKI
PKI多级信任模型的分析与研究
ilib.cn
1.
Development and design of campus network charge and authentication system based on PKI
基于PKI的校园网计费认证系统的研究与设计
ilib.cn
2.
Analysis and Research of Several Trust Models in PKI
PKI中几种信任模型的分析研究
ilib.cn
3.
Design and implementation of between-bank-cheque verification system based on PKI
基于PKI的联行支票核验系统的设计与实现
www.ilib.cn
4.
The research of a certified email system based on PKI
基于PKI的认证电子邮件系统的研究
service.ilib.cn
5.
A New Type of Designed Methodology about PKI Trust Chain
一种新型PKI信任链构建方法
ilib.com.cn
6.
PKI in the Research and Application of E-government
PKI在电子政务中的研究与应用
www.ilib.cn
7.
A Solution to the Signature and Encryption of Secure Official Documents Based on PKI
一种基于PKI的安全公文签名加密解决方案
service.ilib.cn
8.
A Model of Identity Authentication Base on PKI
基于PKI体系结构的双向身份认证模型
www.ilib.cn
9.
Design of PKI for Campus Network of University
高校校园网PKI的设计
www.ilib.cn
10.
A brief discussion on China's PKI construction
浅论我国的PKI建设
www.ilib.cn
1.
Study on Certification Path of PKI Trust Model
公钥基础设施信任模型中信任路径问题研究
ilib.cn
2.
A High Strength PKI Structure Designof Network Transmission
一种高强度的网络通信软件的PKI设计
ilib.cn
3.
Verifiable Partial Key Escrow for PKI
PKI中的可验证部分密钥托管
www.ilib.cn
4.
Research and question analysis of PKI
PKI的研究及问题分析
www.ilib.cn
5.
Implementing an Internet Authentication System of Value-added Tax Special Invoice Based on PKI
基于PKI的增值税发票网上认证系统的构建
ilib.cn
6.
Research on Information Security Technology Based on PKI System
基于PKI体系的信息安全技术研究
ilib.cn
7.
A Model of Digital Copyright Protection Frame work Based on PKI and Watermarking
一个基于PKI和数字水印的数字版权保护框架模型
service.ilib.cn
8.
Study and design of network information secure model based on PKI technology
基于PKI的网络信息安全模型的研究与设计
ilib.cn
9.
Application of PKI in secure E-mail transfer
PKI在安全邮件传输上的应用
ilib.cn
10.
A Solution to the Encryption of the Secret Report Files Based on PKI
一种基于PKI的保密报表文件加密解决方案
www.wanfangdata.com.cn
1.
An Expansion Method of PKI with Path Discovery
基于路径发现的PKI扩展方法
service.ilib.cn
2.
The Security Research of Electronic Government Affair Based on PKI
基于PKI的电子政务信息安全
service.ilib.cn
3.
PKI Based Key Escrow Technology
基于PKI的安全密钥托管技术
ilib.cn
4.
PKI Based Online Payment System
基于PKI技术的网上交易系统
www.ilib.cn
5.
Realization of digital signature and digital envelop based on PKI
基于PKI的数字签名和数字信封的实现
ilib.cn
6.
Basis and Application Research of Security Computing Based on PKI
基于PKI的安全计算基础与应用研究
ilib.cn
7.
Research on Roaming Private Key of PKI
对PKI私钥漫游的研究
service.ilib.cn
8.
Research of Certificate Management System Based on PKI
基于PKI的证书管理系统的研究
service.ilib.cn
9.
Research and Application of Internet Trust Systems Based on PKI
基于PKI网络信任系统的研究和应用
ilib.cn
10.
Application of digital certificates based on PKI in time stamp service system
数字证书在时间戳服务系统中的应用研究
ilib.cn
1.
An Implementation for CA Subsystem Separation Based on PKI
一种基于PKI技术的数字电视机卡分离实现方案
www.ilib.cn
2.
Design of E-Government Security Supporting System Based on PKI
基于PKI的电子政务安全支撑系统设计
www.ilib.cn
3.
Design and Implementation of SSL Model Based on PKI Technology
基于PKI的安全套接层通信模型的设计与实现
www.ilib.cn
4.
Design and implementation of secure file transfer based on PKI
基于PKI的安全文件传输系统的设计与实现
www.ilib.cn
5.
Design and realization of authentication based on PKI
基于PKI的身份认证的设计与实现
www.ilib.cn
6.
Research on simplified security strategy based on PKI
基于PKI的简化安全策略研究
www.ilib.cn
7.
Implementation of Electronic Seal System Based on PKI
基于PKI的电子签章系统的实现
www.ilib.cn
8.
The Network Security Solution Based on PKI Technology
基于PKI技术的网络安全解决方案
ilib.cn
9.
Electronic Commerce Security System Based on PKI
基于PKI的电子商务安全体系
ilib.cn
10.
Research on Electronic Government's security Based on PKI
基于PKI的电子政务安全策略
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/4/9 16:33:31