origin authentication meaning in English
原发鉴别
Examples
- This chapter provides design patterns for data confidentiality and data origin authentication
本章为数据保密性和数据来源的鉴定提供了设计模式。 - It is a set of programming interfaces that abstracts identity authentication , message origin authentication and integrity , and message confidentiality
这是一套编程接口,抽象了身份验证、消息源验证和完整性。 - The set of security services offered includes access control , connectionless integrity , data origin authentication , protection against replays , confidentiality , and limited traffic flow confidentiality
Ipsec协议提供的安全服务集包括存取控制、无连接的完整性、数据源鉴别、反重放攻击、机密性和有限的通信量的机密性。 - Ipsec offers security services including connectionless integrity , data origin authentication , protection against replays , confidentiality and limited traffic flow confidentiality for ip and upper layer protocols
Ipsec为ip及上层协议提供了无连接完整性、数据源身份认证、抗重播攻击、数据内容的机密性和有限的通信流量机密性等安全服务。 - Fortunately , ipsec provides us security services for ip layer and higher layers , such as access control , connectionless integrity , data origin authentication , rejection of replayed packets ( a form of partial sequence integrity ) , confidentiality ( encryption ) , limited traffic flow confidentiality , and so on . the thesis gives a type of network security architecture based on ipsec system , it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack , current main network attack methods and regular defense methods . 2 studing the overall architecture , main security protocols , application environments , and working mechanism of ipsec
本文所提出的新一代网络安全体制就是建立在ipsec体系基础上的,在本文的撰写过程中,我主要进行了如下一些工作: 1深入分析了由tcp ip协议栈本身带来的安全问题、当前主要的网络攻击方法以及常采用的防范对策; 2研究了ipsec标准的总体结构、主要安全协议、应用场合以及其工作机制; 3研究了当前常用的各种数据加解密机制以及密码算法,深入分析了它们各自的特性和具体的使用方式; 4阅读了大量关于混沌密码的文献资料,了解目前混沌密码的研究动态和成果,研究混沌密码体制的工作机理,然后利用vc + + 6 . 0作为开发平台对一类混沌密码体制进行了实现,并为它编写测试代码评估其性能。