对称加密技术 meaning in English
symmetric encryption
Examples
- Asymmetry encryption could resolve ali of the security puzzies while tr8ditionai encryption could not do well
常规的加密技术很难满足新的安全性的要求,而非对称加密技术则可以提供完整的解决方案。 - But the question in the asymmetry encryption solution is how to estab1ish a be1ievable relationship between the public key and the owner
不过如何将非对称加密中的公钥和一个实体可信的对应起来就成为了应用非对称加密技术的基础。 - Based on ssl ( secure socket lay ) protocol , the pki / ca combines the symmetrical encrypting technology and unsymmetrical encrypting technology and provides a frame for the implementation of the security
它是在ssl协议的支持下,通过将对称和非对称加密技术结合起来实现的,为系统实施安全提供了一种体系结构。 - The paper discussed the following four points : the security of java , the implemention of mvc pattern and the principle and implemention of the send and incept of e - mail based on java ; the principles and implemention of smtp , pop3 and imap , and the characteristic of the e - mail server sendmail , qmail and postfix ; the principles and implemention of symmetrical encryption and unsymmetrical encryption technology , and the advantages and disadvantages of them ; the characteristic of rubbish e - mail , and the principles and implemention of anti - rubbish e - mail technology
本文研究的主要内容包括: java技术安全性, java对mvc模式的实现,以及java技术解决电子邮件发送和接收问题的原理和实现方法;电子邮件相关协议smtp , pop3和imap的原理和实现方法,以及电子邮件服务器sendmail 、 qmail和postfix的特点;对称加密与非对称加密技术的原理和实现方法,以及两者的优点和缺点;典型垃圾邮件的特征,以及反垃圾邮件技术的原理和实现方法。 - By combination use of the symmetric cryptosystem and threshold cryptosystem , this paper proposes a practical scheme of secure distributed storage , which aims to guarantee that the process of storing the information is correct even when some of the servers fail , while considering the privacy requirement of the system , and don ' t storing the encryption / decryption key in a single device , either held by the user or by the servers
摘要结合对称加密技术和门限加密技术,提出了一种适用于分布式数据存储需要的有效的系统机密性保护方案,其中对称加密技术用于对所存储的文件进行加密,分布式门限加密技术则对对称加密方案中所用的密钥进行保护,可在不带来密钥存储问题情况下满足恶意环境中分布式数据存储系统的机密性要求。