Mobile
Log In Sign Up
Home > chinese-english > "origin authentication" in English

English translation for "origin authentication"

原发鉴别

Related Translations:
ah authentication header:  鉴定文件头
cumulative origin:  累积起因
false origin:  假定原点
passenger origin:  客向,客流流向客源
hybrid origin:  混合成因
paternal origin:  父系,父本
cone origin:  圆锥底面圆心
unknown origin:  未明原因原因不明
lake origin:  湖泊成因
reset origin:  重设起点
Example Sentences:
1.This chapter provides design patterns for data confidentiality and data origin authentication
本章为数据保密性和数据来源的鉴定提供了设计模式。
2.It is a set of programming interfaces that abstracts identity authentication , message origin authentication and integrity , and message confidentiality
这是一套编程接口,抽象了身份验证、消息源验证和完整性。
3.The set of security services offered includes access control , connectionless integrity , data origin authentication , protection against replays , confidentiality , and limited traffic flow confidentiality
Ipsec协议提供的安全服务集包括存取控制、无连接的完整性、数据源鉴别、反重放攻击、机密性和有限的通信量的机密性。
4.Ipsec offers security services including connectionless integrity , data origin authentication , protection against replays , confidentiality and limited traffic flow confidentiality for ip and upper layer protocols
Ipsec为ip及上层协议提供了无连接完整性、数据源身份认证、抗重播攻击、数据内容的机密性和有限的通信流量机密性等安全服务。
5.Fortunately , ipsec provides us security services for ip layer and higher layers , such as access control , connectionless integrity , data origin authentication , rejection of replayed packets ( a form of partial sequence integrity ) , confidentiality ( encryption ) , limited traffic flow confidentiality , and so on . the thesis gives a type of network security architecture based on ipsec system , it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack , current main network attack methods and regular defense methods . 2 studing the overall architecture , main security protocols , application environments , and working mechanism of ipsec
本文所提出的新一代网络安全体制就是建立在ipsec体系基础上的,在本文的撰写过程中,我主要进行了如下一些工作: 1深入分析了由tcp ip协议栈本身带来的安全问题、当前主要的网络攻击方法以及常采用的防范对策; 2研究了ipsec标准的总体结构、主要安全协议、应用场合以及其工作机制; 3研究了当前常用的各种数据加解密机制以及密码算法,深入分析了它们各自的特性和具体的使用方式; 4阅读了大量关于混沌密码的文献资料,了解目前混沌密码的研究动态和成果,研究混沌密码体制的工作机理,然后利用vc + + 6 . 0作为开发平台对一类混沌密码体制进行了实现,并为它编写测试代码评估其性能。
6.In tcp / ip protocol suite , the ipsec protocol provide interoperable , high quality , cryptographically - based security for ipv4 and ipv6 . the set of security services offered includes access control , connectionless integrity , data origin authentication , protection against replays ( a form of partial sequence integrity ) , confidentiality ( encryption ) , and limited traffic flow confidentiality
在tcp ip协议族中, ipsec ( internetprotocolsecurity )协议提供的安全服务保证数据在网络传输过程中的机密性、完整性和抗重放保护,以及对网络通信中的通信流分析攻击提供有限的保护, ipsec协议还提供对网络的访问控制能力。
Similar Words:
"origin and destination study" English translation, "origin and destination survey" English translation, "origin and development of rehabilitation" English translation, "origin and distribution of nitrogen" English translation, "origin antigenic sin" English translation, "origin belief" English translation, "origin center" English translation, "origin centre" English translation, "origin certificate of gsp" English translation, "origin city" English translation