| 1. | ( 4 ) the pki ( public key lnfrastructure ) / ca ( certificate authority ) frame ( 4 )讨论了公开密钥基础设施pki ca认证体系。 |
| 2. | Public key infrastructures can be used to create , manage , store , distrbute and revocate certificates 公开密钥基础设施被用于创建、管理、存储、分发和吊销公钥证书。 |
| 3. | Public key infrastructure is the foundation and emphasis of construct for network security presently 公开密钥基础设施( publickeyinfrastructure ,简称pki )是目前网络安全建设的基础与重点。 |
| 4. | Promoted by practical use , pki , a universal security infrastructure , has gradually developed and matured 公开密钥基础设施( pki )作为一种普适性的安全基础,在实际应用的推动下也不断地完善和发展。 |
| 5. | At current , the only infrastructure that crm afford trust and security service is the public key infrastructure ( pki ) that will disscussed in this paper 目前在网络空间中能提供信任和安全服务的基础设施就是本文将要讨论的公开密钥基础设施( pki ) 。 |
| 6. | While there are many technologies which meet some of these requirements , only one provides the tools for meeting all of them : public key technology , implemented in the form of a public key infrastructure ( pki ) 有许多技术能够满足其中一些需求,而利用公开密码技术构建的公开密钥基础设施( pki )提供的工具能够满足全部这些需求。 |
| 7. | Pki ( public key infrastructure ) is a uniform technological framework that offers the services of data encrypt and digital signature in the open internet environment by using the public - key encrypt technology of current encryption Pki ( publickeyinfrastructure )是公开密钥基础设施的简称。它是利用现代密码学中公钥密码技术在开放的internet网络环境中提供数据加密以及数字签名服务的统一技术框架。 |
| 8. | And many researchers have recognized and studied the problems in this field in recent years . after many years hard work they have developed a comprehensive security solution " public key infrastructure " ( pki ) , which was widely accepted by the researchers in this field 世界各国经过多年的研究初步形成了一套全面的信息安全解决方案,即目前被广泛采用的公开密钥基础设施( publickeyinfrastructure , pki ) 。 |
| 9. | Based on symmitric cryptographic techniques , asymmitric cryptographic techniques , message authentication code techniques , public key certificate and public key infrastructure techniques , tran sport layer security ( tls ) protocol and secure sockets layer ( ssl ) protocol provide security mechanisms used to provide provacy , integrity for network communication data and authenticate the communication parties 传输层安全协议( tls )和安全套接字层协议( ssl )基于对称密码技术、非对称密码技术、消息认证码技术、公钥证书和公开密钥基础设施技术提供了保证网络通信数据的机密性、完整性和对通信各方进行认证的机制。 |
| 10. | As people enjoyed the opening and sharing of network , they were also distressed about the problem of security . this paper mainly studies the security encryption technology of networks - based e - commerce systems . it analyzes the message encryption and digital signature process of client browser , and the message decryption and validation of merchant server in a integrated e - commerce system , and it also provides an application example 本文主要研究基于网络环境的电子商务系统安全加密技术,分析了一个完整的电子商务应用系统中客户浏览器端和商家服务器端的信息加密、信息解密、数字签名、身份验证,以及pki ( publickeyinfrastructure ,公开密钥基础设施)机制、数字证书技术在这个过程中的功能,并给出了一个具体的实现例子。 |