pki

pki

 英

  • 網絡公鑰基礎設施(Public Key Infrastructure);公鑰基礎結構;公共密鑰基礎設施

英漢解釋

abbr.

例句

All the XML code points to this vendor's servers to provide information, sort of like a non-public PKI infrastructure.

所有XML程式碼指向供應商伺服提供訊息有點公用PKI基礎結構

One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.

使用公用安全性系統之一PKI公用密鑰基礎),一種用于PDA智能電話安全性加密技術

PKI consists of two keys -- a public key and a private key -- used to authenticate the user and encrypt the data.

PKI兩個組成-公鑰私鑰-用于認證用戶加密數據

Certification authorities (CAs ) are the central component of the public key infrastructure ( PKI ) of an organization .

證書頒發機構CA組織公鑰基礎結構PKI中心組件

Unfortunately, the answer is not as simple as choosing one of the many available PKIs and integrating with it.

不幸答案并不選擇可用PKI并與集成那么簡單

In the case of a PKI public and private key pair, there is a mathematical relationship between the keys in question.

對于PKI公共私有它們之間存在一個數學關系

In the digital world, PKI certificates issued by trusted certificate authorities can be seen as providing a "proof" of a claimed identity.

數字世界可信證書權威機構發放PKI證書可以視為提供一個聲稱身份證據”。

mr wong said the government played an active role in promoting standardisation on the adoption of technologies , including pki.

黃志光指出政府積極推廣使用基建科技采用劃一標準

The next topic focuses on another important component of the XML security infrastructure -- PKI.

一個話題XML安全基礎設施另一個重要部分——PKI。

Around the key management and authentication, it basically forms three technical systems, which are PKI, IBE and CPK.

圍繞密鑰管理認證問題基本上形成PKIIBECPK三種技術體系

The link between the ESB and provider services may be secured by network architecture, by ESB credentials or by encryption using PKI.

ESB提供服務之間鏈路可能網絡體系結構ESB憑據使用PKI加密進行保護

Another would be to share a PKI private key among the service providers.

一種解決方案服務提供者之間共享PKI私鑰

PKI provides us with a secured and trusted environment for the conduct of electronic transactions.

基建我們提供一個穩妥可靠環境進行電子交易

This enables you to use a PKI that resembles a third-party certificate vendor, but is less expensive.

使能夠使用第三證書供應商相似PKI成本較低

PKI is entrusted with managing everything related to the creation, manipulation, and management of these keys.

PKI委托管理這些創建處理管理有關一切事情

The SSL protocol provides authentication, data encryption, and data integrity, in a public-key infrastructure (PKI).

SSL協議一個公共密鑰基礎設施提供認證數據加密數據完整性

The authentication model eases bottlenecks for PKI frameworks, while guaranteeing authentication security and integrity.

認證模式緩解PKI瓶頸問題同時較好保證認證安全性完整性

To overcome this limitation and make the scenario more interesting, we decided to carry out a PKI.

為了克服這個限制同時為了這個場景意義我們決定采用PKI

Key generation and distribution are the most vulnerable parts of PKI systems.

產生發布PKI系統易攻擊部分

Certificate Services is required to deploy a Windows PKI and can be installed through Add or Remove Programs in Control Panel.

需要使用證書服務部署WindowsPKI證書服務可以通過控制面板添加刪除程序安裝

This paper studies how the 3G radio access network side PKI applications to achieve the confidentiality of the identity of the user.

本文主要研究如何3G接入應用無線PKI實現用戶身份機密性

This proxy leads to a real thin client and accelerates the application and development of PKI.

通過代理服務器能夠構建出真正公鑰基礎設施PKI客戶端促進PKI應用發展

The criteria can be different for each PKI, but once the CSR is approved, the CA fulfils the request by issuing a certificate.

對于每個PKI標準可能相同批準CSR之后CA通過頒發證書完成請求

to secure the data exchange and payment transactions , the system uses pki technology.

系統使用基建技術保障數據交換付款交易安全

SAML is built on a foundation that requires SSL certificates to provide digital signing and encryption of SAML assertions.

SAML構建需要公鑰基礎結構PKI基礎之上提供數字簽名SAML斷言加密

PKI is the data structure which bind the identity of entity with its public-key.

公鑰證書實體身份公開綁定一起一種數據結構

PKI; sub-Cryptosystem; KMC; Key Management; Certificate Management; Physical security.

密碼子系統KMC密鑰管理證書管理物理安全性

Standards for PKI are still evolving, even though they are being widely implemented as a necessary element of electronic commerce.

PKI標準仍然處于發展之中盡管如此它們仍然廣泛地作為電子商務必要元素進行實施

PKI management services in achieving safety standards, while also help to reduce the management of enterprises and financial burden.

PKI管理服務實現安全標準同時有助于減少企業管理財務負擔

With the designed PKI, any internet entities are provided with mechanisms to get certificates and to verify their authenticity and validity.

借助設計PKI任何互聯網實體得到一些機制用于獲得證書驗證它們真實性有效性

Secondly, the author analyzes briefly the methods of cryptographic technology and the component of PKI correlative with this design.

然后文章設計相關密碼技術基本原理PKI組件簡要介紹予以論述分析

Although the PKI in network security is the most promising, However, it still faces a number of economic and mobility of challenges.

盡管PKI網絡安全方面發展前途仍然面臨著一些經濟流動性方面挑戰

Actually, key management center, which provides key management services, is the crucial part of PKI system.

管理中心PKI信任體系一個至關重要部分證書認證系統提供管理服務

Unfortunately, no system is 100 percent foolproof - not our monetary system, not the banking system, and not a PKI system.

遺憾沒有一個系統100%絕對安全包括我們貨幣系統銀行系統以及PKI系統

PKI can provide code transformation of the digital unit and allows the receiver to judge the source of the data and test its authenticity.

按照上述定義PKI可以提供數據單元密碼變換使接收者判斷數據來源數據進行驗證

A PKI enables users with no prior contact to authenticate each other by accepting the CA as a trusted third party.

PKI使用戶能夠不用提前聯系進行相互身份驗證即可作為信任第三接受CA

This would mean implementing a PKI on a massive scale, something not likely to happen.

意味大規模實施PKI公共加密),不大可能

Download the trusted root certificate for your PKI.

下載PKI信任證書

Storage of personal and confidential materials, e. G. PKI and important commercial information.

儲存個人機密資料比如PKI重要商業信息

Certificate has become the managing tool of PKI. End entity must validate certificate's creditability before communication.

PKI數字證書管理工具終端實體之間進行通信之前必須驗證數字證書可信