pki
推荐文章



abbr.
Public Key Infrastructure 公钥基础设施;
英英释义
PKI
PKI can refer to any of several things:
以上来源于:Wikipedia
权威例句
PKI: it's not dead, just restingAn overview of PKI trust models
公钥基础设施(PKI):实现和管理电子安全
Understanding PKI: Concepts, Standards, and Deployment Considerations
Ten risks of PKI: What you're not being told about Public Key Infrastructure
Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile
Email-Based Identification and Authentication: An Alternative to PKI?
Plasmids encoding PKI(1-31), a specific inhibitor of cAMP-stimulated gene expression, inhibit the basal transcriptional activity of ...
High-level mRNA quantification of proliferation marker pKi-67 is correlated with favorable prognosis in colorectal carcinoma
Classification of typical and atypical antipsychotic drugs on the basis of dopamine D-1, D-2 and serotonin2 pKi values
1. Keys are a critical element of PKI.
密钥是PK i中至关重要的部分。
youdao
2. Included with Domino 6 is a PKI management process.
在Domino6中包括一个PKI管理进程。
youdao
3. How is the asymmetric algorithm type used in PKI?
如何在PK i中使用非对称算法类型?
youdao
4. This is a basis for PKI-based digital signatures.
这是基于 PKI 的数字签名的基础。
youdao
5. We'll use PKI keys and certificates at two levels.
我们将在两个级别中使用PK i密钥和证书。
youdao
6. And then introduced under the PKI authentication.
然后介绍了PK I环境下的认证方式。
youdao
7. Create an abstract layer between the application and the PKI solution.
在应用程序与PK I解决方案之间创建一个抽象层。
youdao
8. New credentials in the underlying PKI are generated using this operation.
可以使用该操作生成底层PKI 中的新凭证。
youdao
9. So, to summarize the use of PKI in XML encryption and XML digital signature...
因此,总结一下PK i在xml加密和XML数字签名中的使用。
youdao
10. The LTPA token is easy to configure compared to a full Public Key Infrastructure (PKI).
与完整的公钥基础结构(PKI)相比,ltpa令牌比较容易配置。
youdao
11. Now, XKMS provides an easy mechanism for using and integrating PKI with applications.
现在,XKMS为使用PKI和将PKI与应用程序集成提供了一种容易的机制。
youdao
12. It is assumed that the reader is familiar with the concepts of PKI and SSL in particular.
假设读者熟悉pki和SSL的概念。
youdao
13. PKI has been around for many years, but has not yet made it into typical it departments.
PKI问世已经有多年了,但是它还没有走进一般的IT部门。
youdao
14. The next topic focuses on another important component of the XML security infrastructure — PKI.
下一个话题是XML安全基础设施的另一个重要部分——pki。
youdao
15. PKI is a proposed standard for public-key certificates, which can provide the safe payment way.
PKI是一种公共密钥证书标准,它提供了一种安全的网上支付方式。
youdao
16. To overcome this limitation and make the scenario more interesting, we decided to carry out a PKI.
为了克服这个限制,同时也为了让这个场景更有意义,我们决定采用 PKI。
youdao
17. PKI is entrusted with managing everything related to the creation, manipulation, and management of these keys.
PKI受委托管理与这些密钥的创建、处理和管理有关的一切事情。
youdao
18. The trusted third party hosts the XKMS service while providing a PKI interface to the client applications.
这个受信任的第三方在提供一个到客户机应用程序的PK i接口的同时驻留了XKMS服务。
youdao
19. It's a game played by children, but it's also a serious attack that can occur on public key infrastructures (PKI).
虽然这是孩子们玩的一个游戏,但却也是在公钥基础设施(PKI)上可能发生的一种很严重的攻击。
youdao
20. PKI consists of two keys — a public key and a private key — used to authenticate the user and encrypt the data.
PK i由两个密钥组成-公钥和私钥-用于认证用户和加密数据。
youdao
21. This may include techniques such as PKI using smart cards, secure tokens, biometrics, or a combination of efforts.
其中可能用到如使用公钥(PKI,Public KeyArchitecture)的智能卡,安全令牌,生物检测或多合一的技术手段。
youdao
22. Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.
公钥-私钥组合是公共密钥基础设施的核心,建立在非对称密码的基础上。
youdao
23. All the XML code points to this vendor's servers to provide information, sort of like a non-public PKI infrastructure.
所有XML程序码都指向该供应商的伺服器以提供讯息,这有点像非公用的PK I基础结构。
youdao
24. On the DB2 UDB server: an X.509 certificate, a PKI environment, and a LIPKEY-enabled server-side GSS-API security plug-in.
在DB2UDB服务器中:一张 X.509证书,一个PKI环境,以及一个支持 LIPKEY 的服务器端GSS-API安全插件。
youdao
25. For an application to use XML encryption and/or digital signature, the application must use or integrate with a PKI solution.
对于一个要使用XML加密和/或数字签名的应用程序来说,它必须使用或者集成一个PKI解决方案。
youdao
26. The criteria can be different for each PKI, but once the CSR is approved, the CA fulfils the request by issuing a certificate.
对于每个PKI,标准可能各不相同,但在批准CSR 之后,CA 将通过颁发证书来完成请求。
youdao
27. The link between the ESB and provider services may be secured by network architecture, by ESB credentials or by encryption using PKI.
ESB和提供者服务之间的链路可能由网络体系结构、ESB凭据或使用 PKI 的加密进行保护。
youdao
28. One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
youdao
29. One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
youdao
pki




