单词 | session key |
释义 | BETA Examples ofsession keyDictionary> Examples ofsession key session keyisn’t in the Cambridge Dictionary yet. You can help! Add a definition Intuitively, a password ought to be "more confidential" than asessionkey. From theCambridge English Corpus For example, a user password requires higher protection than asessionkey, which is only used for a single protocol session. From theCambridge English Corpus It could be asessionkey, a short-term key or a long-term key. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0 He may be worried that persons could be forced to hand over a master key rather than, say, asessionkeybecause the authority serving the notice provided insufficient information. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0 Thissessionkeyis then used to encrypt data flowing between the parties. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Version 2.1 of the specification was recently cryptanalyzed and found to have several flaws, including the ability to recover thesessionkey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The important part of thissessionkeywas the rotor positions, not the ring positions. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It uses data such as the passport number, date of birth and expiration date to negotiate asessionkey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It prevents an attacker from collecting large amounts of ciphertext encrypted with one singlesessionkey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Each symmetric key is used only once and is also called asessionkey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The user is then sent a 16-digit hexadecimal code, which is entered as asessionkey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It also features full authentication andsessionkeyestablishment (each encryption session is independent). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The slower asymmetric algorithm securely sends a symmetricsessionkey, and the faster symmetric algorithm takes over for the remainder of the message. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The message and itssessionkeyare sent to the receiver. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. An important property in this context is forward secrecy, so the short-termsessionkeycan not be derived from the long-term asymmetric secret key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Both parties can now derive the samesessionkey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Once all parties have obtained thesessionkey, they can use a much faster symmetric algorithm to encrypt and decrypt messages. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Each recipient then uses the corresponding private key to decrypt thesessionkey. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
随便看 |
|
英汉词典包含213609条英汉翻译词条,涵盖了常用英语单词及词组短语的翻译及用法,是英语学习的必备工具。