否认 deny; repudiate 否认罪责 deny one's guilt; 坚持否认 persistantly deny; 他断然否认自己有罪。 he stoutly denied his guilt. 你错了, 这是无可否认的。 it cannot be denied that you are wrong. 他没有否认这些事实。 he didn't deny the facts. 我们断然否认这种无理指责。 we categorically reject this groundless charge
With the swift development of internet and electronic commerce , information security became standing out more and more . how to insure authentication , integrity , confidentiality , and non - repudiation of information on web has became a predominant task in domain of information security and electronic commerce 随着internet以及电子商务的飞速发展,信息安全更为令人瞩目。如何保证网络环境下信息的真实性、完整性、机密性和不可否认性已成为信息安全以及电子商务领域研究的主要课题。
Internet - based networking value - added applications ( for instance , e - commerce and e - government ) develop quickly with each passing day . these applications pose new requirements to information security . such new requirements , like fairness and accountability , are beyond of the traditionally basic security requirements such as confidentiality , integrity , non - repudiation and authentication 电子商务、电子政务等基于internet的网络增值应用日新月异,这些应用对信息安全的需求也随之提升,诸如公平性、可追踪性等安全特性就是除了传统的保密性、完整性、非否认性、身份认证等基本安全要求之外的新需求。
Public key infrastructure has become an efficient platform that realizes identity authentication and guarantees secure of internet information transmittance , which provides four technological support : secrecy ? authenticity ? integrality and undeniable feature for internet information transmittance based on the technology of the encryption and digital signature 公钥基础设施( pki )以其所提供的加密和数字签名技术,给internet信息传递提供了机密性、真实性、完整性和不可否认性四大技术支持,成为网络环境下实现身份认证和确保信息传递安全的有效平台。
Some simulation experiments are carried out to verify our conclusions . in order to introduce ibbk model into pki system to resolve inflexibility of trust control and much risk of trust , integrity , authentication , no - repudiation guarantee and time stamp services should be satisfied . this paper designs ibbk trust computation engine of pki combining ibbk trust computing model and trust management model 为了解决pki工程中层次式强制信任模型在信任控制上不灵活、信任风险过大等问题,本文将ibbk信任计算模型应用到pki中,并在完整性保护、身份认证、不可否认性和时间戳服务上进行了安全适应性补充,同时结合信任管理思想详细设计了pki中的ibbk信任计算引擎。
The latter adopts the better cryptography such as ecc , ska , sha - 1 . simultaneity based on special request of government ' s document flow system we adopt perfect security communication protocol to actualize bidirectional authentication in order to actualize status confirmation and to avoid ca thieving user ' s e - mail content 并就公务网络系统的特殊要求,提出了邮件客户端系统gov - securemail与ca之间较完善的安全通信协议,以实现电子邮件的双向不可否认性以及防止ca因为权限过大偷窥用户邮件内容。
How to guarantee the safety of electronic transaction : how to provide the confidentiality guarantee of personal information and sensitive information , the identification of bilateral transaction partners , the data integrality and non - repudiation of transaction , are becoming the urgent matters of the moment 如何保证电子交易的安全性:如何对敏感信息和个人信息提供机密性保障;如何认证交易双方的合法身份;如何保证数据的完整性和交易的不可否认性等,已成为当务之急。
It has some functions such as the certificate or the revoked certificate request , audit , creation , release , store , revoke and archive etc . its realization provides the possibility of the data authenticity , the integrity , the secrecy , the non - denial and so on for the end user 证书认证中心ca是整个证书认证系统的核心,它具有证书/证书撤消列表的申请、审核、生成、签发、存储、发布、注销、归档等功能。它的实现为系统最终用户提供数据真实性、完整性、保密性、不可否认性等安全服务提供了可能。
Finally , we analyzed the security of this system completely which can be used to provide service involving confidentiality , integrality , certificate - based identity authentication and digital signature , etc . this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component , proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method . it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer , which forms a complete military email transferring system 该系统包括证书管理中心和用户端军用电子邮件传输组件两个子系统,提出了“两级加密”和“证书携带”两种方式,以确保系统的机密性及离线方式下的身份认证、密钥分发,利用杂凑函数实现邮件传输的完整性,采用数字签名技术实现了邮件传输的不可否认性,形成了一个完整的军用电子邮件传输系统。
A detailed classification and an accurate definition of the non - repudiation protocols is given . non - repudiation and security of two non - repudiation protocols are analyzed in this paper . the relationships ( difference and similarity ) between the non - repudiation protocols and fair exchange protocols are analyzed in detail 给出不可否认协议的明确定义和详细分类;并分析了两个不可否认协议的不可否认性和存在的安全问题;归纳总结出不可否认协议与公平交换协议之间的区别与联系。