网站首页  词典首页

请输入您要查询的英文单词:

 

单词 public key
释义

public key

美 
英 
  • n.公共密匙
  • 网络公钥;公开金钥;公开密钥
n.
1.
公共密匙
un.
1.
公用密钥

例句

释义:
1.
To ensure uniqueness, the conversion process uses the name, version, and public key from an assembly to produce a LIBID.
为了确保这个唯一性,转换处理序会使用组件的名称、版本和公开金钥来产生LIBID。
technet.microsoft.com
2.
Should an ID become compromised, a new public key can be generated by the creation of a new ID, locking the old ID out of the system.
如果一个ID存在安全危险,那么应该通过创建一个新的ID生成一个新的公钥,在系统中锁定老的ID。
www.ibm.com
3.
This technique makes use of a pair of mathematically related, but different keys - a private key and a public key.
该技术利用一对数学相关但不同的密码匙私人密码匙及公开密码匙。
www.esd.gov.hk
4.
Conversely, if the purchase of the rights to own public key quantifiable terms, that he has no reason not to pay management fees physics?
反过来,如果购房者对自己拥有公共部位的权益可以量化计算,那他有什么理由不缴纳物理管理费呢?
dictsearch.appspot.com
5.
Note : The public key subsystem is used for managing public keys on a server to which the client is already authenticated .
注意:公钥系统用于管理服务器上的客户已经被认证的公钥。
www.bing.com
6.
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
www.ibm.com
7.
Which passes the name of the file containing the public key as a parameter to its constructor.
它将包含公钥的文件的名称作为参数传递至其构造函数。
msdn2.microsoft.com
8.
A strong name token is the shortened form of a public key used to save space when storing key information in metadata.
强名称标记是公钥的简写形式,在元数据中存储密钥信息时使用该标记可节省空间。
msdn2.microsoft.com
9.
This encrypted part can only be read by the receiver with the private key corresponding to the public key that was used to encrypt the data.
只有当接收者具有与加密数据时使用的公钥相对应的私钥时,才能阅读这部分被加密的数据。
www.ibm.com
10.
The public key is often available, but access to the private key is restricted to only a few individuals.
公钥通常是可用的,但对私钥的访问权仅限于少数个人。
www.kuenglish.info
1.
RSA cryptosystem, a public-key cryptosystem being used widely today, seems to have difficulty in meeting the user'need of higher security.
现在广泛使用的RSA公钥密码系统已很难满足未来人们对信息高安全性的需求。
www.fabiao.net
2.
In order for your package manager to be able to check this, you need the public key that corresponds to the signatures.
如果想让您的软件包管理器能够校验它,您需要签名所对应的公共密钥。
translations.launchpad.net
3.
Digital signatures require the use of two distinct but mathematically-related encryption keys known as a public key and a private key.
数字签名需要使用两个密钥一个是公钥一个是私钥。
www.cocoachina.com
4.
The reciprocal nature of the relationship of the key pair makes this unique identification possible through public key cryptography.
密钥对关系中的互补性本质使得通过公钥加密实现这种唯一标识成为可能。
technet.microsoft.com
5.
Each HDCP device (e. g. , a DVD player) has baked into it a public key and the corresponding private key.
每一个HDCP设备(如DVD播放器)都被烧入了一个公钥和一个私钥。
www.bing.com
6.
The server generates a pair consisting of a random public key and a private key using a set of key model parameters .
服务器使用一组密钥模型参数生成由一个随机公钥和一个私钥组成的密钥对。
www.bing.com
7.
The certificate's friendly name refers to a pair of public and private keys. The public key is stored in the certificate.
证书好记的名称涉及一个公钥和私钥对。公钥保存在证书中。
www.dictall.com
8.
The public key can be made available to anyone; this key is used for encoding data to be sent to a receiver.
公钥可以提供给任何人;此密钥用于对要发送给接收者的数据进行编码。
www.kuenglish.info
9.
As long as the private key remains secret, the public key can be given to any number of people and used securely.
只要私钥是保密的,就可以随意分发公钥,并让人们放心地使用它。
technet.microsoft.com
10.
Should be specified as the string of hexadecimal digits representing the tokenized form of the public key.
应指定为十六进制数字的字符串以表示标记形式的公钥。
www.kuenglish.info
1.
PKI consists of two keys -- a public key and a private key -- used to authenticate the user and encrypt the data.
PKI由两个密钥组成-公钥和私钥-用于认证用户和加密数据。
www.ibm.com
2.
The public key can be made available to anyone ; it is used for encrypting data to be sent to the keeper of the private key .
公钥可以提供给任何人;公钥用于对要发送到私钥持有者的数据进行加密。
www.bing.com
3.
In a public-key cryptosystem, plaintext encrypted with the public key can only be deciphered with the private key from the same pair.
在公开密钥密码系统中,用明匙加密的普通文本只能由同一对钥匙中的秘密密钥解密。
www.hotdic.com
4.
While the public key might be available, access to the private key is restricted to a few individuals.
虽然可能提供公钥,但对私钥的访问权限只限于少数几个人。
msdn2.microsoft.com
5.
Certification authorities (CAs ) are the central component of the public key infrastructure ( PKI ) of an organization .
证书颁发机构(CA)是某组织公钥基础结构(PKI)的中心组件。
www.bing.com
6.
For full dialog security, each side of the conversation contains a private key for a local user and a public key for a remote user.
对于完全对话安全模式,每一会话端都包含本地用户的私钥和远程用户的公钥。
msdn2.microsoft.com
7.
Among the various ways of doing this, the most widely used is to have one or more trusted third parties vouch for the public key.
实现此目的的方法有许多种,其中最常用的是对公开密匙使用一个或多个可靠的第三方证明。
www.ibm.com
8.
It is possible to specify a public key and a KeyPair with inconsistent values.
指定的公钥和KeyPair值可以不一致。
msdn2.microsoft.com
9.
Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest.
使用强式名称签署组件,就会将公开金钥加密加入含有组件资讯清单的档案中。
msdn.microsoft.com
10.
The identity may be represented as the name of the recipient, the public key certificate of the recipient, or in some other way.
该身份可以用接收方的名字、接收方的公用密钥证书或以其它方式来表示。
www-128.ibm.com
1.
Note that decryption uses the corresponding private key of the public key used for encrypting the XML.
请注意,解密过程使用的是加密XML时使用的公钥所对应的私钥。
www.ibm.com
2.
Each node encrypts its copy of the symmetric key using the public key of a key pair specific to its Windows service account.
每个节点都使用Windows服务帐户专有密钥对的公钥来加密对称密钥的副本。
msdn2.microsoft.com
3.
At this point, your keystore contains your private key as well as your public key certificate.
这时,您的密钥库中包含了您的私有密钥及您的公钥证书。
www.ibm.com
4.
The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。
www.ibm.com
5.
A familiar example of a signed security token is an X. 509 certificate; it asserts a binding between one's identity and a public key.
证书就是一个熟悉的已签名安全令牌例子;它断言某人的身份和公钥之间的绑定关系。
www.ibm.com
6.
A security certificate associates an identity with a public key, and only the owner of the certificate knows the corresponding private key.
安全证书将标识与公钥关联,只有证书的所有者知道对应的私钥。
technet.microsoft.com
7.
This signature attests to the validity of the binding between the public key and the identifier information of the subject.
此签名用于证明主题的公钥和标识符信息之间的绑定的有效性。
msdn2.microsoft.com
8.
Instructs the compiler to add the public key but to leave the assembly unsigned.
指示编译器添加公钥,但将此程序集保留为未签名状态。
msdn2.microsoft.com
9.
Remote Assistance connection could not be established because the public key provided in this connection request did not match.
远程协助连接无法建立因为此连接提供的公钥不匹配。
www.drados.com
10.
The security of public-key cryptography depends on factorization or other difficult mathematical problems.
这种技术之所以安全,是因为应用了因数分解或其他困难的数学问题。
edba.ncl.edu.tw
1.
The message is encrypted using your private key, and only recipients that have the associated public key will be able to view the e-mail.
邮件是经过你的私钥加密的,只有拥有与之相关公钥的收件人才能查看邮件。
www.bing.com
2.
It consists of a client with no public key certificate, accessing a server with a public key certificate.
其包括一台没有公钥证书的客户机,该客户机通过公钥证书访问服务器。
www-128.ibm.com
3.
The decrypting party must have access to the private key associated with the public key used to encrypt the message.
而解密方必须有权使用与用于加密消息的公钥关联的私钥。
www-128.ibm.com
4.
First, add the Apache Pluto public key to your public key ring by entering the command shown in the top line of Listing 1.
首先,通过输入清单1顶部一行所示的命令,把ApachePluto的公共密钥添加到您的公共密钥环。
www.ibm.com
5.
Signs the resulting control with a strong name using the public key found in the file specified by filename.
使用在filename所指定的文件中找到的公钥,用强名称对结果控件进行签名。
msdn2.microsoft.com
6.
This option does not verify that the input is only a public key.
此选项不验证输入的是否只是公钥。
msdn2.microsoft.com
7.
A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.
签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。
www.ibm.com
8.
GFD-16 outlines the set of questions you need to ask when setting up a Public Key Infrastructure.
GFD-16对构建公钥基础设施时需要询问的问题进行了总结。
www-128.ibm.com
9.
Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption.
公钥加密湜使苚弌对非对称菂密钥加密或解密菂技术。
jiaocheng.gdjob168.com
10.
Property to determine whether the current instance contains only a public key or both a public and private key.
属性确定当前实例仅包含公钥还是同时包含公钥和私钥。
msdn2.microsoft.com
1.
Have the system administrator check on the state of the domain's public key infrastructure.
请求系统管理员检查域公钥结构的状态。
support.microsoft.com
2.
Class using a public key, a hash algorithm identifier, and a value indicating whether the extension is critical.
使用一个公钥、一个哈希算法标识符和一个指示扩展是否重要的值初始化。
msdn2.microsoft.com
3.
With public-key cryptography, a party wanting to receive encrypted messages creates a pair of key values.
使用了公开密匙加密后,希望接收已加密消息的一方将创建一对密匙值。
www.ibm.com
4.
The public-key system uses a pair of mathematically related sequences, one each for encryption and decryption [1].
公钥系统采用一对数学上相关的序列,一个用于加密,另一个用于解密。
www.ltesting.net
5.
Asymmetric keys are used in public-key cryptography, which uses two keys, a public key and a private key, which are related mathematically.
非对称密钥用于公钥加密,公钥加密使用两个密钥,即在数学上相关的一个公钥和一个私钥。
technet.microsoft.com
6.
Has also been specified, it is likely that this file will only contain the public key.
此文件将可能仅包含公钥。
msdn2.microsoft.com
7.
This class can be flexibly used in VB to implement such cryptography algorithms as Symmetric Key, Public Key and Digital Signature.
使用该类可方便地在VB应用程序中实现对称密钥、公开密钥和数字签名算法,并且不受中英文编码方式的限制。
www.dictall.com
8.
A full assembly reference includes the assembly's text name, version, culture, and public key token (if the assembly has a strong name).
完全的程序集引用包括程序集的文本名称、版本、区域性和公钥标记(如果程序集具有强名称)。
msdn2.microsoft.com
9.
The abbreviated form of the public key associated with this strongly named assembly.
与此强名称程序集关联的公钥的缩写形式。
msdn2.microsoft.com
10.
Strong-named assemblies have identifiers consisting of the assembly's identity plus a public key and a digital signature.
强名称程序集具有由程序集的标识以及公钥和数字签名组成的标识符。
msdn2.microsoft.com
1.
The next logical question is, "How is the authorized_keys file filled in with the public key that's stored with Amazon? "
下一个逻辑问题是:“authorized_keys文件如何使用存储在Amazon中的公共密匙填充?”
www.ibm.com
2.
If access is based entirely on self-signed certificates, deleting the public key of a certificate from the trust store revokes its access.
如果访问完全基于自签名证书,则从信任存储区中删除证书的公钥将撤销其访问权。
www.ibm.com
3.
The digital signature on a public key certificate can validate the authenticity of the public key and therefore the party who holds it.
公钥证书上的数字签名可以验证该公钥的可靠性以及持有它的那一方的可靠性。
www.kuenglish.info
4.
Be signed with a strong name using standard public key cryptography.
使用标准公钥密码系统用强名称签名。
msdn2.microsoft.com
5.
If Bob wants to send Alice an encrypted message, he asks her for her public key.
如果小明想要给小红发送一条加密的消息,他将向她索要她的公钥。
msdn2.microsoft.com
6.
First, we will use the Keytool to create a keystore, in which there will be a pair of keys (the public key and the private key).
首先,我们使用Keytool创建一个keystore,它包含一对密匙(公共密匙和私有密匙)。
www.ibm.com
7.
for strongly named assemblies , equivalency requires the assembly name , version , public key token , and culture to be identical.
对于具有强名称的程序集,等效性要求程序集名称、版本、公钥标记和区域性均应相同。
www.ichacha.net
8.
The public key is called "public" for a reason.
公用密钥之所以被称作是“公用的”有一个原因。
www-128.ibm.com
9.
In the case of a self-signed certificate, it is the certificate's own public key that must exist in the trust store.
如果是自签名证书,则该证书本身的公钥必须存在于信任存储区中。
www.ibm.com
10.
By the way, as mentioned in Part 3 of this series, your . ssh directory must be private to you, or your public key access won't work.
另外,正如本系列的第3部分中所提到的,您的.ssh目录必须是您私有的,否则您的公钥访问无法正常工作。
www.ibm.com
1.
The secret key in a Public Key Cryptography system, used to decrypt incoming messages and sign outgoing ones.
公共密钥密码系统中的保密的密钥,用于对到来的消息解密和对外出的消息签名。
kajaa.bbs.us
2.
Asymmetric algorithms require the creation of a public key and a private key.
不对称算法要求创建一个公钥和一个私钥。
msdn2.microsoft.com
3.
Any other user who wants to send an encrypted message can get the intended recipient's public key from a public directory.
其他想要发送加密信息的用户可以从公共目录收到接收者的公钥。
wiki.mycreative.com.cn
4.
Specifies a file that contains a key pair or just a public key to sign an assembly.
指定文件,该文件包含密钥对,或只包含用于对程序集进行签名的公钥。
msdn2.microsoft.com
5.
A message encrypted by the private key can only be correctly decrypted by the corresponding public key.
用私钥加密的消息只能由相应的公钥正确解密。
www-128.ibm.com
6.
with supercomputers . By breaking the RSA public-key code, you could use the compromised key to spend money more than once.
破解了RSA的公钥密码,你就可以用密钥消费不止一次,直到银行收到数据,把你抓住。
dictsearch.appspot.com
7.
In public-key or two-key encryption, a key pair is used for encryption and decryption.
公钥加密是使用一对非对称的密钥加密或解密的技术。
www.dictall.com
8.
The public key is now available for the provider gateway to use in signature verification.
公共密钥现在可供提供者网关在签名验证中使用。
www.ibm.com
9.
The public key distributed with XML digital signatures can be wrapped in XML Key Management Specification (XKMS) formats.
可以用XML密钥管理规范(XMLKeyManagementSpecification(XKMS))格式封装与XML数字签名一起分发的公钥。
www.ibm.com
10.
The public key with which this deployment manifest has been signed.
对此部署清单进行签名时使用的公钥。
msdn2.microsoft.com
1.
For a partially specified strong name, create an AssemblyName object using the default constructor and set the name and public key.
对于部分指定的强名称,使用默认构造函数创建AssemblyName对象并设置名称和公钥。
msdn2.microsoft.com
2.
Jethro finds Ellie's public key published via a digital certificate in the directory and sends her a message.
Jethro通过目录中的数字证书发现Ellie的公开密钥并向她发送一条消息。
www.ibm.com
3.
Public- key algorithms can be used to create digital signatures to verify the identity of the sender of data .
公钥算法可用于创建数字签名以验证数据发送方的身份。
www.bing.com
4.
At run time, the data digest is decrypted with the public key and compared with the hash value of the stored procedure.
在运行时,数据摘要将使用公钥解密并与存储过程的哈希值进行比较。
technet.microsoft.com
5.
These methods retrieve the model and key parameters , which are necessary to reconstruct the public key object .
这些方法检索模型和密钥参数,它们是重新构造公钥对象所必需的。
www.bing.com
6.
Based on the public key cryptosystems, the protocol implements mutual authentication and is of high security and efficiency.
该协议基于公钥体制实现双向认证,安全性好且运行效率高。
www.jukuu.com
7.
Remove all certificates that are currently there and add the VeriSign private certificate and was_jms_client public key.
删除其中现有的全部证书,然后添加VeriSign个人证书和was_jms_client公钥。
www.ibm.com
8.
Identity-based cryptography is a rapidly emerging approach to public-key cryptography that public keys can be arbitrary identifiers.
基于身份加密是一种以用户的身份标识符作为公钥的加密体制。
www.ceaj.org
9.
The private key must be kept private by the receiver; this key is used for decoding messages encoded using the receiver's public key.
私钥必须由接收者秘密保存;此密钥用于对使用接收者的公钥编码的消息进行解码。
msdn2.microsoft.com
10.
Creates a strong name token from the specified assembly file, and returns the public key.
从指定的程序集文件创建强名称标记,并返回公钥。
msdn2.microsoft.com
1.
Creates a strong name token from the specified assembly file, and returns the public key.
从指定的程序集文件创建强名称标记,并返回公钥。
msdn2.microsoft.com
2.
The complete server certificate consists of two parts: a public key and a private key.
完整的服务器证书包括两个部分:公钥和私钥。
www.ibm.com
3.
Specifies the name of an assembly from which to load the public key.
指定从中加载公钥的程序集的名称。
msdn2.microsoft.com
4.
Alice does not use her private key to encrypt a reply message to Bob, because anyone with the public key could decrypt the message.
小红不使用她的私钥加密给小明的答复消息,原因是任何具有公钥的人都可以解密该消息。
msdn2.microsoft.com
5.
When looking at this picture, take note that the client must possess the certificate that signed the generated public key of the server.
在查看此图时,请注意客户端必须持有证书,它签署了服务器产生的公钥。
www-128.ibm.com
6.
Public-key encryption The key distribution problem has always been the weak link in the secret-key systems.
公钥加密密钥的分布问题在秘钥系统中一直是一个薄弱环节。
net.sxtcm.com
7.
Class using a public key and a value indicating whether the extension is critical.
使用一个公钥和一个标识扩展是否重要的值初始化。
msdn2.microsoft.com
8.
These are usually in the form of a public key certificate with an associated private key.
通常采用具有关联的私钥的公钥证书形式。
msdn2.microsoft.com
9.
Ensure that the public key of the Web server is copied and installed in the client browser, if SSL authentication is enabled in Web server.
如果在Web服务器上启用了SSL身份验证,那么要确保Web服务器的公共密钥被复制并安装在客户机浏览器上。
www-128.ibm.com
10.
Using self-signed certificates requires the Web server plug-in and application server to trust each other by exchanging the public key.
使用自签名证书要求Web服务器插件和应用服务器通过交换公共密钥来实现相互信任。
www-128.ibm.com
1.
The public-key cryptology is widely adopted for the information security on the electrical business, internet communication etc.
公开密钥密码体制广泛应用于电子商务、电子政务、身份认证、网络通信中,起着不可替代的作用。
www.fabiao.net
2.
The sender of the message uses the public key of the receiver to encrypt the message to be sent.
消息的发送方使用接受方的公钥加密消息并发送。
www-128.ibm.com
3.
The "private key" allows the owner to make a "digital signature" or decrypt information encrypted with the corresponding "public key. "
“私钥”允许所有者进行“数字签名”或解密用相应“私钥”加密的信息。
www.dictall.com
4.
The assembly name must be fully qualified with the version, culture, and public key token of the assembly.
必须使用程序集的版本、区域性和公钥标记完全限定程序集名称。
msdn2.microsoft.com
5.
Then each party combines its own private key with the other party's public key, to get a shared secret key.
然后A和B各自把自己的私钥和对方的公钥拼起来,就够成了一个共享的密钥。
www.bing.com
6.
The security header contains a signature that cannot be validated with the certificate's public key.
无法通过证书的公钥来验证安全标头的签名。
msdn2.microsoft.com
7.
As such, the example requires that the public key certificate be in two stores.
同样,该示例要求两个存储中均包含公钥证书。
msdn2.microsoft.com
8.
The public key does not meet the minimum size required by the specified certificate template.
私钥不符合指定的证书模板要求的最小值。
www.fan6.net
9.
The public key is to have a role that can be released and distributed as a digital certificate and the private key is kept secret.
公钥的作用是产生可以公布和分发的数字身份证书,而私钥是保密的。
www.brar.cn
10.
Most corporations do not need the level of email security provided by PGP or built-in public key encryption in most email systems.
大多数企业的大多数电子邮件系统不需要PGP或内置公匙加密提供的电子邮件安全级别。
blog.sina.com.cn
1.
Use this parameter to specify the size (in bits) of the RSA public key associated with the certificate that you are creating.
使用此参数可以指定与要创建的证书关联的RSA公钥的大小(位)。
technet.microsoft.com
2.
Class can be initialized either with a public key only or with both a public and private key.
类可以仅使用公钥或同时使用公钥和私钥进行初始化。
msdn2.microsoft.com
3.
Anyone with access to the public key can use it to encrypt messages, which can then be decrypted only by the key owner.
任何访问这个公开密匙的人都可以用它加密消息,而只有密匙所有者才能够对消息解密。
www.ibm.com
4.
The compiler inserts the public key into the assembly manifest and reserves space in the PE file for the full strong name signature.
编译器将公钥插入程序集清单,并在PE文件中为完整的强名称签名保留空间。
msdn2.microsoft.com
5.
A digital certificate is basically a wrapper around a public key, which includes identifying information for the party owning that key.
数字证书实质上就是一个包装公开密匙的包装器,其中包含了用于密匙所有方的识别信息。
www.ibm.com
6.
There are only a few self-certified public key signatures of which the efficiency needs to be improved.
现有的使用双线性对的自认证公钥签名的文献数量少,效率也有待进一步提高。
www.ceps.com.tw
7.
If the assemblies are delay signed, the build computer must have the verification skipped for the public key.
如果延迟对程序集签名,则生成计算机必须跳过对公钥的验证。
msdn2.microsoft.com
8.
Conversely, plaintext encrypted with the private key can be decrypted only with the public key.
相反,用秘密密钥加密的普通文本只能由公开密钥解密。
hotdic.com
9.
The SSL protocol provides authentication, data encryption, and data integrity, in a public-key infrastructure (PKI).
SSL协议在一个公共密钥基础设施中提供认证、数据加密和数据完整性。
www.ibm.com
10.
The CA is not needed to verify the owner of the public key - the presence in that domain's DNS is the verification.
证不需要验证公钥主人-驻留在该领域的域名是核实。
www.dnwt.cn
1.
The private key enables the owner to make a digital signature or decrypt information encrypted with the corresponding public key.
证书所有者可以使用私钥进行数字签名,或解密使用对应的公钥加密的信息。
technet.microsoft.com
2.
This member makes a link demand for the ECMA public key, which is not a valid cryptographic key but a pseudo key.
此成员要求链接到ECMA公钥,此公钥不是一个有效的加密密钥,而是一个伪密钥。
msdn2.microsoft.com
3.
In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.
公钥加密方案的匿名性(亦称公钥隐密性)与数据保密性同样具有重要应用价值。
www.dictall.com
4.
This includes any version, culture, and public key information if the containing assembly is in the global assembly cache.
如果包含程序集在全局程序集缓存中,则这包括所有的版本、区域性和公钥信息。
msdn2.microsoft.com
5.
When you connect to a server, the server can encrypt a message with the public key stored in the authorized_keys file.
当您连接到服务器时,服务器能够使用authorized_keys文件中存储的公共密匙加密一条消息。
www.ibm.com
6.
Indicates the public key token used to identify the referenced assembly.
指示用于标识引用的程序集的公钥标记。
msdn2.microsoft.com
7.
The public key cannot be reverse-engineered to get the private key, and the private key is known only to the receiver.
您不能对公钥进行逆向工程以获取私钥,而且只有接收方知道私钥。
www.ibm.com
8.
These two roles would usually be assumed by different entities that have unique public key credentials, often on different computers.
通常,这两个角色是由不同计算机上具有唯一公钥凭据的不同实体充当。
msdn2.microsoft.com
9.
Primary interop assemblies must be signed with strong names using standard public key cryptography.
必须使用标准公钥密码系统用强名称为主Interop程序集进行签名。
msdn2.microsoft.com
10.
An SSH-based identity consists of two parts: a public key and a private key.
一个基于SSH的身份包括两个部分:一个公钥和一个私钥。
www.ibm.com
1.
The identity of an assembly consists of its name, version, culture, and public key token.
程序集的标识由程序集的名称、版本、区域性和公钥标记组成。
msdn2.microsoft.com
2.
The public key must be stored on the target machine to complete the public-private key combination.
为了完成公共-私有密钥组合,必须把公共密钥存储在目标机器上。
www.ibm.com
3.
For signing messages, you encrypt the signature with your private key, so only your public key can unlock it.
对签名信息,你用你的私钥加密签名,那只有你的公钥才能解开它。
firehare.blogchina.com
4.
Unlike public-key cryptography, quantum cryptography should remain secure when quantum computers arrive on the scene.
量子密码术和公开金钥加密法的差别在于,前者在量子电脑出现后仍然牢不可破。
edba.ncl.edu.tw
5.
The public key from this certificate is used for encryption and authentication of messages exchanged with the remote service.
此证书的公钥用于对与远程服务交换的消息进行加密和身份验证。
msdn2.microsoft.com
6.
The strong name signature of an assembly consists of the text name, version, culture, and public key token.
程序集的强名称签名由文本名称、版本、区域性和公钥标记组成。
msdn2.microsoft.com
7.
Using the public key acquired from the computer, the client computer encrypts print data and transfers the encrypted data to a printer.
使用从服务器处获取的密钥,打印机控制器解密被加密的打印数据并执行打印。
www.bing.com
8.
The model and key parameters, which are necessary to reconstruct the public key object.
模型以及密钥参数,它们是重新构造公钥对象所必需的。
www-128.ibm.com
9.
If you want the public key added to the assembly manifest but want to delay signing the assembly until it has been tested.
如果要将公钥添加到程序集清单但是希望延迟签名程序集直到程序集经过测试,则使用。
msdn2.microsoft.com
10.
Usually modular inverse operation becomes bottlenecked in realizing the public key cryptosystem.
公钥密码实现中,模逆算法经常是算法实现的瓶颈。
www.dictall.com
1.
Anonymity(key-privacy) as well as data-privacy are all important features in public-key encryption applications.
公钥加密方案的匿名性(亦称公钥隐密性)与数据保密性同样都具有重要应用价值。
www.dictall.com
2.
In its default form, this entity contains both a public key and a private key.
该实体的默认格式包含公钥和私钥。
msdn2.microsoft.com
3.
Gets or sets the public key value of the strong name identity expressed as a hexadecimal string.
获取或设置用十六进制字符串表示的强名称标识的公钥值。
msdn2.microsoft.com
4.
Public key system, single direction Hash function, certificate authority organization and public key management are introduced.
本文介绍了公开密码加密体制、单向散列函数、认证机构和公钥管理等。
www.elecfans.com
5.
Authentication is done through user name and password with digital certificates in a public key infrastructure.
利用公共密钥结构中的数字证书,通过用户名和密码进行验证。
www.carestreamhealth.com
6.
The transport- layer security standard overcomes the inefficiencies associated with public- key cryptography .
传输层安全性标准解决了与公共密钥加密技术关联的效率低下问题。
www.bing.com
7.
In essence, the public key acts as a Certificate Authority that has issued exactly one certificate.
实际上,该公钥相当于颁发该证书的证书颁发机构。
www.ibm.com
8.
Thus, the user identifier comprises a user symbol and a user decrypting sender public key.
这样,用户标识包含一个用户符号和一个用户解密发送者公用密钥。
www.hgpf114.com
9.
The message encryption key is then encrypted with the public key of each recipient.
然后通过每个收件人的公钥对该消息加密密钥进行加密。
msdn2.microsoft.com
10.
The public key from the publisher if the assembly has been given a strong name.
如果已经为程序集提供了一个强名称,则为来自发行者的公钥。
msdn2.microsoft.com
1.
We attach on the public key cryptosystem and use RSA cryptosystem to deliver the meeting's key.
分析了公开密钥加密方法,并采用RSA算法传递会议密钥。
www.fabiao.net
2.
Signature validation is not possible because public key is missing or incompatible encryption methods were used.
无法进行签名验证,因为公共密钥丢失或使用了不兼容的加密方法。
office.microsoft.com
3.
These means that they all have the same public key as part of their strong name and were signed by the same private key.
这意味着它们的强名称都包含相同的公钥,并且它们都由同一私钥签名。
msdn2.microsoft.com
4.
If the public key token, version, or culture is specified in the partial reference, the runtime attempts to match that value exactly.
如果在部分引用中指定了公钥标记、版本或区域性,则运行库会尝试精确匹配该值。
msdn2.microsoft.com
5.
Common authentication methods include password, public key, keyboard-interactive, GSSAPI, SecureID, and PAM.
常见的身份验证方法包括密码、公钥、键盘交互、GSSAPI、SecureID和PAM。
www.ibm.com
6.
Two byte arrays are initialized that represent the public key of a third party.
初始化表示第三方公钥的两个字节数组。
msdn2.microsoft.com
7.
Specifies the public key used to sign the generated assemblies.
指定用于为所生成程序集签名的公钥。
msdn2.microsoft.com
8.
The difficulty of utilizing public key broadcast encryption in secure multicast is keep balance between implementation cost and security.
应用公钥广播加密进行安全组播的难点是如何更有效地权衡实现代价和安全性。
www.joca.cn
9.
Canonical string that encodes the simple name, version number, culture, public key, and architecture of the assembly.
对程序集的简单名称、版本号、区域性、公钥以及体系结构进行编码的规范字符串。
msdn2.microsoft.com
10.
Modular inversion is a part of the kernel for computations in the Galois field GF(p) used by many public key cryptosystems.
有限域上的模逆运算是许多公钥密码系统使用的算法中的核心域运算之一。
www.dictall.com
1.
Normally the web service client will import this public key into its trust store and use it to generate a personal certificate key request.
通常,Web服务客户机将把此公钥导入其信任存储,然后用它来生成个人证书密钥请求。
www.ibm.com
2.
The administrator distributes the certificate that contains the public key of the key pair to vendors that need to access the service .
管理员将包含密钥对中的公钥的证书分发给需要访问该服务的供应商。
www.bing.com
3.
The difficulty of overcoming a public-key cipher may hold secret keys secure for a decade or more.
由于破解公开金钥加密法很困难,因此在未来10年甚至更久,密钥的安全性仍旧很高。
edba.ncl.edu.tw
4.
Public key algorithms can also be easily broken by chosen plaintext attacks when the domain of the encrypted data is relatively small.
如果被加密的数据范围相对比较小的话,公共密钥算法也比较容易受到选择明文攻击。
www-128.ibm.com
5.
A certificate binds a public key to the identity of the person, computer, or service that holds the corresponding private key.
证书将一个公钥与持有相应私钥的个人、计算机或服务的身份绑定在一起。
technet.microsoft.com
6.
Many encryption packages that are basically secret-key systems use public-key encryption to communicate the secret session keys.
很多基本上是秘钥系统的加密软件包采用明钥加密,来传送秘密的会话密钥。
www.hotdic.com
7.
Thus, if one encrypts a message using the public key of an entity, then it is guaranteed that only the entity can decrypt the message.
这样,如果使用实体的公钥加密消息,那么可以保证只有该实体能够解密此消息。
www.ibm.com
8.
The compiler inserts the public key into the assembly manifest and then signs the final assembly with the private key.
编译器将公钥插到程序集清单中,然后用私钥对最终的程序集进行签名。
msdn2.microsoft.com
9.
Public key cookie needs to be created and inserted into the keystore on server side.
在服务器端,需要创建公共密钥cookie并把它插入密钥存储库中。
www.ibm.com
10.
This approach involving private and public key pairs is also known as public key cryptography.
这种涉及到私钥和公钥对的方式也被称作公钥密码术。
www.ibm.com
1.
The client generates a key pair and provides the public key, along with other information, to the service provider for registration.
客户机生成一个密钥对,并将公钥和其他信息一起提供给服务提供程序,以便注册。
www-128.ibm.com
2.
In the following example involving Alice and Bob, public key cryptography is easily used to verify identity.
在下列例子中包括甲和乙,公钥加密会轻松地校验身份。
www.winu.cn
3.
This command removes only the hello assembly that matches the fully specified version number, culture, and public key.
该命令只删除与完全指定的版本号、区域性和公钥匹配的hello程序集。
msdn2.microsoft.com
4.
The following figure shows the sequence of signing and encrypting with the addition of the supporting elements of public key cryptography.
下图显示在添加了公钥加密的支持元素的情况下进行签名和加密的顺序。
technet.microsoft.com
5.
Typically for one-to-one interactions we use the service public key to encrypt information (and provide confidentiality).
对于一对一交互,我们通常使用服务公钥来加密信息并提供机密性。
www.ibm.com
6.
Delay signing provides the public key and defers adding the private key until the assembly is handed off .
延迟签名可以提供公钥并延迟添加私钥,直至程序集提交为止。
www.bing.com
7.
The only way to guarantee that the public key signature is from the owner is for the owner to hand you the key on a disk, in person.
保证公共密钥签名来自所有者的惟一方法是,密钥的所有者亲自把磁盘上的密钥交给您。
www.ibm.com
8.
The linker inserts the public key into the assembly manifest and then signs the final assembly with the private key.
链接器将公钥插入程序集清单中,然后用私钥对最终的程序集进行签名。
msdn2.microsoft.com
9.
But when multiple service providers come into play, the question is "whose public key will the system encrypt with? "
但当涉及多个服务提供者时,问题就成了“系统将使用谁的公钥进行加密?”
www.ibm.com
10.
When overridden in a derived class, sets the public key to use for verifying the signature.
当在派生类中重写时,设置用于验证签名的公钥。
msdn2.microsoft.com
1.
Is the hexadecimal form of the public key token.
是公钥标记的十六进制形式。
msdn2.microsoft.com
2.
Public-key cryptographic algorithms use a fixed buffer size whereas secret-key cryptographic algorithms use a variable-length buffer.
公钥加密算法使用固定的缓冲区大小,而私钥加密算法使用长度可变的缓冲区。
msdn2.microsoft.com
3.
The public key used to sign the catalog must be 2048 bits or greater.
用于对目录进行签名的公钥必须至少为2048位。
msdn2.microsoft.com
4.
Public key generated by the content packager and delivered to the license issuer to use when verifying the header .
公钥由内容打包者生成并转交给许可分发者校验文件头。
www.bing.com
5.
Thus, the private key cannot be determined from the public key.
因此,不能根据公钥确定出私钥。
technet.microsoft.com
6.
PKI is the data structure which bind the identity of entity with its public-key.
公钥证书是将实体的身份和公开密钥绑定在一起的一种数据结构。
www.fabiao.net
7.
Manages the Certification Authority service, which issues certificates for public key security programs.
管理“证书颁发机构”服务,该服务为公钥安全计划颁发证书。
www.dictall.com
8.
OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.
OpenSSH支持两种类型的加密,即基于主机的认证和公钥认证。
www-128.ibm.com
9.
Although good conventional and public-key algorithms are both considered strong, their respective key lengths for security vary.
虽然良好的常规和公开钥匙算法都被认为是强有力的,但它们用于安全的各自密钥的长度是不同的。
www.jukuu.com
10.
or ssh-rsa for RSA encryption, where will be the host's public key and is typically a very long string.
对于RSA加密,文件的内容类似于ssh-rsa,其中将会是主机的公钥,它通常是一个很长的字符串。
www.ibm.com
1.
The shared secret key itself is encrypted using the public key you created in the previous step, and is embedded in the XML content.
共享密钥本身使用上一步生成的公钥加密并嵌入XML内容中。
www-128.ibm.com
2.
When your public key is used to encrypt a message, only you (as the holder of the private key) can decrypt that message.
当使用您的公开密匙对消息进行加密,那么只有您(即私有密匙的持有者)才能够解密消息。
www.ibm.com
3.
Class represents information associated with a public key.
类表示与公钥关联的信息。
msdn2.microsoft.com
4.
To use public-key cryptography to digitally sign a message, Alice first applies a hash algorithm to the message to create a message digest.
为了使用公钥加密对消息进行数字签名,小红首先将哈希算法应用于该消息以创建消息摘要。
msdn2.microsoft.com
5.
A comma-separated string value specifying the version, culture, and public-key tokens of an assembly.
以逗号分隔的字符串值,指定程序集的版本、区域性和公钥标记。
msdn2.microsoft.com
6.
Commands A through C create the private . ssh directory, and Step D adds the public key to the list of authorized keys.
命令A到C创建了私有的.ssh目录,而步骤D则将公钥添加到授权密钥列表中。
www.ibm.com
7.
Public-key Cryptosystems is one of the most important academic researches in the modern cryptography.
公钥密码算法是现代密码学中最重要的研究内容之一。
www.fabiao.net
8.
A private key can also be used to encrypt a message that can only be decrypted using the corresponding public key.
专用密钥也能用来对只能用相应公钥解密的讯息进行解密。
www-128.ibm.com
9.
Must be a public key previously generated from a key pair file using.
从密钥对文件生成的公钥。
msdn2.microsoft.com
10.
If the digest does not match, the message is rejected before any public key algorithm is performed.
如果该摘要不匹配,则在执行任何公钥算法之前拒绝该消息。
www-128.ibm.com
1.
Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms.
大多数数位签章系统将公钥密码学和密码杂凑演算法结合使用。
www-128.ibm.com
2.
The speed of modular squaring is the key to the secure application in most public key cryptosystems and DSP(digital signal processing).
模平方运算是模幂运算中的基本运算,其运算速度关系到大多数公钥密码和数字信号处理的应用效率。
dictsearch.appspot.com
3.
To send an encrypted message, you need to use the recipient's public key in combination with your private key.
为了发送加密信息,你需要使用收件人的公钥和你的私钥组合。
forum.ubuntu.com.cn
4.
Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.
验证选择了刚刚上载的公钥的配置加密认证的文件名称。
www.ibm.com
5.
However, public-key algorithms are extremely slow (compared to secret-key algorithms) and are not designed to encrypt large amounts of data.
但是,公钥算法非常慢(与私钥算法相比),不适合用来加密大量数据。
msdn2.microsoft.com
6.
The following figure shows the sequence of decrypting with the addition of the supporting elements of public key cryptography.
下图显示在添加了公钥加密的支持元素的情况下进行解密的顺序。
technet.microsoft.com
7.
First, the public key is applied to the signature to verify its authenticity.
首先,用于签名中的公钥是用来验证可靠性。
www-128.ibm.com
8.
Property retrieves the algorithm identifier associated with the public key.
属性检索与公钥关联的算法标识符。
msdn2.microsoft.com
9.
The private key is known only to its owner, and the public key is available to anyone.
私钥只有其所有者知道,而公钥可供任何用户使用。
technet.microsoft.com
10.
The Public-Key Cryptosystem is an important branch of Cryptosystem.
公钥加密体制是密码编码学的一个重要研究方向。
www.dictall.com
1.
SDM documents are identified using the following set of attributes: document name, version, culture, platform, and public key token.
使用以下属性集标识SDM文档:文档名称、版本、区域性、平台和公钥标记。
msdn2.microsoft.com
2.
The proposed security and authentication protocol made use to the combination of public key and secret key to provide such ploy.
这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。
www.dictall.com
3.
To use a public-key system to digitally sign a message, the sender first applies a hash function to the message to create a message digest.
若要使用公钥系统对消息进行数字签名,发送方先向该消息应用哈希函数以创建消息摘要。
msdn2.microsoft.com
4.
The client receives the XML document and parses the digest, digital signature, and public key parameters into Java application data.
客户机接收XML文档并将摘要、数字签名和公钥参数解析成Java应用程序数据。
www-128.ibm.com
5.
If you are prompted for a password, rectify the problem by installing your public key on the remote host and try again.
如果系统提示输入密码,那么在远程主机上安装公共密钥并再次尝试连接。
www.ibm.com
6.
Asymmetric encryption, it requires the use of two keys, one public (public key), and the other is owned by the (private key).
不对称加密,它要求使用两个密钥,一个是公共的(公钥),另一个是私有的(私钥)。
lwtbb.com
7.
You generate a key pair, which is composed of a public key and a private key.
您生成了一个密匙对,它由一个公共密匙和一个私有密匙组成。
www.ibm.com
8.
With public key systems, there is no shared secret between the two parties.
使用公钥体系时,双方不存在共享秘密。
office.microsoft.com
9.
When all the previous configuration setting are complete, run the ssh to log onto the remote machine using the public key authentication.
完成上述所有配置设置之后,运行ssh使用公共密钥身份验证登录远程机器。
www.ibm.com
10.
That leaves the issue of how you get the public key in a way that maintains security.
这产生了一个问题,如何在保证安全性的情况下获得公开密匙。
www.ibm.com
1.
The Report Server Windows service connects to the report server database and stores the installation identifier and public key values.
报表服务器Windows服务连接到报表服务器数据库,并存储安装标识符和公钥值。
msdn2.microsoft.com
2.
A public key and a symmetric key are used to encrypt data.
公钥和对称密钥可用于对数据进行加密。
technet.microsoft.com
3.
The application of self-certified public key policy also can lighten the burden of verifying cash for corporation and depositing bank.
同时,自证明公钥体制的应用也减轻了商家及其存款银行验证电子现金的负担。
www.594wm.com
4.
This attribute represents the current public key for the certificate being used by the server.
此属性代表服务器所使用的证书的当前公钥。
technet.microsoft.com
5.
Thus, the domain owner may revoke a public key and shift to signing with a new pair at any time.
因此,车主可撤销公钥域,转向以新签署一双随时。
www.dnwt.cn
6.
The client invokes the signer in "verify" mode and passes the digest, the signature, and the public key to verify the signature.
客户机以“验证”方式调用签名引擎,并传递摘要、签名和公钥来验证签名。
www-128.ibm.com
7.
The protocol provides a model for importing the ideas of classical public key cryptography into the quantum world.
这个协议也为在量子世界中引入传统的公钥密码技术提供了一个模型。
www.lw23.com
8.
This command exports the public key for the personal certificate stored in jmskeystore to a file called jmsclient. key.
该命令将用于个人证书(存储在jmskeystore下)的公钥导出到名为jmsclient.key的文件中。
www.ibm.com
9.
In digital signatures , the private key generates the signature, and the corresponding public key validates the signature .
这一系列活动显示出公钥加密如何使得数字签名和邮件加密成为可能。
www.bing.com
10.
Encrypts data with the public key of a certificate.
使用证书的公钥加密数据。
msdn2.microsoft.com
1.
The public key of a valid Authenticode signature.
有效的Authenticode签名的公钥。
msdn2.microsoft.com
2.
Encryption is implemented using both public key (asymmetric) and secret key (symmetric) algorithms.
加密使用公钥(不对称)和密钥(对称)两者来实现。
msdn2.microsoft.com
3.
During the transmission of Alice's public key, however, an unauthorized agent might intercept the key.
但是,在传输小红的公钥期间,未经授权的代理可能截获该密钥。
msdn2.microsoft.com
4.
The public key is given to anyone who needs to send secured data to the holder of the private key.
任何需要将数据安全地发送给私钥持有者的人首先获得公钥。
www-128.ibm.com
5.
Before you can do anything with digital signatures, you need to create a key pair, a public key and a private key.
在使用数字签名之前,我们需要创建一个密钥对,一个公钥和一个私钥。
www.ibm.com
6.
The receiver then decrypts the message digest using the sender's public key, confirming that the message was indeed sent by the sender.
然后,接收方使用发送方的公钥对消息解密,确认消息确实是由发送方发送的。
www.ibm.com
7.
Specifies a comma-separated assembly name combination consisting of version, culture, and public-key tokens.
指定由版本、区域性和公钥标记组成的以逗号分隔的程序集名称的组合。
msdn2.microsoft.com
8.
This symmetric key is itself encrypted using the public key of an asymmetric key pair generated by Windows.
此对称密钥使用Windows生成的非对称密钥对的公钥进行自加密。
msdn2.microsoft.com
9.
Specifies a comma-separated assembly combination consisting of version, culture, and public key tokens.
指定一个逗号分隔的程序集组合,该程序集组合由版本、区域性和公钥标记组成。
msdn2.microsoft.com
10.
Each user uses his extended ID as his public key and thus the key management procedure can be simplified.
每个使用者使用自己扩展的身分识别码作为他的公钥,如此可使得金钥管理程序比较简单。
www.etop.org.tw
1.
A public key used to import type library information into an assembly.
用于将类型库信息导入程序集的公钥。
msdn2.microsoft.com
2.
The compiler inserts the public key in the assembly manifest and then signs the final assembly with the private key.
编译器在程序集清单中插入公钥,然后使用私钥对最终的程序集签名。
msdn2.microsoft.com
3.
Cryptographic digital signatures use public key algorithms to provide data integrity.
加密数字签名使用公钥算法提供数据完整性。
msdn2.microsoft.com
4.
The public key is indeed "public" and can be published for anyone to access.
公钥实际上也是“公开的”,任何人都可以接触到它。
www-128.ibm.com
5.
The public key used to sign must be 2048 bits or greater.
用于签名的公钥必须至少为2048位。
msdn2.microsoft.com
6.
A report server will be initialized only if there is a match between the installation identifier and the public key.
只有当安装标识符与公钥相匹配时,才会初始化报表服务器。
msdn2.microsoft.com
7.
The popular RSA cipher algorithm, widely deployed in public-key cryptography, relies on factorization.
目前在公开金钥加密法中,最常用到的RSA密码演算法,就是应用因数分解的原理。
edba.ncl.edu.tw
8.
If your public key can decrypt the entry, then your private key was used to sign it.
如果您的公钥能够解密条目,则使用您的私钥对它签名。
www.ibm.com
9.
The private key is used in the signing process, and the public key is used to verify the signature.
私钥是使用在签名过程中,公钥是用来核实签名的。
www.ppmiao.com
10.
Digital signature is one of the most important primitives in public key cryptography.
数字签名在公钥密码学中有着非常重要的地位。
dictsearch.appspot.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/11/15 21:29:15