數字簽名驗證 的英文怎麼說

中文拼音 [shǔqiānmíngyànzhèng]
數字簽名驗證 英文
verify signature
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  • 簽名 : sign one's name; autograph
  • 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
  1. A elliptic curve digital signature and authentication algorithm of independent knowledge property right is designed and implemented on computer in this theme. data integrality and user authenticity is ensured

    本課題中設計了一種擁有自主知識產權的橢圓曲線演算法,並在微機上進行了實現,確保了據的完整性和用戶身份真實性。
  2. In this paper, we brought out the concept of “ ergodic matrix ”, and gave out the recursion formula ( ii ) which can construct the ergodic matrix q with n n dimensions using a vector with n dimension. that is, we can delegate n2 bits ergodic matrix q using n bits integer vector, at the same time save the complexity of space and time

    在此基礎上,本文對利用遍歷矩陣生成信息摘要以及利用它們實現一般和具有仲裁方式的的演算法及應用進行了相關的一些研究,對演算法的強度進行了分析,並用程序對演算法進行了
  3. The pki environemt including development interface such as pem and der encoding and decoding, symmetry cryptography, rsa algrothm, random numeric generate, certificate request pkcs # 10 encoding and decoding, x. 509 certificate encoding and decoding, digital abstract, digital signature and verifying signature, digital envelope and advance services such as certificate authority and register authority

    為滿足設計需要的pki底層支持和上層服務平臺,本文設計和實現了pki環境,包括底層開發介面: pem與der編解碼、對稱加密、隨機產生、 rsa演算法、書請求pkcs # 10封裝與解碼、 x 509書和黑單編解碼、摘要、信封等和上層服務:認中心和注冊中心。
  4. Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card

    Ecdsa等體制的選取, deffie - hellman等密鑰交換體制的研究。論文也討論了基於有限域上橢圓曲線公鑰密碼系統的若干應用和信息安全產品,如,組,在智能卡中的應用。
  5. Verifies the digital signature algorithm

    據上演算法(
  6. Verifies a digital signature algorithm

    演算法(
  7. This assertion is normally validated, or digitally signed, by a trusted entity called the certificate authority

    這種斷言通常會由一個稱為書權威機構( ca )的可信實體進行有效性,或者進行
  8. This paper proposes a new signature scheme which is verified by an inequality and is the extended form of the equality verification. the new scheme is secure in theory and is suitable for some practice

    本文提出了一個新的方案,它通過判定值是否滿足一個不等式的方式來的合法性,實質是等式的進一步推廣.新方案在理論分析上是安全的,並具有較大的實用價值
  9. My work exams the realization of rsa algorithm, explains some important steps and its security in detail and sign the assess file by rsa algorithm in real estate evaluation s < tem in the end

    本文研究了rsa演算法的實現過程,並對其中的一些重要步驟及其安全性進行了詳細的討論。最後,在房地產評估系統中實現了通過用rsa演算法對評估報告進行報告的合法性和可靠性。
  10. Research of main mode with signature authentication in ike protocol

    協議中基於數字簽名驗證的主模式研究
  11. The following functions support encryption, decryption, digital signing, and the validation of digital signatures

    以下函支持加密、解密、以及數字簽名驗證
  12. This method throws an exception if the verification of the digital signature fails or any validation requirements are not met

    如果數字簽名驗證失敗或未滿足所有要求,則此方法會引發異常。
  13. Digital signatures authenticate the identity of a sender if you trust the sender s public key and help protect the integrity of data

    數字簽名驗證發送方的身份(如果您信任發送方的公鑰)並幫助保護據的完整性。
  14. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令;第二利用雙方的公鑰書對握手連接信息進行數字簽名驗證
  15. The initiating party uses the shared secret to encrypt or digitally sign the payload ; the receiving party, in turn, also uses the same shared secret to decrypt or verify the digital signature

    發起方使用共享密鑰加密或署有效載荷,接下來,接收方也使用相同的共享密鑰解密或者
  16. At the end of this paper, the configure process of the ssl protocol is given. based on acme, the typical implementation of form digital signature software framework is put forward. on the basis of component diagram, some typical source codes of the business component are listed and the template description of the currency interface component is showed. the modeling idea and solution are proved to be effective

    最後,給出ssl協議的配置過程;結合acme語言給出表單軟體構架的典型實現;在構件圖的基礎上,給出重要事務構件的程序代碼實現和通用界面構件的模板表示,了建模思想和解決方案的有效性
  17. To ensure that you get success every time you try to verify the digital signatures of logically equivalent xml - irrespective of its physical representation - you must make sure that the xml is in an agreed - upon standard format

    要保每次邏輯等價的xml不管物理表示如何的都能成功,您必須保xml使用公認的標準格式。
  18. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    網路據傳輸安全主要解決在網路環境下用戶之間身份據加密傳輸以及實現三個方面問題:用戶身份了通信的源點和目的點的正確性;據加密傳輸保據在網路的中間節點不會泄露通信秘密;可以保發送信息的一方不能對自己發送過的信息進行否認。
  19. Digitally signs files, verifies signatures in files, and time stamps files

    對文件進行文件和時間戳文件中的
  20. The sign tool is a command - line tool that digitally signs files, verifies signatures in files, or time stamps files

    工具是一個命令行工具,用於對文件進行文件或時間戳文件中的
分享友人