私用密鑰 的英文怎麼說

中文拼音 [yòngyào]
私用密鑰 英文
private key
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 鑰名詞(鑰匙) key
  • 私用 : appropriatio
  1. Sk private key is encrypted by the service master key

    Sk =使服務主
  2. The public and private key scheme is interesting because data encrypted with a public key can only be decrypted with the associated private key

    模式的有趣之處在於,使的數據,只有相應的才可以解
  3. However, when you update the server key file to use a new private key and certificate signed by some signer, you must ensure that the java clients can verify those certificates

    然而,當您更新服務器文件以使新的和由簽署者簽署的證書時,您必須確保java客戶端能夠驗證這些證書。
  4. An individual - user is one who holds the key all by himself

    單人戶是指個人戶,其為個人所有。
  5. A public private key pair is used for encryption and decryption of messages

    於加和解郵件。
  6. Private key cryptography

    私用密鑰碼學
  7. Both peer a and peer b can use a shared key to exchange a secret message, or peer a can use the private key that corresponds to a public key that peer b holds to perform the same operation

    如對等點a和對等點b都可以一個共享交換秘的訊息,或對等點a可以使對應于對等點b持有的公匙的私用密鑰來完成同樣的操作。
  8. Generates a new public - private key pair with the specified key size, for strong name use

    生成具有指定大小的新的公-對,以供強名稱使
  9. In a real world scenario, alice and bob use public key asymmetric encryption to transfer a secret symmetric key and use secret key encryption for the remainder of their session

    在一個實際方案中,小紅和小明使(不對稱)加來傳輸(對稱),而對他們的會話的其餘部分使
  10. Typically, public - key encryption is used to encrypt a key and iv to be used by a secret - key algorithm

    通常於加一個演算法將要使和iv 。
  11. Because of these problems, secret - key encryption is often used in conjunction with public - key encryption to privately communicate the values of the key and iv

    由於存在這些問題,通常與公一起使,來秘地傳達和iv的值。
  12. Of the key pair, the public key is registered and the private key is used as proof of possession

    對中,公是已注冊的,於作為所有權的證明。
  13. Tgs generates a session key and then sends the key to the client encrypted in the client s private key

    Tgs生成一個會話,然後客戶機的后將其發送給客戶機。
  14. The paper divides the data storage in pki system into three parts : authentication center, secret key information management and user - oriented certificate and private key data

    本文把pki系統中的數據存儲分為三個部分:認證中心ca的數據存儲、資料管理的數據存儲和面向戶的證書和數據。
  15. Signing occurs by using a public key algorithm, usually the rsa algorithm, which is a special type of cryptography consisting of two different but mathematically related keys : a private key for signing code and a public key for verifying the signed code

    演算法(通常是rsa演算法)來進行簽名,公演算法是一種特殊類型的碼術,它包含兩個不同的但在數學方面又是相關的:一個於簽署代碼)和一個公於驗證經過簽名的代碼) 。
  16. When you build your application using a private modified copy of the mfc windows forms interfaces dll mfcmifc80. dll, it will fail to install in the gac unless you replace the microsoft key with your own vendor key

    使mfc windows窗體介面dll ( mfcmifc80 . dll )的有(修改過的)副本生成應程序時,除非自己的供應商替換microsoft,否則在gac中安裝會失敗。
  17. Gpg uses two keys : public and private

    Gpg使兩種:公
  18. The private key system is also called the single key system, its encryption process is the same as its decryption process. the public key system is also called the double key system, its encryption process is different with its decryption process. because the public key system can publish its public key and only keep its private key secret, it has many new functions such as the digital signature and authentication, which is widely used in every area of the society

    體制又稱單體制,其加過程和解過程相同;公體制又稱為雙體制,其加、解不同,可以公開加,而僅需保,從而具有數字簽名、鑒別等新功能,被廣泛應於金融、商業等社會生活各領域。
  19. You can sign data using a private key in a file ( pvk ) or in a cryptographic service provider ( csp )

    您可以使文件( pvk )或加服務提供商( csp )中的簽發數據。
  20. To safely persist a private key, use a secure key container

    要安全地保存,請使安全的容器。
分享友人