簽名塊 的英文怎麼說

中文拼音 [qiānmíngkuāi]
簽名塊 英文
signature block
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : 名詞(古時佩帶的玉器) penannular jade ring (worn as an ornament in ancient china)
  • 簽名 : sign one's name; autograph
  1. Will remove the key signature block

    將會移除密鑰簽名塊
  2. Nothing. she seemed very surprised that a stranger should wish to buy a burial plot and have a headstone put up to marguerite, and she signed the authorization i asked her for at once

    「什麼也沒有說,她聽到有一個陌生人要買一地替瑪格麗特造一座墳墓,感到非常驚奇,她馬上就同意了我的要求,在授權書上。 」
  3. Cmcso - pp cryptographic module for csp signing operations - protection profile cmcso - pp

    Csp用密碼模.保護輪廓
  4. The authenticator, either the database owner or a certificate or asymmetric key used to sign the module, must be trusted in the target scope

    身份驗證者(數據庫所有者或用於給模的證書或非對稱密鑰)必須在目標范圍內是可信的。
  5. We regulate a command - response pair for the encryption / decryption operation based on permutation code, combining rsa and md5 used in cos safety module, and bring forward a safety transmission process for documentation

    並給排列碼加密解密操作賦予相應的命令應答對,結合智能卡操作系統的安全模中的rsa演算法和md5演算法,提出了使用這種數字卡進行文件安全傳輸的過程。
  6. A signed jar file is exactly the same as the original jar file, except that its manifest is updated, and two additional files are added to the meta - inf directory, a signature file and a signature block file

    Api。一個的jar文件與原來的jar文件完全相同,只是更新了它的manifest ,並在meta - inf目錄中增加了兩個文件,一個文件和一個簽名塊文件。
  7. Hashes for linked modules are recomputed but the assembly is not re - signed

    ) ,則重新計算鏈接的模的哈希,但不對程序集進行重新
  8. In this article, we study the implemetation of fpga for elliptic curve digital signature algorithm. based on number thesis 、 abstract algebra and complex thesis , integrated information theory 、 cryptography and some specific relevant algorithm , we ascertain the implementation of ecdsa for hardware project : according to the design idea of hiberarchy and modularization, we adopt very high speed ic hardware description language ( vhdl ) as design input and simulate the design in every level and every model for the correct of the fundamental design. after finish the top design, we perform the whole simulation. then , we carry out the timing simulation after the logic synthes and layout

    本文從實際應用出發,研究了橢圓曲線數字演算法的fpga的實現:以基本的數論理論、抽象代數和復雜度理論為依據,結合信息論、密碼學的一些知識以及一些具體的相關演算法,確定了ecdsa的硬體實現方案:按照層次化、模化的設計思想,採用硬體描述語言vhdl作為設計輸入進行ecdsa的硬體設計;在每個設計層次和每個模都進行了模擬驗證,得以保證底層設計的正確性。在確保每個模的設計正確后,完成對電路的頂層設計,進行總體的模擬。
  9. The signature block file associated with the signature file stores the public signature used to sign the jar file

    文件相關聯的程序文件,它存儲了用於jar文件的公共
  10. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數字證書和數字技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函數實現系統的數據加密模,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  11. Among other things, the interface contains methods that assist in writing assembly manifests for multi - module assemblies, signing assemblies with strong names, and creating netmodules

    此外,該介面還包含有助於為多模程序集編寫程序集清單、以強程序集以及創建網路模的多種方法。
  12. Eessi conformity assessment guidance - cryptographic modules used by certification service providers for signing operations and key generation services

    Eessi合格評定指南.認證服務供應商用於和密鑰生成設備的密碼模
  13. We use session manager to solve the problem of sending and receiving the multi formats of media data ; use local service layer and java applet numeric underwrite mechanism to reading and writing the local resource

    使用通信管理器功能模解決多種媒體格式的數據同時在網路上傳輸的問題;使用本地服務層或者javaapplet數字機制,為applet存取本地資源提供有效手段。
  14. Through analyzing the results, we expatiate the feasibility of using dsp to implement digital signature. in hardware design, tms320c50 chip is chosen as the core processor and electrical periphery circuit is designed on basis of it. the function and connection information of digital signature electric circle is presented in detail in this report. at last, the validation software of signature is accomplished in computer. we run the whole system to get the result of digital signature and its validation, thus verify the correctness of the signature and the validity in identifying attack

    本次設計在硬體上採用的核心處理晶元為tms320c50 ,在熟悉此晶元的內部結構的基礎上,設計了處理器晶元的外圍功能模輔助電路,製作了電路板和硬體介面板,本文具體給出了數字電路板和介面電路板各部分電路的功能和接線情況。最後,在計算機中編寫了驗證軟體,並給出運行整個系統得到的對數據「」和對「驗證」的結果,對數字結果的正確性和識別攻擊的有效性進行了驗證。
分享友人