key sender 中文意思是什麼
key sender
解釋
電鍵發送器。-
As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp
在現代的數字通信網路中,數字簽名作為數據認證技術中的一項關鍵技術,可以解決否認、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。 -
In public key instrument, the receiver ' s key is different from the sender ' s and it could hardly deduce the sender ' s key from the receiver ' s
在公開密鑰密碼系統中,收信方和發信方使用的密鑰互不相同,而且幾乎不可能從加密密鑰推導解密密鑰。 -
One of the reasons that public private key schemes have revolutionized digital security is because the sender and receiver don t have to share a common password
公鑰/私鑰模式徹底改變了數字安全的原因之一是,發送者和接收者不必再共享一個通用的密碼。 -
Strowger system introduced in australia and new zealand. development of key - type impulse sender, and simplex dialing on toll lines
澳大利亞和紐西蘭引進史端喬系統。開發鍵式脈沖發送器和長途電話線單工撥號。 -
The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient
數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵件的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密碼加密或軟體演算法加密的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。 -
A hash - based message authentication code hmac can be used to determine whether a message sent over an insecure channel has been tampered with, provided that the sender and receiver share a secret key
在發送方和接收方共享機密密鑰的前提下,基於哈希的消息驗證代碼( hmac )可用於確定通過不安全通道發送的消息是否已被篡改。 -
The sender s private key
發件人的私人密碼匙 -
It is derived from the content of the sender s message in combination with his private key
發件人以私人密碼匙根據訊息內容產生的 -
Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it
接收者利用發送者的公開密鑰和他們自己的秘密密鑰的結合,解開該報文的秘密編碼,並解密之。 -
We also describe the key design challenges including hot plug - in, customizable load balancing strategy, adaptive control, state migration and fault tolerance etc., and outline the technical solutions. moreover, a fuzzy and positive load balancing algorithm is also proposed with combination the advantages of both sender - initiated algorithm and receiver - initiated algorithm. the adaptive algorithm is charactered by quick matching and stability
定義了ejb組件遷移模型及其相應的遷移原語和約束,並針對各類組件類型的特點,設計了slb _ copy 、 sfb _ copy 、 eb _ copy三個組件遷移演算法。演算法己應用到自適應負載平衡、失效恢復以及w亡b應用的動態重配等三個方面。 -
Digital signatures authenticate the identity of a sender if you trust the sender s public key and help protect the integrity of data
數字簽名驗證發送方的身份(如果您信任發送方的公鑰)並幫助保護數據的完整性。 -
The sender uses its own private key to digitally sign the message that is to be sent
發送方使用自己的私鑰數字簽署要發送的消息。 -
Similarly, with a digital signature the sender of the message signs the message using his or her own private key
類似地,數字簽名則是消息發送方使用自己的私鑰簽署消息。 -
Because the original message might be quite long, and public key algorithms to generate and verify digital signatures are resource intensive, the sender normally calculates a short version of the original message called the " digest " and digitally signs only this version
因為原始消息可能相當長,而且生成和驗證數字簽名的公鑰演算法是資源密集的,所以發送方通常計算稱為「摘要」的原始消息的短版本並且僅對該版本進行數字形式的簽署。 -
The sender encrypts the message digest under her private key
發送方用自己的私鑰加密消息摘要。 -
To use a public - key system to digitally sign a message, the sender first applies a hash function to the message to create a message digest
若要使用公鑰系統對消息進行數字簽名,發送方先向該消息應用哈希函數以創建消息摘要。 -
An xml signature generated from the private key of the sender and affixed to the xml ensures the non - refutability of the sender
由發送者的私鑰生成的附在xml上的xml簽名保證了發送者的不可駁性。 -
The sender must possess the other copy of the secret key
發送方必須擁有秘鑰的另一個副本。 -
Because of the properties of asymmetric key encryption technology, the recipient can then verify that the message was really from the sender by using the sender s public key because it is publicly available to verify the message digest for example,
因為非對稱密鑰加密技術的特點,接收方可以使用發送方的公開密鑰(因為可以公開得到)驗證消息摘要(比如, -
However, because the sender and recipient no longer need to share a secret key, you can identify the creator of a message, that is, it is guaranteed that the signer is the creator
而由於發送方和接收方不再需要共享一個密鑰,因此您就能識別消息創建者的身份了,也就是說,它保證了簽名者就是創建者。
分享友人