This last may also be in a key signature to show changes in key.
升降号也可画在调号上以表示调的改变。
A key signature is placed at the beginning of a piece of music or of a section to indicate the key of the piece or section.
调号位于一篇音乐作品或一章节的开始部分,来表示该作品或章节的调域。
The only way to guarantee that the public key signature is from the owner is for the owner to hand you the key on a disk, in person.
保证公共密钥签名来自所有者的惟一方法是,密钥的所有者亲自把磁盘上的密钥交给您。
The second byte of "01" indicates that this is a private key operation (e.g. it's a signature).
第二个字节“01”说明这是一个私钥操作(如,它是一个签名)。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.
签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。
The operation signature is changed to accept, in addition to a key, a request template, and then returns a response template.
操作签名更改为接收请求模板(和密钥),然后返回响应模板。
Similarly, with a digital signature the sender of the message signs the message using his or her own private key.
类似地,数字签名则是消息发送方使用自己的私钥签署消息。
When Ellie receives the message from Jethro, her Lotus Notes client checks his signature via his digital certificate containing his public key that was published in a directory.
当ellie收到Jethro发出的消息时,她的LotusNotes客户程序就会使用在一个目录中发布的包含Jethro的公开密钥的数字证书检查签名。
The third command creates a 1024-bit Digital Signature Algorithm (DSA) key (-b 1024 -t dsa), turns off output (-q), and specifies the name of the key and that there is no password.
第三个命令创建了一个 1024位的DigitalSignature Algorithm (DSA)密钥(-b 1024-t dsa),关闭输出(-q),指定密钥的名称,在这里不指定密码。
Verification of the signature is a key in any signature-based form implementation.
签名验证在任何基于签名的表单实现中都是关键部分。
Modification of this variable is key to determining what amount of variability is acceptable during a click-time signature match.
修改此变量对于确定在匹配单击时间签名时可以接受的可变性非常关键。
The output is likely to continue with a message to the effect that the key is not certified with a trusted signature.
输出结果可能继续是一条消息,大致意思是密钥不能被一个可信签名所认证。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
This signature is based on a common IBM master key, which is available only inside IBM.
此数字签名基于公用IBM主控密钥,此密钥仅在 IBM内可用。
In order to verify that a public key certificate is legitimate, I need to verify the signature of the signer that issued it.
为了验证公钥证书是合法的,我需要检验发出该签名的签名者。
Instead, it is used to create a form of digital signature that is used to provide proof of possession of the Secret Access Key.
相反,它被用于创建某种形式的数字签名,而该签名用于证明拥有Secret Access Key。
The digital signature on a public key certificate can validate the authenticity of the public key and therefore the party who holds it.
公钥证书上的数字签名可以验证该公钥的可靠性以及持有它的那一方的可靠性。
Private Key module requires a digest value when generating a signature.
私钥模块在生成签名时需要摘要值。
The Fail-stop signature is a very secure system, even though the attacker gains signature key, it is difficult to forge signature.
防失败签字是一种十分安全的签字体制,即使攻击者得到签字密钥后也难以伪造签字。
In most available threshold signature schemes, only one group secret key is Shared among a group of signers and the threshold value is fixed.
现有大多数门限签名体制存在一个共同的问题:门限值是固定的,这限制了它们的应用范围。
Registration number distribution on Internet adopt a scheme that is an authenticated key distribution scheme based on digital signature of ellipse curve.
注册码的网上分配是基于一种椭圆曲线数字签名可认证密钥分配方案。
In this scheme, the key updating algorithm is used by the original signer, so the security of the proxy signature key is promoted to a higher level.
该方案将密钥更新算法应用在原始签名者计算过程中,更有效增强了代理签名密钥的安全性。
The paper proposes a folly distributed proxy signature scheme based on elliptic curve cryptography, which makes the distributed generation of the proxy key and the proxy signature more efficient.
文章提出了基于椭圆曲线密码的完全分布式代理签名体制,极大地提高了代理密钥分布式生成和代理签名分布式生成的效率。
Elliptic curve digital signature arithmetic can achieve high security using a shorten key, so it is very suitable to realize this arithmetic on smart card.
椭圆曲线算法只需要较小长度的密钥就可以获得较高的安全性,因此非常适合用智能卡来实现椭圆曲线数字签名算法。
Similarly to other signature Star Wars ICONS, it seemed natural that the environment (in this case the blue sky) should be a key element to help represent the 2010 Star Wars brand.
和其他有鲜明特色的星战标志类似,要帮助描绘2010年的《星战》品牌,环境(在此为蓝天)自然应当成为标志着2010年的《星战》品牌的一个关键元素。
The major characteristics and key technology about a new propellant with high energy and low signature are described, it is successfully studied by the screw extrusion technology recently.
介绍了新近研制成功的一种以螺旋压伸成型工艺制造的能量较高的低特征信号推进剂的主要性能,并重点讨论了研制的关键技术。
A digital signature is a data digest encrypted with the private key of the signer.
数字签名是指使用签名人私钥加密的数据摘要。
But how to solve the possibility of the public key and private key holder denying the certainty of documentation is a problem, and electronic signature technology can not deal with it itself.
但是如何解决公共密钥的确定性以及私人密钥持有者否认签发文件的可能性问题,则是电子签名技术本身无法解决的问题。
A strong name consists of the assembly's identity-its simple text name, version number, and culture information (if provided) -plus a public key and a digital signature.
强名称是由程序集的标识加上公钥和数字签名组成的。其中,程序集的标识包括简单文本名称、版本号和区域性信息(如果提供的话)。
应用推荐