They are needed when chromatic notes foreign to the key and not indicated in the key-signature occur.
当半音不属于该调,并且无调号时需要加变音记号。
XML Encryption relies entirely on the XML Digital Signature specification for key exchange.
对于密钥交换XML加密完全依赖于 XML数字签名规范。
The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。
The recipient of the payload can validate the digital signature using the public key of the sender.
有效载荷的接收者可以使用发送者的公开密钥验证数字签名。
The process involves the sender generating the message digest, then encrypting the digest using its private key to create the digital signature.
这个过程包括发送方生成消息摘要,然后用其私钥对摘要加密以创建数字签名。
Only the holder of the key could have created the signature component.
只有密钥持有者才能创建签名组件。
The second byte of "01" indicates that this is a private key operation (e.g. it's a signature).
第二个字节“01”说明这是一个私钥操作(如,它是一个签名)。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.
签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。
This signature is based on a common IBM master key, which is available only inside IBM.
此数字签名基于公用IBM主控密钥,此密钥仅在 IBM内可用。
The operation signature is changed to accept, in addition to a key, a request template, and then returns a response template.
操作签名更改为接收请求模板(和密钥),然后返回响应模板。
Similarly, with a digital signature the sender of the message signs the message using his or her own private key.
类似地,数字签名则是消息发送方使用自己的私钥签署消息。
The signature verifier must have access to the public key certificate that contains the public key associated with the private key used to produce the signature.
签名验证者必须有权使用包含与用于生成签名的私钥关联的公钥的公钥证书。
The signature component of the message (see Listing 6) provides the proof of possession of the Secret Key id.
消息的签名组件(见清单6)提供拥有SecretKeyID的证明。
When Ellie receives the message from Jethro, her Lotus Notes client checks his signature via his digital certificate containing his public key that was published in a directory.
当ellie收到Jethro发出的消息时,她的LotusNotes客户程序就会使用在一个目录中发布的包含Jethro的公开密钥的数字证书检查签名。
KeyInfo indicates the key to be used to validate the signature.
KeyInfo表示用于验证签名的金钥。
Only the holder of the key can create the signature, whereas anyone with access to the public key (usually taken from an X.509 Certificate) can validate the signature.
只有密匙的持有者能够创建签名,而所有能够访问公共密匙(通过来自 X.509Certificate)的人都可以验证签名。
Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。
However, the roles of X.509 key pairs are reversed for digital signature and encryption.
然而,用于数字签名和加密的X . 509密钥对的角色是颠倒的。
Modification of this variable is key to determining what amount of variability is acceptable during a click-time signature match.
修改此变量对于确定在匹配单击时间签名时可以接受的可变性非常关键。
The output is likely to continue with a message to the effect that the key is not certified with a trusted signature.
输出结果可能继续是一条消息,大致意思是密钥不能被一个可信签名所认证。
One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).
演示安全令牌已授权应用的一种方式是,添加采用相关联密钥(来自于占有证据令牌)的数字签名。
This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.
这一部分介绍生成公钥-私钥对的过程,这是加密和数字签名的基础。
The receiver uses the sender's corresponding public key to verify the digital signature.
接收方使用发送方的对应公钥验证数字签名。
In order to verify that a public key certificate is legitimate, I need to verify the signature of the signer that issued it.
为了验证公钥证书是合法的,我需要检验发出该签名的签名者。
An XML signature generated from the private key of the sender and affixed to the XML ensures the non-refutability of the sender.
由发送者的私钥生成的附在xml上的XML签名保证了发送者的不可驳性。
We will give you more than one key if you wish. But we must have signature CARDS for all authorized box users.
如果您愿意,我们可以多给您一、两把钥匙。但是,我们必须有被批准使用箱子的那个人的签字卡片。
The signature is performed using the private key of the Consuming Application's X.509 certificate.
签名是利用消费应用程序(Consuming Application)的X . 509证书的私钥来执行的。
Next the digital signature is encrypted using the public key for Alice.
接下来,将使用Alice的公钥对数字签名进行加密。
Verifying the signature of the message using the public key of sender to authenticate the sender and to verify integrity of the message.
使用发送方的公钥来检验消息的签名,以便验证发送方并确认消息的完整性。
应用推荐