like in asymmetric encryption
METHODS: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient's identity.
基于1个网页-相关网页
like in asymmetric encryption
比如非对称加密
以上为机器翻译结果,长、整句建议使用 人工翻译 。