While the private portion of the certificate is used to create the signature, the password could also be stolen using social engineering or other similar techniques.
尽管在创建签名时要使用证书的私有部分,但是采用一些工程的方法或类似的技术也可以窃取密码。
The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。
It USES a default signature algorithm, SHA1 with DSA, to create a self-signed certificate valid for 180 days.
它使用默认的签名算法(SHA1和DSA)创建一个带有自我签名的证书,有效期为180天。
In order to verify that a public key certificate is legitimate, I need to verify the signature of the signer that issued it.
为了验证公钥证书是合法的,我需要检验发出该签名的签名者。
This includes checking the expiration date of the certificate, verifying the signature, and deciding whether credentials presented by the peer should be accepted.
它包括了检查确认的过期时间,确认签名,并决定对等者呈现的权限是否应该接受。
The signature verifier must have access to the public key certificate that contains the public key associated with the private key used to produce the signature.
签名验证者必须有权使用包含与用于生成签名的私钥关联的公钥的公钥证书。
Signature Algorithm: Algorithm to be used to sign the self-signed certificate.
SignatureAlgorithm:签署自签名证书所使用的算法。
STEP 0: Decide the signature algorithm used for certificate
步骤0:判定用于认证的签名规则
When Ellie receives the message from Jethro, her Lotus Notes client checks his signature via his digital certificate containing his public key that was published in a directory.
当ellie收到Jethro发出的消息时,她的LotusNotes客户程序就会使用在一个目录中发布的包含Jethro的公开密钥的数字证书检查签名。
Amazon's certificate tells us that we should use the RSA algorithm to check the signature.
Amazon的证书告诉我们应该用RSA算法来校验其签名。
Signature algorithm: the signature algorithm to be used for signing the certificate; in this case, MD5withRSA.
SignatureAlgorithm:签署证书所使用的签名算法;在本例中为MD 5withrsa。
Only the holder of the key can create the signature, whereas anyone with access to the public key (usually taken from an X.509 Certificate) can validate the signature.
只有密匙的持有者能够创建签名,而所有能够访问公共密匙(通过来自 X.509Certificate)的人都可以验证签名。
The signature is performed using the private key of the Consuming Application's X.509 certificate.
签名是利用消费应用程序(Consuming Application)的X . 509证书的私钥来执行的。
We need someone to certificate that this is her signature.
我们必须有人来证明这确实是她的签名。
In the next security dialog box that appears, click View Details to see information about the certificate used in the digital signature.
在显示的下一个安全性对话框中,单击“查看详细信息”以查看用于数字签名的证书的详细信息。
Signature verification, certificate revocation lists (CRLs), and certificate life-span can be used to validate the subscription (token).
签名验证、证书撤销列表(certificate revocation list,CRL),以及利用证书的有效期来验证订阅(令牌符号)。
The digital signature on a public key certificate can validate the authenticity of the public key and therefore the party who holds it.
公钥证书上的数字签名可以验证该公钥的可靠性以及持有它的那一方的可靠性。
You should also understand that certification authorities cannot in all circumstances check the validity of a digital certificate on which a digital signature is based.
也应该理解证书颁发机构不能在所有情况下都验证数字签名所基于的数字证书的有效性。
The certificate is a digital signature that identifies your site in a way that cannot be impersonated.
证书是一种数字签名,它标识您的站点,使其无法被模拟。
A certificate chain for the signature certificate, but not the trusted root certificate.
用于签名证书而不是可信根证书的证书链。
The signature was made after the certificate had expired or had been revoked.
签名是在证书过期或废除后签署的。
The Certificate Authority(CA) as the trustee third party is introduced, and an efficient fair electronic cash system is established based on the elliptic curve blind digital signature.
利用椭圆曲线上盲签名方法,引入认证中心(CA)作为可信的第三方,构建了一个高效的公平电子现金支付方案。
Digital signature, data encryption and certificate storage.
具备数字签名、数据加解密和证书储存的功能。
In this paper, we construct a new certificate less undeniable signature by using bilinear pairings and zero-knowledge proof protocol.
本文用双线性对和零知识证明协议,构造了一种新的无证书不可否认签名方案。
The hashing algorithm for the signature in the certificate is identified, if present.
如果存在,证书签名的哈希算法先被识别出来。
The basic technology of PKI include encipher digital signature data integrity mechanism digital envelope double digital signature, digital certificate etc.
PKI的基础技术包括加密、数字签名、数据完整性机制、数字信封、双重数字签名,数字证书等。
SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.
SSL协议采用了对称加密、非对称加密、信息摘要、数字签名、数字证书等密码学技术。
When receiving a certificate from a peer, one of the first steps is to verify the signature to ensure that the certificate has not been tampered with.
当接收到的证书,从一个同行的首要步骤之一是验证签名,以确保该证书没有被篡改。
Your signature alone can sign the death certificate of your dream.
只有你能在你梦想的死亡证上签字。
On top of the kernel are some modules which implement basic functions, such as encryption, digital signature, certificate management, secure session and data enveloping.
它包含一个控制访问对象的安全核心,位于其上的是一些实现基本功能的模块,如加密和数字签名、证书管理、安全会话、数据密封等。
应用推荐