private key信息详情
私人密钥,个人密钥(用于把即将发送的消息进行加密的密钥)
unprotected private key file───未受保护的私钥文件
private───n.列兵;二等兵;adj.私人的,私有的;私立的;私营的;不公开的,秘密的;(场所)清静的;(人)不愿吐露心思的,内向的;无官职的;非劳动所得的
Key───n.钥匙;关键,密钥;(键盘乐器或电脑键盘的)键;调,声调,色调;答案;图例;扳手;销子,楔,栓;翼果;板条间首层灰泥;(篮球)罚球区;低岛,礁;adj.关键的,主要的;n.(Key)(美)基(人名);vt.键入,用键盘输入;用别针等固定;使与……符合或关联;使……与……共处,相安无事;用钥匙将汽车表面划坏;将(表面)弄粗糙;给(广告)加识别码;成为获得……的关键
private company───n.私人公司,股权不公开公司;私人公司;股份不公开公司
private debt───[金融]私人债务
private detectives───私家侦探;n.私人侦探( private detective的名词复数 )
private residence───私人居所;私人住宅
private detective───私家侦探;n.私人侦探
intensely private───非常私密
private key is, well, private.───私钥自然是私有的。
Local private key files are identified.───找到本地私有密钥文件。
Locate the private key file.───找到专用密钥文件。
Digital signatures require the use of two distinct but mathematically-related encryption keys known as a public key and a private key.───数字签名需要使用两个密钥一个是公钥一个是私钥。
Private key (sometimes just referred to as a key): Can be used to sign or decrypt a message.───私钥(有时简称为密钥):可用于对消息签名或加密。
This technique makes use of a pair of mathematically related, but different keys - a private key and a public key.───该技术利用一对数学相关但不同的密码匙私人密码匙及公开密码匙。
This encrypted part can only be read by the receiver with the private key corresponding to the public key that was used to encrypt the data.───只有当接收者具有与加密数据时使用的公钥相对应的私钥时,才能阅读这部分被加密的数据。
The public key is often available, but access to the private key is restricted to only a few individuals.───公钥通常是可用的,但对私钥的访问权仅限于少数个人。
properties file; the password used for access to a private key must be supplied by a callback.───必须通过回调提供用于访问私有密钥的密码。
In the scheme, the private key and its encrypting key is separated, which makes the KMC and KEC can't separately get the private key.
The private key in this example is my_rsa.ppk (Figure 1).
A private key encryption-decryption algorithm that uses a key that is twice the length of a Data Encryption Standard (DES) key.
Thus, banks suggest that each private key password also be used as an integral part of the encryption algorithm.
Lawful use of the private key entitles the holder to the delivery of the goods.
The user's public key and private key were calculated by combined public key technology that use a public key and private key factor matrix. It is a new kind of public-key system.
The private key, used to encrypt transmitted information by the user, is kept secret.
B uses the secret private key to decrypt the message and read it.
Your private key lets you decrypt any message encrypted with your public key.
- pizza bianca
- nonotea
- nonotattoo
- molecular medicine reports
- methylbenzene
- nonoti
- private key wallet
- pizza bean
- nonotianshi
- love to go
- put their fingers up
- love to go along
- pizza beach
- percentage of contraction
- percentage of completion
- lets ride bike
- lets ride bicycles
- lets ride bikes
- percentage of core recovery
- nonotm
- percentage of damage