public key信息详情
[计]公开密钥
public───n.(Public)人名;(英)帕布利克;adj.公众的;政府的;公用的;公立的;n.公众;社会;公共场所
Key───n.钥匙;关键,密钥;(键盘乐器或电脑键盘的)键;调,声调,色调;答案;图例;扳手;销子,楔,栓;翼果;板条间首层灰泥;(篮球)罚球区;低岛,礁;adj.关键的,主要的;n.(Key)(美)基(人名);vt.键入,用键盘输入;用别针等固定;使与……符合或关联;使……与……共处,相安无事;用钥匙将汽车表面划坏;将(表面)弄粗糙;给(广告)加识别码;成为获得……的关键
public place───[法] 公共场所
public area───公共区域,公共地方;[建]公用面积,公众区
public live───公众直播
bounties public───公共悬赏
public speaking───n.演讲;演说;n.演说,演讲
public figure───n.社会名人; 人士;n.公众人物
public class───公开课
Extract the public key of the new certificate.───提取这个新证书的公共密匙。
Publish your key to a public key server.───发布您的密钥到一个公钥服务器上。
This creates a private and a public key file.───这个操作将创建一个私钥和一个公钥文件。
Which passes the name of the file containing the public key as a parameter to its constructor.───它将包含公钥的文件的名称作为参数传递至其构造函数。
To ensure uniqueness, the conversion process uses the name, version, and public key from an assembly to produce a LIBID.───为了确保这个唯一性,转换处理序会使用组件的名称、版本和公开金钥来产生LIBID。
Should an ID become compromised, a new public key can be generated by the creation of a new ID, locking the old ID out of the system.───如果一个ID存在安全危险,那么应该通过创建一个新的ID生成一个新的公钥,在系统中锁定老的ID。
This technique makes use of a pair of mathematically related, but different keys - a private key and a public key.───该技术利用一对数学相关但不同的密码匙私人密码匙及公开密码匙。
Conversely, if the purchase of the rights to own public key quantifiable terms, that he has no reason not to pay management fees physics?───反过来,如果购房者对自己拥有公共部位的权益可以量化计算,那他有什么理由不缴纳物理管理费呢?
Note : The public key subsystem is used for managing public keys on a server to which the client is already authenticated .───注意:公钥系统用于管理服务器上的客户已经被认证的公钥。
By default, the public key for test.ppk will be saved in the same directory as test.ppk.public.
Public Key Infrastructure ( PKI ) has become the key knowledge to provide security service in Internet.
The verifier can verify the authenticity of public key and validate signcryption simultaneously.
The public key is used to decrypt information at the receiver and is not kept secret.
By using the well-known RSA public key encryption algorithm, this paper gives a newauthenticated encryption scheme based on the division of digital image.
Recipients must have your public key to verify your signature.
Messages encrypted using the public key can be decrypted only by someone with the private key.
The only way to guarantee that the public key signature is from the owner is for the owner to hand you the key on a disk, in person.
In the paper, public key encryption algorithm-RSA and the application in digital signature are mainly discussed and analysed.
- the cockney accent
- sea dripping
- tat qaq
- precision engineering
- tat nisasta insaat
- the cockpit
- pocket bear
- southwall
- precision engineer
- tat tat
- sidestreet
- the code
- seval
- run the risk of doing
- precision equipment
- starquality
- railroad story
- southwallcat
- sidetable
- stuffing pressure
- smallest star in the universe