• What is a digital signature?

    数字签名什么

    精选例句

  • This signature block file stores the digital signature of the corresponding signature file.

    这个签名文件存储相应签名文件数字签名

    www.youdict.com

  • Digital signature files are binary files and have the same filename as the.sf file but a different extension.

    数字签名文件二进制文件,并且.SF文件相同文件名但是扩展名不同

    www.ibm.com

  • For example, you may use the LTPA token between two hops, then use another token, such as a digital signature, where the DN of the user is specified in both user repositories.

    例如可能跃点之间使用ltpa然后再使用其他的令数字签名其中在用户存储库指定用户DN

    www.ibm.com

  • The release is capable of testing authentication, digital signature and encryption.

    这个发布可以测试身份认证数字签名以及加密

    www.infoq.com

  • However, the roles of X.509 key pairs are reversed for digital signature and encryption.

    然而用于数字签名加密X . 509密钥对的角色颠倒

    www.ibm.com

  • Registries must save and retrieve data in a well-defined way so that a digital signature is not broken.

    注册中心必须一种明确定义方式保存检索数据以便数字签名被破坏

    www.ibm.com

  • Together, these two objects let you seal and sign serialized data without having to stress about the details of digital signature verification or encryption.

    结合使用两种对象,便可以轻松地对序列化数据进行密封签名不必强调关于数字签名验证加密细节

    www.youdict.com

  • These values are encapsulated in a digital signature of 76 bytes per frame.

    这些数值压缩画面76字节数字签名中。

    www.ecocn.org

  • For example, if a message includes a digital signature, this signature will most likely be transferred in the SOAP header.

    例如如果消息中包括数字签名,那么签名最有可能SOAP消息头传送

    www.ibm.com

  • If the digital signature cannot be verified, the runtime exits with an error.

    如果不能验证数字签名运行退出给出错误信息

    www.ibm.com

  • A digital signature stamps a proof of origin authenticity.

    数字签名标志原始真实性验证

    www.ibm.com

  • For an application to use XML encryption and/or digital signature, the application must use or integrate with a PKI solution.

    对于使用XML加密/数字签名应用程序来说,它必须使用或者集成PKI解决方案

    www.ibm.com

  • The question of whether a digital signature really belongs to a particular person is conveniently handed off to the mechanisms that PGP itself uses for establishing trust.

    关于数字签名是否真正属于某个特定问题方便地转交PGP本身用于建立信任机制

    www.ibm.com

  • So, to summarize the use of PKI in XML encryption and XML digital signature...

    因此总结一下PK ixml加密XML数字签名中的使用

    www.ibm.com

  • NEC’s technology extracts a digital signature that works even if the video is altered.

    NEC技术提取数字签名即使视频改变后仍然能够起作用

    www.ecocn.org

  • The recipient of the payload can validate the digital signature using the public key of the sender.

    有效载荷接收者可以使用发送者公开密钥验证数字签名

    www.ibm.com

  • The process involves the sender generating the message digest, then encrypting the digest using its private key to create the digital signature.

    这个过程包括发送生成消息摘要然后摘要加密创建数字签名

    www.ibm.com

  • The sample illustrates how data from several software applications can be merged with XDP templates to produce PDF documents that are signed with a digital signature.

    样例说明了来源于一些软件应用程序数据如何XDP模板合并生成具有数字签名PD f文档

    www.ibm.com

  • These algorithms are used for digital signature applications.

    这些算法用于数字签名应用程序

    www.ibm.com

  • Additionally, SAML provides a digital signature mechanism that enables the assertion to have a validity time range to prevent assertions from being replayed later.

    此外SAML提供数字签名机制机制使断言具有有效时间范围防止断言以后重播

    www.ibm.com

  • XML Encryption relies entirely on the XML Digital Signature specification for key exchange.

    对于密钥交换XML加密完全依赖于XML数字签名规范

    www.ibm.com

  • Because a MAC can be computed faster than a digital signature, it is practical for transport layer security like SSL, where a large volume of data is transmitted.

    由于MAC计算数字签名因此它对于诸如ssl数据传输很大传输安全性来说实用

    www.ibm.com

  • A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.

    签名公钥数字签名(非常类似人工签名)来表明签署公钥担保

    www.ibm.com

  • The initiating party USES the Shared secret to encrypt or digitally sign the payload; the receiving party, in turn, also USES the same Shared secret to decrypt or verify the digital signature.

    发起方使用共享密钥加密数字签署有效载荷接下来接收使用相同共享密钥解密或者验证数字签名

    www.ibm.com

  • One way to demonstrate authorized use of a security token is to include a digital signature using the associated secret key (from a proof-of-possession token).

    演示安全已授权应用方式,添加采用相关联密钥来自占有证据令数字签名

    www.ibm.com

  • Because the digital signature scheme guarantees nothing about who is the intended recipient of the signed message, nobody can determine whether the malicious party's claim is true or not.

    由于数字签名方案无法保证签名消息目标接收方那么也就没有人确定恶意声明真实性

    www.ibm.com

  • Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.

    由于数字签名建立公用密钥密码术基础上的,因此计算数字签名所花时间往往要比计算mac长得

    www.ibm.com

  • This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.

    一部分介绍生成公钥-私过程加密数字签名基础

    www.ibm.com

  • This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.

    一部分介绍生成公钥-私过程加密数字签名基础

    www.ibm.com

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定