CSR:证书签名请求。
为客户端创建密钥数据库并生成证书签名请求(CSR)。
Create a key database for the client and generate a certificate signing request (CSR).
如果存在,证书签名的哈希算法先被识别出来。
The hashing algorithm for the signature in the certificate is identified, if present.
要么是不受信任的证书签名的,或无法找到它的一个组件。
Either it is not signed with a trusted certificate, or one of its components cannot be found.
JAR文件是用一个存储在Keystore数据库中的证书签名的。
A JAR file is signed using a certificate stored in the Keystore database.
但仍需要基本检查,这意味着证书签名者必须存在于信任存储区中。
There is still the basic check, meaning that the certificate signer must be present in the trust store.
我的理解是,一个文件将具有相同的公钥,只有通过我的证书签名。
My understanding is that a file will have the same public key ONLY if signed by my certificate.
要从verisign获取演示证书,您必须首先生成证书签名请求(CSR)。
To obtain a demonstration certificate from VeriSign, you must first generate a certificate Signing Request (CSR).
但GUI工具不能公开那些支持选择证书签名算法的控件,因此默认支持MD 5签名。
The GUI tools do not expose controls that enable selection of the certificate signing algorithm, and they default to MD5 signatures.
如果证书未经可信任的证书颁发机构签名,并且您信任此机构,您可以增加证书签名。
If the certificate was not signed by a trusted certification authority, you can add the certification authority if you trust the authority.
取消锁定后,将能够生成CSR(证书签名应答),或导入CA(证书颁发机构)应答。
When unlocked, you will be able to generate a CSR (Certificate Signing reply) or import a ca (Certificate Authority) reply.
通过对一个标准模型下可证安全的无证书签名方案进行分析,指出该方案是不安全的。
A certificateless signature scheme provably secure in the standard model is analyzed. It points out that the scheme is insecure.
如果旧解决方案是用受信任证书签名的,请使用同一证书对更新的解决方案进行签名。
If the old solution is signed with a trusted certificate, sign the updated solution with the same certificate.
仿真结果表明,DCS-BA在证书签名成功率和证书平均签名时间方面明显好于普通的分布式证书签名算法。
Simulation results demonstrate that DCS-BA is better than current distributed certification signature algorithm in certification signature success ratio and average time.
Requeststobe verified:显示从Web浏览器提交的需要进行验证的证书签名请求(CSR)列表。
Requests to be verified: Displays a list of Certificate Signing Requests (CSR), submitted from Web browsers, that are due for verification.
给出了对一个已有的高效无证书签名方案的替换公钥攻击,表明了在该方案中,攻击者可以通过替换签名者公钥伪造签名;进而针对该攻击提出了改进方案。
Through the cryptanalysis of a new threshold proxy signature scheme based on bilinear pairings, it is found that the scheme cant resist forgery attack and public-key substitute attack.
每一方都将另一方的X . 509证书导入到它们的keystore中,因此,如果请求或响应不是用它们的keystore中已知的证书签名的,这个消息就将被拒绝。
Each party imported the other's X.509 certificate into their keystores, so that if a request or response is not signed with a known certificate in their keystore, the message is rejected.
每一方都将另一方的X . 509证书导入到它们的keystore中,因此,如果请求或响应不是用它们的keystore中已知的证书签名的,这个消息就将被拒绝。
Each party imported the other's X.509 certificate into their keystores, so that if a request or response is not signed with a known certificate in their keystore, the message is rejected.
应用推荐