• How to: Store Asymmetric Keys in a Key Container.

    如何:将非对称密钥存储密钥容器中。

    youdao

  • The issued token can have a symmetric or an asymmetric key.

    发行权杖具有对称对称金钥。

    youdao

  • The symmetric key itself is encrypted by one or more asymmetric keys (public keys).

    这个对称本身一个多个对称密匙(公共密匙)加密。

    youdao

  • When implemented, gets a value that indicates whether the token has an asymmetric key.

    实现将获取一个值指示令牌是否支持客户端身份验证。

    youdao

  • Several technologies exist for encryption, such as symmetric key cryptography and asymmetric key cryptography.

    目前有几种加密技术对称密钥密码系统对称密钥密码系统。

    youdao

  • An asymmetric key (public key) algorithm is used for the exchange of the secret keys to be used in symmetric algorithm and for digital signatures.

    对称密钥(公钥)算法用于交换对称算法中使用加密密钥以及用于数字签名

    youdao

  • In other words, a single symmetric key can be encrypted by using multiple certificates, passwords, symmetric keys, and asymmetric keys at the same time.

    换言之可以同时使用多个证书密码对称密钥以及对称密钥对单个对称密钥进行加密

    youdao

  • The symmetric key systems compared with asymmetric key systems have astounding speed benefits, but managing their keys has always been difficult problem to be solved.

    对称密钥系统较之对称密钥系统具有惊人速度优势但是管理对称密钥系统的密钥却是需要解决的一个难题。

    youdao

  • Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.

    因为使用非对象加密技术,一端自己证书私有密钥,比起清单5对称加密技术示例,处理起来更为简单。

    youdao

  • Public-private key combination is at the heart of Public key Infrastructure (PKI), and is based on asymmetric cypher.

    公钥-私组合公共密钥基础设施核心建立非对称密码的基础

    youdao

  • Symmetric algorithms have faster performance than asymmetric algorithms, but passing the secret key securely between participants poses a distribution problem.

    对称算法性能对称算法的性能但是参与者之间安全地传递引起分发问题

    youdao

  • Asymmetric cryptography: Public-key cryptography (these two terms are synonyms).

    不对称加密公钥加密(两个术语同义词)。

    youdao

  • An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.

    对称算法使用不同密钥消息进行加密解密;其中个秘必须秘密的,一个密钥通常是公开的。

    youdao

  • The important point is that the keys are asymmetricinformation encrypted with one key can be decrypted using the other key.

    关键的问题这些密钥是非对称的——使用密钥加密信息可以使用另一个密钥来解密

    youdao

  • The important point is that the keys are asymmetric; information encrypted with one key can be decrypted using the other key.

    关键的问题这些密钥是非对称的;使用密钥加密信息可以使用另一个密钥来解密

    youdao

  • The transmitted data is encrypted using public key (asymmetric) cryptography so that only the holder of the corresponding private key can decrypt the data.

    传递数据使用公钥(非对称)加密算法加密所以只有对应持有者才能解密数据。

    youdao

  • The asymmetric algorithm USES the public key in the server's digital certificate.

    对称算法将使用服务器数字证书中的公钥

    youdao

  • Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).

    使用不对称加密public/private密钥对进行消息签名加密简单的(至少概念上很简单)。

    youdao

  • As discussed in "Axis2 WS-Security signing and encryption," asymmetric encryption is a useful tool because it works with key pairs.

    正如Axis2WS - Security签名加密文中讨论的,非对称加密由于处理密对,因此一种很有用的工具

    youdao

  • The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.

    用于数据加密密钥使用带有与服务提供者(Service Provider)的 X.509 证书相关联公钥对称算法进行加密的。

    youdao

  • The public key cryptosystem or the asymmetric cryptosystem is an important way to implement and ensure information security.

    公开密码系统对称密码系统实现保障信息安全的一种重要方式

    youdao

  • Angle of attack and nose shape of bodies are key factors that asymmetric vortex occurs over slender bodies.

    迎角成体的外形,尤其是头部几何形状细长前体出现对称涡的关键因素

    youdao

  • Represents the size, in bits, of the key modulus used by the asymmetric algorithm.

    表示不对称算法所用密钥模块大小(位为单位)。

    youdao

  • A group of deep-shallow thrusting sheets and asymmetric deformationfan-tectosomes is a key tectonic(division)domain in S. China orogenic zone.

    深部—浅部系列冲断构造块体不对称扇形构造形变体组成区内“华南造山带”一个重要的构造单元。

    youdao

  • Compared with other asymmetric cryptography, ECC provides higher strength per bit, makes faster computation and requires shorter key length.

    其它非对称加密体制相比ECC被认为能提供更高的加密强度,并具有更快的执行速度更小的密钥长度。

    youdao

  • The author emphasis that investment banking has advantage in the decision of stock price in the process of IPO owing to information asymmetric and often play a key role in the success of IPO.

    其中强调投资银行解决IPO定价中的信息不对称问题具有专业优势往往对IPO成功发行关键作用

    youdao

  • Key restrictions are the asymmetric bandwidth of the communications channel and latency.

    关键不对称带宽限制延迟通信通道

    youdao

  • Asymmetric cryptographic algorithms, also known as public-key algorithms, require that each entity maintains a pair of related keys: a private key and a public key.

    不对称加密算法(称为公钥算法)要求每个实体都维护一对相关密钥公钥

    youdao

  • The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.

    密钥RC4加密生成初始密钥交换中的RSA非对称加密使用

    youdao

  • The RC4 encryption keys are generated after an initial key exchange in which RSA asymmetric encryption is used.

    密钥RC4加密生成初始密钥交换中的RSA非对称加密使用

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定