• Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it.

    接收者利用发送者公开密钥他们自己的秘密密钥结合解开该报文秘密编码解密之。

    youdao

  • Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.

    某种可能使用IP安全性协议 (IPSEC)网络加密形式例如虚拟专用网 (VPN))可取解决方案虽然其他合理选择

    youdao

  • A similar request is needed to upload the encryption key, which is private.

    需要一个类似的请求上传私有加密密

    youdao

  • This proof of possession is similar to how the SSL handshake protocol uses encryption to prove that a client is in fact the holder of a private key, without sending the key itself.

    这种所有权证明类似SSL握手协议使用加密证明客户私有持有者而不需要发送密匙本身。

    youdao

  • Because this is using asymmetric encryption, where each side has its own certificate and private key, it should be somewhat simpler to handle than the Listing 5 symmetric-encryption example.

    因为使用非对象加密技术,一端自己证书私有密钥,比起清单5对称加密技术示例,处理起来更为简单。

    youdao

  • The public/private keys need to be created for each host. They will be used both for encryption and identification of the hosts.

    需要主机创建公共/私有密匙它们用于加密主机识别

    youdao

  • The encryption guarantees the data confidentiality on the topic, because only the service provider owning the right private key can perform decryption correctly and, thus, understand the data.

    加密可以保证有关某个主题数据机密性原因只有拥有正确服务提供者才能正确执行解密因此也能读懂数据。

    youdao

  • Trust is also established from a technology perspective using cryptographic methods, including encryption keys, private or public keys, digital signatures, or protocols.

    技术角度来看,可以使用各种加密方法建立信任包括加密密钥私钥公钥数字签名或者协议

    youdao

  • It is helpful (but not necessary) for you to be familiar with basic concepts of security such as private and public keys, signatures, and encryption.

    熟悉安全基本概念(比如私钥公钥签名、加密)会帮助,不是必需的

    youdao

  • The keys that you set up will be used for authentication, and the encryption will be handled automatically through the public/private key.

    设置用于身份验证加密通过公共/私有密匙自动处理

    youdao

  • With PGP and other public-key encryption methods, there's no way to deduce someone's private key from the public key.

    对于PGP其他公钥加密方法存在公钥推断某人方法

    youdao

  • Certificates, private keys, and encryption keys are too hard to manage.

    证书加密密钥非常难于管理

    youdao

  • As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.

    正如Axis2WS - Security签名加密”中所介绍的,可以使用消息进行签名使用接收者公钥对消息进行加密

    youdao

  • Using asymmetric encryption with public/private key pairs for signing and encrypting messages is simple (at least conceptually!).

    使用不对称加密public/private密钥对进行消息签名加密简单的(至少概念上很简单)。

    youdao

  • To create the public or private key, you need to use ssh-keygen, specifying the type of key encryption.

    创建公钥需要使用ssh-keygen指定密钥加密类型

    youdao

  • So public-private key pairs can be used for both encryption and signing of messages exchanged between two parties, provided each party has access to the other's public key.

    公开-私有密匙可以同时用于双方之间交换信息进行加密签名假设交换双方都可以访问对方公开

    youdao

  • In the grown-up world, you solve these problems through the use of public key-private key encryption.

    成年人世界里可以通过使用公钥—私钥加密来解决此类问题

    youdao

  • This section describes the process of generating the public-private key pair, which is the basis for encryption and digital signature.

    一部分介绍生成公钥-私过程加密数字签名基础

    youdao

  • Encryption using a public-private key is slow and is directly proportional to the size of the data being encrypted.

    使用公司密钥加密很慢而且直接与加密数据大小成正比

    youdao

  • The private key forever in chip, and public key authentication and encryption to send to the chip sensitive data.

    这个私有密钥永远芯片里,公共密钥用来认证加密发送芯片的敏感数据

    youdao

  • Disk Encryption works on the fly, so there's no need to shut down or reboot the PC to encrypt private data.

    磁盘加密工程飞行所以无需关闭重新启动电脑加密私人数据

    youdao

  • The three types of security: authentication, encryption and encapsulation, forms the foundation of virtual private networking.

    安全有身份验证加密封装,它们是各种虚拟专用网络基础

    youdao

  • "Encryption" is the process of scrambling data using a kind of code known only to the software doing the coding, so that anyone accessing the private data is unable to read it.

    加密采用加扰数据类型代码知道软件编码任何人访问私人数据是无法读取如此过程

    youdao

  • As the encryption algorithm and decryption algorithm are open to everyone, so the private key storage management becomes an insecure part in public key system.

    公钥密码系统中加密解密算法公开的,因此存储管理成了公钥系统安全薄弱的环节

    youdao

  • If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.

    如果加密解密操作成功地使用密钥,那么必定在操作某个部分使用了密钥中的

    youdao

  • When sending private messages, your application does not need to perform the message encryption.

    发送私有消息应用程序需要执行消息加密。

    youdao

  • Protocol analysis module, asynchronous encryption and SADB realized are discussed in the system of virtual private network.

    本文主要讨论了虚拟专用网络系统协议分析模块异步加密模式SADB实现。

    youdao

  • When sending private messages, it is not necessary that your application perform the message encryption.

    发送私有消息,应用程序不必执行消息加密。

    youdao

  • When sending private messages, it is not necessary that your application perform the message encryption.

    发送私有消息,应用程序不必执行消息加密。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定