• This proof of possession is similar to how the SSL handshake protocol uses encryption to prove that a client is in fact the holder of a private key, without sending the key itself.

    这种所有权证明类似SSL握手协议使用加密证明客户私有持有者而不需要发送密匙本身。

    youdao

  • In the grown-up world, you solve these problems through the use of public key-private key encryption.

    成年人世界里可以通过使用公钥—私钥加密来解决此类问题

    youdao

  • The private key forever in chip, and public key authentication and encryption to send to the chip sensitive data.

    这个私有密钥永远芯片里,公共密钥用来认证加密发送芯片的敏感数据

    youdao

  • As discussed in "Axis2 WS-Security signing and encryption," you use your private key to sign messages and the recipient's public key to encrypt messages.

    正如Axis2WS - Security签名加密”中所介绍的,可以使用消息进行签名使用接收者公钥对消息进行加密

    youdao

  • If a key pair is successfully used in an encryption and decryption operation, the pair's private key must have been used for one part of the operation.

    如果加密解密操作成功地使用密钥,那么必定在操作某个部分使用了密钥中的

    youdao

  • As the encryption algorithm and decryption algorithm are open to everyone, so the private key storage management becomes an insecure part in public key system.

    公钥密码系统中加密解密算法公开的,因此存储管理成了公钥系统安全薄弱的环节

    youdao

  • As the encryption algorithm and decryption algorithm are open to everyone, so the private key storage management becomes an insecure part in public key system.

    公钥密码系统中加密解密算法公开的,因此存储管理成了公钥系统安全薄弱的环节

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定