PGP-signed artifacts with public keys.
PG P签名的工件,带有公共密钥。
Explicit expiration of public keys.
明确的公共密钥到期日。
Enabling automatic login using public keys.
使用公共密钥启用自动登录。
These signed public keys are called certificates.
这些签名公钥被称为证书。
The truststore normally only contains public keys.
信任存储库通常仅包含公钥。
Extract public keys from each of the certificates.
从每个证书中提取公钥。
Create an authorization file containing the public keys, as shown below.
创建一个包含公钥的授权文件,如下所示。
Manually creating the private and public keys and public-key certificate.
手动创建私有、公共密钥和公共密钥证书。
You can import public keys created by other Encryption Expert security servers.
您可以导入由其他EncryptionExpert安全服务器创建的公共密匙。
The symmetric key itself is encrypted by one or more asymmetric keys (public keys).
这个对称密匙本身又由一个或多个非对称密匙(公共密匙)加密。
Public Keys are distributed in containers called public key certificates (PKC).
公有密钥分布于名为公钥证书(PKC)的容器中。
Create the private and public keys (see "Managing Digital Certificates" for details).
常见私钥和公钥(请参阅“管理数字证书”以获得详细信息)。
Digital certificates are the mechanism for providing public keys in this vouched-for form.
数字证书就是一种以第三方证明的形式提供公开密匙的机制。
GPG creates one list, or keyring, for your public keys and one for your private keys.
GPG为你的公钥创建一个列表或密钥串,为你的私钥也创建一个。
But One-time Signature scheme usually have large public keys which limit their usage.
一次签名方案的缺陷在于公钥较长,从而导致认证信息较长。
Once the public keys are available, encrypted (S/MIME) messages can be sent between the users.
一旦获得了公开密钥,两个用户就可以相互发送加密(S/MIME)的消息。
Key servers store your public keys for you so that your friends can decrypt your messages.
密钥服务器为你保存你的公钥,以便你的朋友可以解开你的信息。
If there was a secure way to distribute public keys to trusted parties, that would be enough.
如果有一种安全的方法可以将公钥分发给受信任的群体,这就足够了。
By using the public keys, the image of watermark can be authenticated without the original image.
水印的认证利用了第三信任方和版权者的公钥,而不需要原始图像参与。
You just saw how to manually create the private and public keys and to sign and optimize the application.
刚才学习了如何手动创建私有、公共密钥,以及签署和优化应用程序。
Public keys, however, must be larger, because the mathematics in an asymmetric algorithm are different.
然而,公开钥匙必须更长,因不对称算法中的数学是不同的。
The wide use of public key cryptography requires the ability to verify the authenticity of public keys.
公钥密码学的广泛应用使得公钥真实性的可验证性成为必要条件。
The certificate contains identity credentials and has a pair of private and public keys associated with it.
这个证书中包含身份凭证,并且具有一对与之相关联的私钥和公钥。
However, public key Cryptography takes things a step further and introduces the idea of signed public keys.
然而,公钥密码术更进一步,它引入了签名公钥的概念。
Users can make their public keys freely available or place them at a key distribution centre for others to access.
用户可以让公开密钥自由使用或者把公开密钥放在可由别人存取的密钥分配中心。
Remember that you only need to copy the gvpe.conf, if-up, and the public keys directory (pubkey) from the etc/gvpe directory.
记住,您只需从etc/gvpe目录复制gvpe.conf 文件、if-up 脚本和公共密匙目录(pubkey)。
These are data constructs digitally signed by some signer (typically a Certificate Authority, but public keys can be self-signed).
这些是由某一签名者(通常是CertificateAuthority,但公钥可以是自签名的)数字化地签署的。
By default, rsync USES Secure Shell (SSH) as its transport mechanism; you can reuse your machine aliases and public keys with rsync.
在默认情况下,rsync使用SecureShell (SSH)作为传输机制;可以在rsync中重用机器别名和公共密钥。
With the flexibility of allowing public keys to be open comes the issue of mechanisms for making them available to the general public.
允许公钥公开的灵活性也带来了问题,需要一种机制使普通公众能够使用它。
With the flexibility of allowing public keys to be open comes the issue of mechanisms for making them available to the general public.
允许公钥公开的灵活性也带来了问题,需要一种机制使普通公众能够使用它。
应用推荐