Verification of the signature is a key in any signature-based form implementation.
签名验证在任何基于签名的表单实现中都是关键部分。
They also place verification and validation of all the other key process areas within quality assurance.
他们也将所有其它关键过程域的验证和确认放在了质量保证中。
The public key is now available for the provider gateway to use in signature verification.
公共密钥现在可供提供者网关在签名验证中使用。
This category of overhead includes CHECK constraint verification and foreign key constraint (referential integrity (ri)) verification.
这一类的开销包括检查约束验证和外键约束(参照完整性(RI))验证。
The latter is actually a primary key lookup against the parent table and constitutes the foreign key constraint verification.
索引扫描实际上是对父表进行主键查找,并完成外键约束验证。
This option causes GPG to retrieve a key from wwwkeys.gpg.net as part of the verification process.
该选项导致gpg将检索来自wwwkeys.gpg.net的密钥作为验证过程的一部分。
Likewise, you can use SignedObject for data verification, and again the symmetric key must be managed independently.
同样,也可以将SignedObject用于数据验证,并且对称密钥也必须单独管理。
To undertake the review and verification of projects of the safety technology renovation of key coal mines and the comprehensive gas control and utilization.
承担对国有重点煤矿安全技术改造和瓦斯综合治理与利用项目的审核工作。
Portal image verification is one of key QA procedures for implementation of accurate radiotherapy.
照射野验证是实施精确放射治疗质量保证(QA)的关键步骤之一。
Each center is guarded by multiple security procedures, including biometric identification, key card access, elevator lock outs and human verification.
每个中心采用多种安全手段以保证安全,包括生物识别、门禁卡、电梯锁和人工检查。
The formal description techniques for intelligent network (IN) service and the theory and methods in IN's service verification are the key technologies in IN's realization.
智能网业务的形式化描述技术和业务验证的理论与方法是目前智能网(IN)业务实现过程中的关键技术。
RTL hybrid satisfiability solving is the key technique of RTL verification.
RTL混合可满足性求解是RTL验证中的关键技术。
On the ground of deduction, the paper chose a more serials of public key authentication protocols to use the tool SPV for automatic verification, and got expected results.
在进行公理推导的基础上,本文还利用工具SPV对更多的公钥认证协议进行了自动化验证,与协议推导取得了一致的验证结果。
With case application, the key of capacity verification about detection laboratory was to select correct degree of designated value and active value.
通过实例运用,指出正确选择指定值和变动性度量是实验室能力验证达标的关键。
The paper explains the verification importance, method, procedure and key points of the electrical working drawing of a refining chemical device and some problems of common drawings.
阐述了炼化装置的电气施工图纸审核的重要性、审核的方法、审核顺序、审核要点,以及常见图纸问题。
For traditional digital signature, the signature information has only one signature member, any the verification member can use the public key to verify the validity of the signature.
在传统的数字签名中,对信息的签名只需要一个签名者,任何验证者使用签名公钥就可验证签名的有效性。
This paper designs and implements key technology of high dynamic GPS/BD-2 receiver and the verification platform, with main researches on PLL and rapid acquisition.
本文研究了高动态GPS/BD-2软件接收机关键技术并设计实现了其验证平台,其中研究的重点是锁相环及快速捕获方法。
Along with the development of IP products, verification is the key part, for highly efficient, reliable and comprehensive verification is the guarantee of a successful development of the IP module.
在IP产品开发中,验证工作是一个非常关键的部分,高效、可靠、全面的验证工作是IP模块开发成功的保证。
They allow verification of the claim that a given public key does in fact belong to a given individual.
用它可以验证一个给定的公钥确实属于某一个人。
The improved TTS key negotiation protocol, with small calculation cost, makes great progress in key verification, data source authentication and resist inners attack.
改进的TTS密钥协商协议,以很小的计算代价使原tts协议在密钥证实性、源认证和抗同谋破解上有了很大改善。
This thesis is mainly about the study and design of the Automatic fingerprint verification system applying for one to one match, including the key algorithm.
论文主要对应用于“一对一匹配”的指纹认证系统的设计及其关键算法的实现进行了研究。
The basic operation principle and settlement of the key technology of the verification system of the error of indication for grating type of length measuring instrument are described in this paper.
介绍了光栅式长度仪表示值误差检定系统的基本工作原理以及关键技术的解决。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
A smart card based on remote access password authentication scheme is given, which can verify a log-in password without verification table. It utilizes the signature property of public key systems.
给出了一个基于智能卡的远程访问口令认证方案,它能够对登录口令进行检验而不需要检索口令表。
A smart card based on remote access password authentication scheme is given, which can verify a log-in password without verification table. It utilizes the signature property of public key systems.
给出了一个基于智能卡的远程访问口令认证方案,它能够对登录口令进行检验而不需要检索口令表。
应用推荐