What you can infer from this is that the key store used to hold a private key for use with SSL should contain only one private key (it can contain other public key certificates).
从这里您可以看出,使用SSL 的用于包含私钥的密钥存储应该只包含一个私钥(它可以包含其他的公钥证书)。
The signing key is the private key of the subject and the verifying key has the certificates attached to the key.
签名密钥是主体的私钥,检验密钥带有附加的证书。
Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.
步骤4:利用一个数据加密密钥、一个密钥加密密钥、与这两个密钥相关联的算法、以及将来包含在输出信息中的密钥信息,根据它们来创建一个Encryptor对象。
ssh-keygen -f /tmp/key -t dsa will give you a private key in a file called key and a public key in a file called key.pub.
ssh-keygen-f /tmp/key -tdsa可以在文件 key 中生成一个私钥,在文件 key.pub 中生成一个公钥。
Click Add a key, copy content of the key file (excluding the header ssh-rsa and the endnote rsa-key-20091222) and paste it to the key contents field.
单击addakey,复制这个密钥文件的内容(不包括头ssh-rsa和尾rsa - key - 20091222)并将其粘贴到keycontents字段。
Create private-public key pairs using a strong passphrase and password protection for the private key (never generate a password-less key pair or a password-less passphrase key-less login).
为私有密钥使用一个强大的口令和密码保护来创建公私密钥对(绝不要生成一个无密码的密钥对或一个无密码口令无密钥的登录)。
Key management includes key generation, key storage, key transmitting and key deletion etc.
密钥管理包括密钥生成、存储和检验、传送与删除等。
Based on extension methods, this paper presents the formal conceptions of key problems and key strategy, studies the properties of key strategy, and proposes the basic steps to make key strategy.
本文利用可拓方法,建立了关键问题和关键策略的形式化概念,分析了关键策略的性质,提出了关键策略的生成步骤。
The distributed key management system based on binary tree is divided into the key management system of one key center and the key management system of multi - layer binary tree.
基于二叉树的分布式密钥管理体系分为单个密钥中心下的密钥管理系统和多层二叉树密钥管理系统。
When the algorithms open, the decryption key can not be calculated by encryption key so the encryption key could be open, only keep decryption key secret, that is public key.
当算法公开时,在计算上不可能由加密密钥求解解密密钥,因而可以将加密密钥公开,即公开密钥。
Proper key renewal period might control the trade-off between security and renewal cost in key management, and thus key exposure was first studied to estimate key life.
在密钥管理中,合适的密钥更新周期将在密钥安全性和更新代价之间取得平衡,密钥泄漏过程首次被研究以估计密钥寿命。
The key file was generated with encrypted user key to store in the field of key in key storage table, and the key file was decrypted with the inputted user key.
用户密钥加密运算后生成的密文存入密钥存储表密钥字段,用输入的密钥解此密文。
Public Key and Asymmetric - Public-key cryptography uses a pair of keys, one that is designated the private key and kept secret, the other key is called the public key and is generally made available.
公钥和非对称公钥密码学使用一对密钥,其中的一个定义为私钥并加密存放,另外一个被称为公钥,通常无须加密。
Operational Guidelines: School Official Cites Use of the key direction of movement through the X-Key to open a shield volca, the key active shield Z, Key box shooting.
操作指南:方向键移动,X键开启保护罩穿过火山口等,Z键收起保护罩时,空格键射击。
Public key cryptosystem allows users to deliver public key in an insecure cyberspace, such property brings great convenience to key distribution, but does not solve the core issue of key management.
公钥密码体制允许用户在不安全的网络空间中公开传播公钥,这种特性为密钥分发带来了极大的便利,但是并没有解决密钥管理的核心问题。
A key that, when pressed in combination with another key, gives the other key an alternative meaning; for example, producing an uppercase character when a letter key is pressed.
当一个键与另一个键组合使用时,它可改变另一个键的含义,例如,在按下某个字母键时产生大写字母。
You have the fastest team to adjust the status of each row, use the Z key, let them attack, use the X key to defense, use the C key to the release of their skills, use the V key to switch teams.
你必须用最快的速度来调整每一排队伍的状态,使用z键,让他们一起攻击,使用x键来防御,使用c键来释放他们的技能,使用v键来切换队伍。
The key management algorithm based on the new scheme includes several sub algorithms, such as key generation, group key agreement, key update, nodes joining operation and nodes existing operation.
基于该密钥管理模型的算法包含了密钥的生成、组密钥协商、密钥更新、节点加入处理和退出处理等子算法。
There are three kind of key agreement protocols: two-party key agreement protocols, three-party key agreement protocols, group key agreement protocols.
根据参与者数目的不同,密钥协商协议分为两方密钥协商协议、三方密钥协商协议和组密钥协商协议。
The direction switch is provided with an up key, a down key, a left key and a right key.
所述的方向开关分别是上按键、下按键、左按键、右按键。
The device comprises a grille window, a small display screen, a selection digital key, a random digital shifting key, a correction key, a confirming key and an operation platform.
它是由格子窗、小显示屏、选择数字键、随机数字换位键、更正键、确认键和操作平台组成。
Provide automatic key AA/BB, 8 directions key , and TRIGGER KEY that can let shoot key down without press shoot key all the time.
自界说控制,提供自动放射的AA/BB,八标的目的,触发键可能让你不消连续按着放射键。
An access key (also known as a hot key) allows users to press the ALT key plus another key to jump to a specific control on the page without using the mouse.
访问键(也称热键)使用户可以在不使用鼠标的情况下通过按alt键和其他键跳转到页面上的特定控件。
The scheme is based hierarchical key tree and multi-party key agreement. It possesses the desired properties, such as key independence and key statelessness.
提出的方案基于层次密钥树结构和多方密钥协商并具有密钥独立性和无状态型等特征。
In the paper, analyzed the individual rekeying on key tree and key star and the server' cost on batch rekeying of key tree and key star.
目前,密钥图的方案已经被提出,其中树形结构密钥图和星型结构是两种重要类型。
In the paper, analyzed the individual rekeying on key tree and key star and the server' cost on batch rekeying of key tree and key star.
目前,密钥图的方案已经被提出,其中树形结构密钥图和星型结构是两种重要类型。
应用推荐