The key generation is performed by the requesting user.
密钥的生成由发起请求的用户自己完成。
The application USES entities with table identity or database sequence key generation.
应用程序使用带有表标识或数据库序列密钥生成器的实体。
The signature private keys of signer are completed by several key generation centers.
签名者的签名私钥由多个密钥生成中心共同决定。
Key management includes key generation, key storage, key transmitting and key deletion etc.
密钥管理包括密钥生成、存储和检验、传送与删除等。
In the later versions some key generation algorithms, which use hash algorithms, have been added.
在后来的版本中一些关键的生成算法,它使用哈希算法,已被添加。
Based on distributed key generation protocol, we design a verifiable Generalized Vickrey Auction protocol.
基于可验证的分布式密钥生成方案,设计了一个可验证的广义二次拍卖模型。
This paper has following contributions:1. Key generation is one of the difficult problems in RSA cryptosystem.
本文在研究过程中,有以下几点贡献:1.密钥对的生成是RSA系统设计的难点之一。
Next, let's look at an example that uses both key generation mechanisms and stores the data using the dynacache infrastructure.
接下来,我们看一个示例,它使用了这两种键生成机制,并且通过dynacache基础设施存储数据。
Primary key generation and unknown primary key field handling is now becoming supported, and more people are beginning to use it.
现在已经开始支持自动生成主键和未知的主键字段处理,而且越来越多的人开始使用它。
If I were using only the password for key generation, a given password would always generate the same key on all Kerberos servers.
如果我只使用密码生成密钥,那么一个给定的密码在所有Kerberos服务器上总是会生成同样的密钥。
In order to make the generation of the cache keys reusable for individual projects, separate the key generation into its own class.
为了生成可供各个项目重用的缓存键,可以将键生成分类。
To satisfy the characteristic of distributed routing protocol, a distributed key generation algorithm based on RSA is presented.
为了适应分布式路由协议的特点,提出了分布式的基于RSA的密钥生成算法。
The RSA key generator is made up of two parts: random number generator (RNG) and the implementation of RSA key generation algorithm.
RSA密钥生成器由两大部分构成:硬件随机数发生器和RSA密钥生成算法的软件实现。
Other features that Geronimo developers are currently working on include automatic primary key and unknown primary key generation for CMP.
Geronimo开发人员目前正在开发的其他功能包括自动为CMP生成主键和未知的主键。
The eighth step during our secret key generation process is to check whether the byte array after parity fixing turns out to be a weak key.
我们的密钥生成过程的第八步是要检查奇偶修正后的字节数组是否是一个弱的密钥。
Key management is the core of the symmetric cryptographic communication, and the key generation method is the foundation of the key management.
密钥管理是对称密钥加密体制的核心,而密钥产生方法则是密钥管理的基础。
A distributed key generation protocol for public key cryptosystem based on discrete-log is proposed using generalized verifiable secret sharing.
利用广义可验证秘密分享,提出了基于离散对数的公钥体制的密钥的分布式生成协议。
When the loop exits, I simply return the encryption result of the last data block, which is the result of Step 9 of the secret key generation process.
循环退出时,我只是返回最后一个数据块的加密结果,这就是密钥生成过程第9步的结果。
This can be attributed to the fact that both the original database and PostgreSQL support sequences, so the primary key generation strategy stayed intact.
这可能要归结于这一事实:原始数据库和PostgreSQL这两者均支持序列,因此主键生成策略保持完好。
Because I'm only going to support DES-CBC in the Kerberos client, I will only discuss the secret key generation process used by DES-CBC, which is as follows.
因为我只打算在这个Kerberos客户机中支持DES -CBC,所以我将只讨论DES - CBC所使用的密钥的生成过程,如下所示。
As a result, if you rely on database sequences (such as for automatic primary key generation), it's likely that an identical primary key will show up across a set of databases.
因此,如果您依赖于数据库序列(如自动主键生成),很有可能在一个数据库集中将出现同一个主键。
To eliminate the original signers forgery attacks, a modification of the proxy key generation stage is proposed. Security analysis of the improved scheme is also presented.
为了抵抗原始签名人的伪造攻击,改进了代理签名密钥的生成过程,并对改进的方案进行了安全性分析。
The frequency hopping pattern thus generated has not only good randomicity and uniformity, but also features for easy implementation and encryption key generation easily controlled.
由该函数产生的跳频图案不仅有良好的随机性和均匀性,而且具有易于硬件实现和密钥产生控制的特点。
According to the complexity of key generation and management process, this paper presents an encryption algorithm based on fingerprint to enhance the security of the digital information.
根据密钥产生和管理过程的复杂性,为增强数字信息安全性,提出一种基于指纹的数字信息加密算法。
Depending on your WebSphere Application Server version and patch level, automatic key generation might be on or off by default; the more recent the version, the more likely it is off by default.
根据WebSphereApplicationServer和补丁级别不同,自动密钥生成在默认情况下可能启用了,也可能关闭了;版本越新,默认情况下它关闭的可能性越大。
In encryption and digital signatures, everything ultimately boils down to the cryptography algorithms used to generate keys. Here are the criteria on which the key generation algorithms are based.
在加密和数字签名中,所有的事情都最终归结为生成密钥的加密算法。
The key management algorithm based on the new scheme includes several sub algorithms, such as key generation, group key agreement, key update, nodes joining operation and nodes existing operation.
基于该密钥管理模型的算法包含了密钥的生成、组密钥协商、密钥更新、节点加入处理和退出处理等子算法。
A new approach to VLSI implementation of RSA key generation is proposed in the paper, in which logic units are added to the RSA cryptography coprocessor to realize RSA key generation and encryption.
文章给出了一种RSA密钥生成的VLSI实现方案,在RS A协处理器基础上增加若干运算单元,来完成RSA密钥生成和加解密操作。
Whether tablets are really the key to good grades will be seen in the years to come, when this generation writes their final exams.
平板电脑是否真的是取得好成绩的关键将在未来几年,这代人考期末考的时候得到验证。
Whether tablets are really the key to good grades will be seen in the years to come, when this generation writes their final exams.
平板电脑是否真的是取得好成绩的关键将在未来几年,这代人考期末考的时候得到验证。
应用推荐