目的是探讨八肽胆囊收缩素(CCK-8)对经钥孔戚血蓝蛋白(KLH)免疫小鼠T淋巴细胞亚群的影响。
The aim is to study the effects of cholecystokinin octapeptide (CCK-8) on T-lymphocyte subsets in keyhole limpet haemocyanin (KLH)-immunized mice.
信任存储库通常仅包含公钥。
这些签名公钥被称为证书。
从每个证书中提取公钥。
消息的发送方使用接收方的公钥加密消息。
The sender of the message USES the recipient's public key to encrypt the message.
附录4:公钥加密术语。
对称算法将使用服务器的数字证书中的公钥。
The asymmetric algorithm USES the public key in the server's digital certificate.
接收方使用发送方的对应公钥验证数字签名。
The receiver uses the sender's corresponding public key to verify the digital signature.
因此,请求消息会包含如下形式的公钥标识。
As a result, the request message contains the following key identifier namespace.
创建用户网络名以及公钥和私钥对
公钥本身没有多大用处;您不知道它代表什么。
A public key on its own isn't much use; you don't know who it represents.
用于交换秘钥的非对称密钥。
您的公钥代表您允许通过您的大门或锁进入的人。
Your public key represents who you will allow inbound access to through your gate or lock.
KeyInfo表示用于验证签名的金钥。
KeyInfo indicates the key to be used to validate the signature.
RSA公钥密码系统就是基于这种因数分解特性的。
RSA public-key cryptography is based on this property of factorization.
这是摘录算法、金钥从属算法和可能的其它算法的组合。
It is a combination of a digest algorithm, a key dependent algorithm, and possibly other algorithms.
验证选择了刚刚上载的公钥的配置加密认证的文件名称。
Verify the file name for the Configure Crypto Certificate for the public key just uploaded is selected.
这种应用程式必须指定附加金钥、算法、处理和再现需要。
Such an application must specify additional key, algorithm, processing and rendering requirements.
本节将提供逐步指导帮助您创建实例、秘钥、映像和存储。
This section will provide step-by-step instructions to help you create instances, keys, images, and storage.
SSL服务器使用它的私钥对秘钥解密并存储它。
The SSL Server decrypts and stores the secret key, using its private key.
消息的发送方使用接受方的公钥加密消息并发送。
The sender of the message USES the public key of the receiver to encrypt the message to be sent.
任何给定用户的公钥和私钥在数学上是不能相关的。
The public key and private key for any given user aren't mathematically related.
公有密钥分布于名为公钥证书(PKC)的容器中。
Public Keys are distributed in containers called public key certificates (PKC).
首先,签名者可能不希望向所有文件处理方披露任何金钥讯息。
First, the signer may not wish to reveal any key information to all of the document processing parties.
如果您的公钥能够解密条目,则使用您的私钥对它签名。
If your public key can decrypt the entry, then your private key was used to sign it.
识别资料机制可以包括证书、金钥名称和金钥协定算法。
Identification mechanisms can include certificates, key names, and key agreement algorithms.
然而,公钥密码术更进一步,它引入了签名公钥的概念。
However, public key Cryptography takes things a step further and introduces the idea of signed public keys.
JCE 提供程序必须支持生成公钥和私钥的RSA算法。
The JCE provider must support the RSA algorithm type for generating public and private keys.
步骤2:根据用于加密xml的公钥,获取密钥对中对应的私钥。
Step 2: Get the private key of the key pair whose public key was used to encrypt the XML.
在成年人的世界里,可以通过使用公钥—私钥加密来解决此类问题。
In the grown-up world, you solve these problems through the use of public key-private key encryption.
应用推荐