识别为基的金钥;身分为基的金钥 identity-based key 识别为基的安全政策;身分为基的保全政策 identity-based security policy 识别为基的签章;身分为基的签章 identity-base...
基于12个网页-相关网页
识别为基的金钥;身分为基的金钥 identity-based key 识别为基的安全政策;身分为基的保全政策 identity-based security policy 识别为基的签章;身分为基的签章 identity-base...
基于12个网页-相关网页
Identity based key agreement 基于身份标识的密钥共识协议
Identity-based Public-key Authentication 标识的公钥认证技术
identity based public key system 身份的公钥密码体制
Identity Based Public Key Cryptography 身份的公钥密码学 ; 基于身份的公钥密码学
identity-based public key 基于身份的公钥
Temporary identity-based public key 临时身份公钥
identity-based public key encryption 基于身份公钥加密
The master private key is Shared by the private key of every node. Threshold and identity-based key management and authentication are used.
各节点使用其身份作为公钥,主密钥由各节点的私钥分享,从而形成基于身份的门限分布式密钥管理。
An SSH-based identity consists of two parts: a public key and a private key.
一个基于ssh的身份包括两个部分:一个公钥和一个私钥。
One of the key advantages of DSig-based protocols is the ability to both assert identity and create a tamper-proof envelope of the content of the message which are often both required together.
基于DSig的协议有个很主要的优势——断定身份的同时还能创建消息内容的防篡改信封,这两个功能通常都要求同时出现。
应用推荐