1. This last may also be in a key signature to show changes in key.
升降号也可画在调号上以表示调的改变。

来自互联网

2. The third party USES the message, the key signature and the known public key to verify the source as trusted.
第三方再根据该讯息、金钥签章与已知的公开金钥,认证该讯息具有可信赖的来源。

来自互联网

3. In this paper, an efficient self-certified public key signature scheme was proposed by using bilinear pairings.
为此使用双线性对,构造了一种高效的自认证公钥签名方案。

来自互联网

4. Based on the NP-complete weak independence problem, a concrete scheme is proposed to exemplify the shared-key signature.
基于NP -完全的弱独立性问题,给出一个具体的签字方案。

来自互联网

5. A key signature is placed at the beginning of a piece of music or of a section to indicate the key of the piece or section.
调号位于一篇音乐作品或一章节的开始部分,来表示该作品或章节的调域。

来自互联网

6. The only way to guarantee that the public key signature is from the owner is for the owner to hand you the key on a disk, in person.
保证公共密钥签名来自所有者的惟一方法是,密钥的所有者亲自把磁盘上的密钥交给您。

来自互联网

7. XML Encryption relies entirely on the XML Digital Signature specification for key exchange.
对于密钥交换XML加密完全依赖于 XML数字签名规范。

来自互联网

8. The trusted third party vouches for the public key and identifying information by issuing the certificate with its signature.
可信的第三方通过使用其自己的签名发出证书,为公开密匙和识别信息做证明。

来自互联网

9. The recipient of the payload can validate the digital signature using the public key of the sender.
有效载荷的接收者可以使用发送者的公开密钥验证数字签名。

来自互联网

10. Modification of this variable is key to determining what amount of variability is acceptable during a click-time signature match.
修改此变量对于确定在匹配单击时间签名时可以接受的可变性非常关键。

来自互联网

11. The public key is now available for the provider gateway to use in signature verification.
公共密钥现在可供提供者网关在签名验证中使用。

来自互联网

12. The process involves the sender generating the message digest, then encrypting the digest using its private key to create the digital signature.
这个过程包括发送方生成消息摘要,然后用其私钥对摘要加密以创建数字签名。

来自互联网

13. Only the holder of the key could have created the signature component.
只有密钥持有者才能创建签名组件。

来自互联网

14. The second byte of "01" indicates that this is a private key operation (e.g. it's a signature).
第二个字节“01”说明这是一个私钥操作(如,它是一个签名)。

来自互联网

15. Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。

来自互联网

16. A signed public key has a digital signature (quite analogous to a human signature) that states that the signer vouches for the public key.
签名公钥有数字签名(非常类似于人工签名)来表明签署者对公钥的担保。

来自互联网

17. This signature is based on a common IBM master key, which is available only inside IBM.
此数字签名基于公用IBM主控密钥,此密钥仅在 IBM内可用。

来自互联网

18. The operation signature is changed to accept, in addition to a key, a request template, and then returns a response template.
操作签名更改为接收请求模板(和密钥),然后返回响应模板。

来自互联网

19. An XML signature generated from the private key of the sender and affixed to the XML ensures the non-refutability of the sender.
由发送者的私钥生成的附在xml上的XML签名保证了发送者的不可驳性。

来自互联网

20. Similarly, with a digital signature the sender of the message signs the message using his or her own private key.
类似地,数字签名则是消息发送方使用自己的私钥签署消息。

来自互联网

21. The signature verifier must have access to the public key certificate that contains the public key associated with the private key used to produce the signature.
签名验证者必须有权使用包含与用于生成签名的私钥关联的公钥的公钥证书。

来自互联网

22. The signature component of the message (see Listing 6) provides the proof of possession of the Secret Key id.
消息的签名组件(见清单6)提供拥有SecretKeyID的证明。

来自互联网

23. When Ellie receives the message from Jethro, her Lotus Notes client checks his signature via his digital certificate containing his public key that was published in a directory.
当ellie收到Jethro发出的消息时,她的LotusNotes客户程序就会使用在一个目录中发布的包含Jethro的公开密钥的数字证书检查签名。

来自互联网

24. apikey=Qwerty2010&timestamp=1261496500" and the signature is the HMAC-SHA256 hash of that string using the private component of the API key.
apikey=Qwerty2010×tamp=1261496500" ”,而签名是应用API密钥的私钥所得到的HMAC-SHA256哈希值。

来自互联网

25. Each issued U-Prove token contains an unforgeable digital signature of its Issuer on the entire contents, created by the Issuer by applying its private key.
每个发布的U - Prove令牌都包含了发布方关于所有内容的不可伪造的数字签名,这是通过使用它的私钥由发布方创建的。

来自互联网

26. KeyInfo indicates the key to be used to validate the signature.
KeyInfo表示用于验证签名的金钥。

来自互联网

27. The third command creates a 1024-bit Digital Signature Algorithm (DSA) key (-b 1024 -t dsa), turns off output (-q), and specifies the name of the key and that there is no password.
第三个命令创建了一个 1024位的DigitalSignatureAlgorithm (DSA)密钥(-b 1024-t dsa),关闭输出(-q),指定密钥的名称,在这里不指定密码。

来自互联网

28. Only the holder of the key can create the signature, whereas anyone with access to the public key (usually taken from an X.509 Certificate) can validate the signature.
只有密匙的持有者能够创建签名,而所有能够访问公共密匙(通过来自 X.509Certificate)的人都可以验证签名。

来自互联网

29. Two public-key cryptography algorithms that are widely used are RSA (named after its inventors Rivest, Shamir and Adleman) and DSA (Digital Signature Algorithm).
两个广泛使用的公钥加密算法是RSA(根据其发明者Rivest、Shamir和Adleman 命名)和DSA(数字签名算法)。

来自互联网

30. Verification of the signature is a key in any signature-based form implementation.
签名验证在任何基于签名的表单实现中都是关键部分。

来自互联网