|
1. | Public Key Cryptography |
| 公共电子密钥加密法 |
|
|
| |
2. | Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it. |
| 接收者利用发送者的公开密钥和他们自己的秘密密钥的结合,解开该报文的秘密编码,并解密之。 |
|
|
| |
3. | Public Key Cryptosystem |
| 1. 【电脑】公开密钥加密系统 |
|
|
| |
4. | Recipients can then use the certifier's public key to verify the message's authenticity. |
| 然后,接收方可使用证明人的公开密钥来验证报文的可信度。 |
|
|
| |
5. | Zooey then uses Franny's public key to encrypt a message to her. |
| 然后,佐伊利用弗兰妮的公开钥匙对发送给弗兰妮的报文加密。 |
|
|
| |
6. | public key infrastructure |
| 公共密钥基础结构,公钥基础结构,公共密钥体制,公用密钥基本体系,[港]公匙基建 |
|
|
| |
7. | In data security, a method of public key cryptography based on the difficulty of factoring large numbers, and proposed by Rivest-Shamir-Adleman. |
| 在数据保密技术中使用的一种通用关键字密码方法,它是基于大数作因子分解的难度而建立的方法,由Rivest-Shamir-Adleman所提出。 |
|
|
| |
8. | Firewalls and intrusion detection are today must-haves for any company's network, encryption PKI (public key infrastructure), and other authentication solutions are quickly becoming standard practice. |
| 防火墙和入侵探测是当今任何一家公司的网络必备,加密PKI(公开密钥基础设施)和其他认证解决方案正在迅速成为标准的做法。 |
|
|
| |
9. | PKI (public key infrastructure) |
| 公共密钥基础结构,公钥基础结构,公共密钥体制,公用密钥基本体系,[港]公匙基建 |
|
|
| |
10. | Conversely, plaintext encrypted with the private key can be decrypted only with the public key. |
| 相反,用秘密密钥加密的普通文本只能由公开密钥解密。 |
|
|
| |