|
61. | In public-key systems there's no need to find a safe channel for communicating a shared secret key. |
| 在公开密钥系统中,无需找一条传送共享秘密密钥的安全通道。 |
|
|
| |
62. | Determine if public key security for smart card logon is required if strong authentication meets your |
| 确定如果强身份验证满足安全目的,是否需要智能卡登录的公钥安全 |
|
|
| |
63. | The public key or version may not be correct. |
| 插件的加密名称不正确。公钥或版本可能错误。 |
|
|
| |
64. | In 1985, the finite automaton public key cryptosystem was proposed. |
| 有限自动机公开钥密码体制的提出进一步激励了有限自动机可逆性的研究. |
|
|
| |
65. | Key sizes for good security using the RSA public-key algorithm range from 768 bits to 2,048 bits. |
| 用RSA公开钥匙算法的较安全钥匙长度从768位到2,048位不等。 |
|
|
| |
66. | Although good conventional and public-key algorithms are both considered strong, their respective key |
| 虽然良好的常规和公开钥匙算法都被认为是强有力的,但它们用于安全的各自密钥的长度是不同的。 |
|
|
| |
67. | Provide the strong name's public key. |
| 提供强名称的公钥。名称和版本是可选的,但可提供更安全的条件。 |
|
|
| |
68. | By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor |
| 利用RS码和两锁密码协议构造了一种非对称的公钥叛逆者追踪方案。 |
|
|
| |
69. | Based on the public key cryptosystems, the protocol implements mutual authentication and is of high security |
| 该协议基于公钥体制实现双向认证,安全性好且运行效率高。 |
|
|
| |
70. | Many encryption packages that are basically secret-key systems use public-key encryption to communicate |
| 很多基本上是秘钥系统的加密软件包采用明钥加密,来传送秘密的会话密钥。 |
|
|
| |