|
91. | Receivers use a combination of the sender's public key and their own private encryption key to unlock |
| 接收者利用发送者的公开密钥和他们自己的秘密密钥的结合,解开该报文的秘密编码,并解密之。 |
|
|
| |
92. | For encryption and decryption of messages, both a public key and a private key are required. |
| 要加密和解密消息,需要公钥和私钥。您必须提供私钥的密码。 |
|
|
| |
93. | "For encryption and decryption of messages, both a public key and a private key are required. |
| "要加密和解密消息,需要公钥和私钥。您必须为私钥提供一个密码。 |
|
|
| |
94. | In contrast, users of public-key systems can distribute their public keys to allow others to encrypt |
| 与之相反,明钥系统的用户可以分配公开钥匙,以让其它人对报文加密,而这种报文只能用专用的钥匙读出。 |
|
|
| |
95. | To work well, digital envelopes require that a public key infrastructure is in place: without the correct |
| 为了很好工作,数字信封需要有一个公开的密钥基础设施:没有正确的数字密钥对包装器解密,入侵者就不能看到里面的信息。 |
|
|
| |
96. | This paper introduces in a systematic way symmetry encryption, public key encryption and composite encryption |
| 本文系统地讨论了对称式加密、开密钥加密以及混合式加密三种数据加密技术以及链路加密和端对端加密两种网络数据加密方式。 |
|
|
| |
97. | Especially public key cryptosystem as a newer data protecting technique is further discussed. |
| 综述了计算机数据安全技术的国内外研究与发展现状,特别是公钥密码技术是数据安全技术中较新的研究课题,对公钥密码技术中的一些问题作了较深入的探讨。 |
|
|
| |
98. | A public/private key pair is used for encryption and decryption of messages. |
| 公用/私人密钥对用于加密和解密邮件。 |
|
|
| |
99. | Firewalls and intrusion detection are today must-haves for any company's network, encryption PKI (public |
| 防火墙和入侵探测是当今任何一家公司的网络必备,加密PKI(公开密钥基础设施)和其他认证解决方案正在迅速成为标准的做法。 |
|
|
| |
100. | Recipients must have your public key to verify your signature. |
| 签发的传真允许收件人检查您是否签发附件以及该附件是否已经被更改。收件人必须有您的公用密钥以便验证您的签名。 |
|
|
| |