key verify

英 [kiː ˈverɪfaɪ] 美 [kiː ˈverɪfaɪ]

网络  发报检验

计算机



双语例句

  1. The second command creates a public key digital certificate for the recipient to decrypt and verify your messages.
    第二个命令创建了一个公钥数字证书,供收件人解密和验证您的消息。
  2. Verifying the signature of the message using the public key of sender to authenticate the sender and to verify integrity of the message
    使用发送方的公钥来检验消息的签名,以便验证发送方并确认消息的完整性
  3. In order to verify that a public key certificate is legitimate, I need to verify the signature of the signer that issued it.
    为了验证公钥证书是合法的,我需要检验发出该签名的签名者。
  4. Without a saved host key, SSH and Capistrano prompt to verify the key, which breaks the automated deployment.
    如果不保存主机密钥,SSH和Capistrano会提示验证密钥,这会中断自动化部署过程。
  5. Public key: Can be used to encrypt or verify a message.
    公钥:可用于对消息进行加密或验证。
  6. Of course, you'll need to provide your public key to verify that.
    当然,您需要提供公钥来进行验证。
  7. The product key specified contains characters that are not valid. Please verify the product key and retype it if needed.
    指定的产品密钥含有无效字符。请检查产品密钥并重新输入(如需要)。
  8. The client invokes the signer in "verify" mode and passes the digest, the signature, and the public key to verify the signature.
    客户机以“验证”方式调用签名引擎,并传递摘要、签名和公钥来验证签名。
  9. The third party uses the message, the key signature and the known public key to verify the source as trusted.
    第三方再根据该讯息、金钥签章与已知的公开金钥,认证该讯息具有可信赖的来源。
  10. The public key can be used to verify a message signed with the private key, or to encrypt messages that can only be decrypted using the private key.
    可以用公开密码匙核实经私人密码匙签署的讯息,或对只能用私人密码匙解密的讯息进行加密。
  11. Object that contains a public key that can be used to verify an XML Digital signature.
    对象,该公钥可用于验证xml数字签名。
  12. The key [ 2] is not valid. Verify that you entered the correct key and try again.
    键值[2]无效。请确认您输入的键值是否正确,然后再试。
  13. First, the public key is applied to the signature to verify its authenticity.
    首先,用于签名中的公钥是用来验证可靠性。
  14. Recipients can then use the certifier's public key to verify the message's authenticity. Fatherly, I give an explanation of the ingredients and function of the information in PI.
    然后,接收方可使用证明人的公开密钥来验证报文的可信度。在此基础上,论文阐明了信息的构成要素及其在政策执行中的作用。
  15. Network protocol testing is derived from software tesing and it is a key technology to verify the implementation of network protocol.
    网络协议测试是检验网络协议实现的一个关键性方式,它是在软件测试的基础上发展起来的。
  16. For traditional digital signature, the signature information has only one signature member, any the verification member can use the public key to verify the validity of the signature.
    在传统的数字签名中,对信息的签名只需要一个签名者,任何验证者使用签名公钥就可验证签名的有效性。
  17. The key of this part is to verify that the structured singular value of a one-unknown matrix function is not equal to one. This work can be accomplished by a frequency sweeping test method.
    后者的核心是判定某个以频率为变元的矩阵的结构奇异值不等于1,这一问题由频率扫描测试法解决。
  18. Building the transition relation of sequential logic circuit is one of the key technologies for applying model checking method to verify the sequential logic circuit.
    有效地建立和表示时序逻辑电路的状态转移关系是应用模型检查方法验证时序逻辑电路的关键技术之一。
  19. Test points on the key positions are selected to verify the simulation accuracy.
    通过在变形关键位置选取测试点的方法来验证模拟的精度。
  20. The key problem for ANN to verify the capability to identify damage depends on the selection of input parameters, that is, whether the index used to localize and quantify the damage is sensitive or not.
    验证神经网络算法的损伤识别能力关键是网络输入参数的选取,即结构损伤识别指针是否对损伤位置或是损伤程度更为灵敏。
  21. Finally we realize the key management scheme and verify its feasibility.
    最后实现上述密钥管理应用方案,论证其可行性。
  22. Finally, we get the best Pharmacophore model which is based on the composite situation between the training set compounds and the pharmacophore model of key chemical characteristics. The testing set compounds verify the correctness and rationality of the model.
    最后通过分析训练集化合物同药效团模型的匹配程度确定了最佳药效团模型,并采用测试集化合物进行了验证,证明了药效团模型的正确性与可靠性。
  23. Link Simulation done using the system is validated through the testing and commissioning of key device evaluation board to verify the device performance.
    运用链路仿真对系统做了验证分析,通过测试和调试关键器件的评估板,验证了器件性能。
  24. Generally, members want to know whether their shares are valid, the only method is to try to reconstruct the key, and verifiable secret sharing allows members to verify whether their shares are valid instead of reconstructing the secret.
    一般来说,成员要想知道持有的子密钥是否有效,唯一的办法是尝试重构密钥,可验证秘密共享允许成员验证他们是否有一个有效的子密钥,而不用重构密钥。
  25. Finally, do connection/ disconnection tests and key tests to verify the system function.
    最后对系统进行了连接断开测试以及按键测试,来判断其正确实现。
  26. The private key is used to embed the watermark, and the public key is used to verify whether the image is tampered or not. Moreover, the tampered area can be recovered. The security shortage of transmiting the system key by a secret channel is avoided.
    设计了一种基于RSA签名算法的自嵌入脆弱水印算法,采用私钥进行水印嵌入,公钥验证图像是否被篡改并恢复被篡改的区域,克服了秘密信道传输水印系统密钥的安全隐患。
  27. Actually, because of the difference in age, gender, education background, and specialized field, the concern behind same key word may verify from different users.
    事实上,随着年龄,性别,学历,专业等的不同,不同用户对同一检索词的兴趣点不一致。
  28. In ID-Based strong designated verifier signature, the public key can verify the signature through their identity instead of by the public key certificate.
    基于身份的强指定验证者签名,验证者的公钥可以通过其身份直接获得从而不必获得公钥证书就可以进行指定验证者签名。
  29. Finally, the key parameters and experiment data are given to verify the effects.
    在本文的最后,给出了算法的部分关键参数和主要的实验数据。
  30. Given system design programs and processes, in this program, in the key production and key element of our application to verify the legitimacy of the RSA encryption algorithm.
    给出了系统设计方案和流程,在此的方案中,在注册码的制作和注册码合法性验证环节都应用了RSA加密算法。