网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Digital signature
例句
1. Encryption and digital signatures are techniques to expand the dynamics of trust into a new territory.
2. It uses digital signatures and requires recipients to download free software to read the electronic postmark.
3. Encryption techniques are used to verify digital signatures on business contracts.
4. Therefore the digital signature verifies both the identity of the sender and the authenticity of the data in the document.
5. Unlike encryption, digital signatures are a recent development, the need for which has arisen with the proliferation of electronic commerce.
6. Already, even before digital signatures are widespread, we are afflicted with Pin and password overload.
7. Specifies the digital signature used to authenticate the message.
8. According to MIMEprotocol, the key, digital signatUre and cipher text are packaged and processed at the both sides.
9. By attaching a digital signature to Java code, the origin of that code can be established in a cryptographically secure and unforgeable way.
10. The basic technology of PKI include encipher digital signature data integrity mechanism digital envelope double digital signature, digital certificate etc.
11. After do this, the paper introduce the digital signature which used in other domain such ase-commerce into "Campus Cards System" then design the campus CPU card key management .
12. In addition , proxy digital signature scheme with its security analysis is proposed.
13. Using password, data encrypt , fire wall, digital signature, network security management technology , etc are mainly introduced.
14. A New Broadcasting Multi - Digital Signature Scheme based on ECC is presented.
15. Digital signature is a data item accompanied with the digital coding message.
16. Version 3 uses a digital signature to sign cryptographic keys and messages.
17. The data encryption and digital signature based on encryption technique can overcome factors mentioned above.
18. Then to combine the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides.
19. An efficient digital signature scheme provably secure in the standard model from bilinear maps was proposed.
20. If the fingerprints do match, however, then Y can be quite sure that the digital signature is authentic.
21. Verisign has already built a tidy business selling two types of digital signatures: personal and site certificates.
22. Furthermore, public-key cryptography can be used for sender authentication, known as digital signatures.
23. Some one who uses different computers at home and at work will need two digital signatures.
24. On this thesis, the research has been taken about the public key encryption and digital signature after our scrutinizing on GSM short message and the SMPP Protocol.
25. That breaking the new cryptosystem is equivalent to factoring a general large integer have been showed. A new digital signature scheme and a new authentic encryption scheme have been designed.
26. Typically, message authentication can be done by appending a digital signature or Message Authentication Code (MAC) to the transmitted message.
27. A brief description of some basic schemes of public key encryption and digital signature is presented.
28. In the paper,(sentence dictionary) public key encryption algorithm-RSA and the application in digital signature are mainly discussed and analysed.
29. Message information may be authenticated with error - control code, message authenticated code and digital signature.
30. This idea is tested by adding a private channel to version 4 to transmit a digital signature.
31. A new forward - secure digital signature scheme is proposed from bilinear pairings on elliptic curve.
32. A strong name consists of the assembly's identity — its simple text name, version number, and culture information (if provided) — plus a public key and a digital signature.
33. DTS digital signature institutions.
34. As mentioned above, there are two common technologies used to satisfy the requirement of message authentication: the Message Authentication Code and the digital signature.
35. A digital signature is a data digest encrypted with the private key of the signer.
36. It will put the further application of digital signature into practice of EGA and EC.
37. The scheme perfectly integrates digital signature scheme with public key cryptography system.
38. Then, based on the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides.
39. Enables code to demand that its callers possess a digital signature, thus allowing only callers from a particular organization or site to call the protected code.
40. The method can improve operation speed and reduce operation time effectively over traditional algorithm, and can be used in elliptic curve digital signature algorithm(ECDSA).
41. Specifically, you use SOAP-DSIG for message authentication by using a digital signature and SSL client/server authentication for sender/recipient authentication.
42. The digital signature is different from traditional signature, it is based on public key cryptosystems and is constructed by cryptogram arithmetic.
43. To authenticate messages, the Message Queuing run-time DLL on the source computer uses a hashing algorithm when creating a digital signature for a message.
44. At last I set up a system of public key encipher based on PKI and include data encipher and digital signature.
45. This paper discusses the application of public key cryptography to the digital signature, especially to digital multisignatures.
46. Implement a digital signature scheme based on elliptic curve cryptosystem.
47. The running rate is guaranteed by using digital signature and symmetry encryption in the case of employing the ID event number.
48. The result indicates that the arithmetic can work availably, comparing with RSA and DSA , the executive time of elliptic curve digital signature arithmetic is reduced greatly.
49. Message authentication by using a digital signature is not sufficient for non-repudiation.
50. Version 4 adds a private channel to transmit a digital signature to sign cryptographic keys and messages.
51. The actual meaning of the digital signature should be understood as: "a person who claims to have such and such e-mail address certified this file, and it hasn't changed since then."
52. The paper has an introduction to public-key encryption and the technology of the digital signature, with the emphasis on the one to one secure communication and signing of many people.
53. One or more errors occurred while the digital signature was being validated.
54. Meanwhile, we introduce a high-efficiency algorithm for RSA modular multiplication, especially the application, and the insecurity of digital signature schemes with message recovery.
55. In this article, a solution has been proposed to improve the handshake protocol and record protocol of SSL in order to implement the digital signature for SSL.
56. As a new branch of public-key cryptosystem, digital signature is a key technology of the secure B2B (Business to Business) and government affair in recent years.
57. The results of experiment specify the security of the scheme, which is the linkup of Digital Signature technology, Digital Encryption technology and Digital Watermark technology.
58. Typically the digital signature is computed by applying a mathematical function to the hash of the data to be signed.
59. By the way of encryption, message authentication, and digital signature, the Call System can defense the interior attacks and achieves fine-grained security.
60. On the source computer, Message Queuing uses the hashing algorithm when creating a digital signature for a message.
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2025/4/4 5:46:27