造句

当前位置 /首页/造句 > /列表

用“digital signature”造句大全,digital signature造句

Your digital ID for signing is missing. Try saving without a digital signature.

A blind signature is a digital signature in which the message to be signed is blind to the signer.

The design and implementation of digital signature system based on elliptic curve;

The data encryption and digital signature based on encryption technique can overcome factors mentioned above.

If the digital signature is valid, the trusted application domain host passes the signature information as evidence to the runtime's policy mechanism.

Making use of digital signature, the original image is transformed by Hash function and is encrypted by their private key.

Group oriented (t,n) threshold digital signature schemes have a problem in that the underlying signature schemes will be broken if any t or more shadowholders conspire together with each other,thus the group secret key will be revealed.

Based on the partial blind digital signature and zero-knowledge proof, ane-cash system with non-repudiation is constructed in the article.

The code characteristics are called evidence and can include the Web site or zone from which the code was downloaded, or the digital signature of the vendor who published the code.

The J2ME cryptology package of Bouncy Castle is introduced briefly. Then how to realize network security of J2ME based on Bouncy Castle is discussed,including to encrypt the data which are transmitted to the server and to verify the client by using digest and digital signature.

What is a digital signature?

Messages may contain encryption and digital signature layers. Each digital signature layer may contain multiple signatures.

A digital signature serves as the computer equivalent of a handwritten signature or thumb print.

In some places this digital signature may be considered as legally binding as your own written signature.

A digital signature is a math-based method of attaching a "personal" identity to a message.

A security digital contract system in which hash and digital signature are used to embed watermark to a digital contract is implemented under a practical application.

Moreover, with introducing digital signature and digital timestamp into the watermarking scheme, One can use the public keys to extract the watermark without the involvement of the owner.

I want you to clean it up and apply a digital signature so that we can establish a chain of evidence.

The macros in this file do not match the digital signature. Only a macro virus would cause this. Please scan for viruses, and notify the publisher of this document. Macros will be disabled.

verify digital signatures.

If the file already has a digital signature, it will be overwritten by the new signature.

The customer also submits an electronic signature (written script of name) and a digital signature for reference purposes - a fingerprint.

This wizard helps you attach a digital signature to a file.

The recipient of the payload can validate the digital signature using the public key of the sender.

Up to now most of the known proxy digital signature schemes are based on discrete logarithmic problems or big number factorization problems.

Let's take care of the easy re/Multipurpose Internet Mail Extensions (S/MIME) should be the message encryption and digital signature format because it's the accepted standard and is built into leading e-mail clients such as Microsoft Outlook 98/2000 and Lotus Notes R5.

Specifies the digital signature used to authenticate the message.

Object signing is similar to digital certification, but instead of verifying users, it puts a digital signature on software.

This paper suggests a proposal to prevent falsification of goods by false makers based on the method of digital signature.

The initiating party USES the Shared secret to encrypt or digitally sign the payload; the receiving party, in turn, also USES the same Shared secret to decrypt or verify the digital signature.

Require verification of a digital signature before merging

This paper introduces the related theory of elliptic curve cryptosystem, and presents a digital signature scheme based on elliptic curve.

digital signature造句

Optimistic dynamic authentication based on digital signature

Version 3 USES a digital signature to sign cryptographic keys and messages.

This signature block file stores the digital signature of the corresponding signature file.

The key is used in the authentication of the card and POS machine. The private key can be used in the digital signature of the detail of invoices.

This paper discusses the application of public key cryptography to the digital signature,especially to digital multisignatures.

You decide which certificates to include in the digital signature: all or selected certificates in the certification path, or additional optional certificates

TAG标签:digital 造句 signature #