您要查找的是不是:
- Research on Key Problems in Identity Based Public Key Cryptography 基于身份的公钥密码学关键问题研究
- Cryptanalysis of multiple chaotic systems based public key encryption technique 一种多混沌系统公钥密码算法的安全性分析
- The parties exchange their public keys. 双方交换他们的公钥。
- By definition, public keys can be shared. 按照定义,公开密钥是共享的。
- She sayd that the book id based on a true story. 她说那本书取材于一件真事。
- In this scheme, user's ID is used as public key for encryption. So the Public Key/Certificates Distribution System is not necessary. 该方案使用用户的身份作为加密的公共密钥,因此无需单独的公钥/证书发布系统。
- Options to display the public key token. 选项以显示公钥标记。
- The public key is called "public" for a reason. 公用密钥之所以被称作是“公用的”有一个原因。
- The public key size must be a multiple of 64 bytes. 公钥大小必须是64字节的倍数。
- You can specify the uses for the public key. 您可以指定公钥的用法。
- The hash code based on the public key. 基于公钥的哈希代码。
- Digital signatures rely on public key cryptography. 数字签名依赖于公共密钥加密学。
- Is the hexadecimal form of the public key token. 是公钥标记的十六进制形式。
- Returns a hash code based on the public key. 返回一个基于公钥的哈希代码。
- Returns the public key of a signature. 返回签名的公钥。
- The uniqid() function generates a unique ID based on the microtime (current time in microseconds). 函数的作用是:产生一个基于系统时间的独立ID(当前时间以微秒为单位)。
- Public key and private key are separated. 攻击者只能得到公钥,只有权威的接收者才能得到私钥。
- An Authentication Scheme Based Public Key Encryption for Mobile Communication Systems 适用于移动通信系统的公钥加密认证方案
- Zooey then uses Franny's public key to encrypt a message to her. 然后,佐伊利用弗兰妮的公开钥匙对发送给弗兰妮的报文加密。
- Public Key Infrastructure (PKI) is a base to provide Internet security services using public key certificate. 公钥基础设施PKI利用数字证书为网络安全交易提供基本保障。