Similar words: signature, signature tune, vital sign, digital, digitally, digitalis, significant digits, digital clock.
Random good picture Not show
31. A new forward - secure digital signature scheme is proposed from bilinear pairings on elliptic curve.
32. A strong name consists of the assembly's identity — its simple text name, version number, and culture information (if provided) — plus a public key and a digital signature.
33. DTS digital signature institutions.
34. As mentioned above, there are two common technologies used to satisfy the requirement of message authentication: the Message Authentication Code and the digital signature.
35. A digital signature is a data digest encrypted with the private key of the signer.
36. It will put the further application of digital signature into practice of EGA and EC.
37. The scheme perfectly integrates digital signature scheme with public key cryptography system.
38. Then, based on the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides.
39. Enables code to demand that its callers possess a digital signature, thus allowing only callers from a particular organization or site to call the protected code.
40. The method can improve operation speed and reduce operation time effectively over traditional algorithm, and can be used in elliptic curve digital signature algorithm(ECDSA).
41. Specifically, you use SOAP-DSIG for message authentication by using a digital signature and SSL client/server authentication for sender/recipient authentication.
42. The digital signature is different from traditional signature, it is based on public key cryptosystems and is constructed by cryptogram arithmetic.
43. To authenticate messages, the Message Queuing run-time DLL on the source computer uses a hashing algorithm when creating a digital signature for a message.
44. At last I set up a system of public key encipher based on PKI and include data encipher and digital signature.
45. This paper discusses the application of public key cryptography to the digital signature, especially to digital multisignatures.
46. Implement a digital signature scheme based on elliptic curve cryptosystem.
47. The running rate is guaranteed by using digital signature and symmetry encryption in the case of employing the ID event number.
48. The result indicates that the arithmetic can work availably, comparing with RSA and DSA , the executive time of elliptic curve digital signature arithmetic is reduced greatly.
49. Message authentication by using a digital signature is not sufficient for non-repudiation.
50. Version 4 adds a private channel to transmit a digital signature to sign cryptographic keys and messages.
51. The actual meaning of the digital signature should be understood as: "a person who claims to have such and such e-mail address certified this file, and it hasn't changed since then."
52. The paper has an introduction to public-key encryption and the technology of the digital signature, with the emphasis on the one to one secure communication and signing of many people.
53. One or more errors occurred while the digital signature was being validated.
54. Meanwhile, we introduce a high-efficiency algorithm for RSA modular multiplication, especially the application, and the insecurity of digital signature schemes with message recovery.
55. In this article, a solution has been proposed to improve the handshake protocol and record protocol of SSL in order to implement the digital signature for SSL.
56. As a new branch of public-key cryptosystem, digital signature is a key technology of the secure B2B (Business to Business) and government affair in recent years.
57. The results of experiment specify the security of the scheme, which is the linkup of Digital Signature technology,(www.Sentencedict.com) Digital Encryption technology and Digital Watermark technology.
58. Typically the digital signature is computed by applying a mathematical function to the hash of the data to be signed.
59. By the way of encryption, message authentication, and digital signature, the Call System can defense the interior attacks and achieves fine-grained security.
60. On the source computer, Message Queuing uses the hashing algorithm when creating a digital signature for a message.
More similar words: signature, signature tune, vital sign, digital, digitally, digitalis, significant digits, digital clock, digital camera, digital communication, natural capital, designate, signatory, indignation, prestidigitation, designated, resignation, designation, designative, assignation, nature, designated driver, in nature, by nature, denature, marital status, denatured, ill-natured, digit, good-natured.