您要查找的是不是:
- 導入KMS用戶(hù)密鑰和證書(shū)Import KMS User keys and certificates
- 為密鑰存檔導入用戶(hù)密鑰和證書(shū)到服務(wù)器數據庫Import user keys and certificates into server database for key archival
- 用戶(hù)密鑰的耐用性Long-lived subscriber's key
- 來(lái)自導入文件的密鑰和證書(shū)已在這臺計算機上。要將它們改寫(xiě)嗎?The key and certificate from the import file already exist on this computer. Do you want to overwrite them?
- 證書(shū)certificate
- 用戶(hù)密鑰集通常為默認值。The user key set is usually the default.
- 密thick
- 可以搜索Course Catalog來(lái)查找可用課程、專(zhuān)業(yè)課程和證書(shū)課程。You can search the Course Catalog to find available courses, curriculums, and certificate programs.
- 通過(guò)對話(huà)框或其他方法,通知用戶(hù)密鑰被訪(fǎng)問(wèn)。Notify the user through a dialog box or other method that the key is accessed.
- 密鑰key
- KEY_SOURCE值是很重要的數據,可用來(lái)重新創(chuàng )建對稱(chēng)密鑰和解密數據。The value of KEY_SOURCE is valuable data that can be used to re-create the symmetric key and decrypt data.
- GPG使用兩種密鑰:公鑰和私鑰。GPG uses two keys: public and private.
- 服務(wù)器使用一組密鑰模型參數生成由一個(gè)隨機公鑰和一個(gè)私鑰組成的密鑰對。The server generates a pair consisting of a random public key and a private key using a set of key model parameters.
- 但是,在傳輸小紅的公鑰期間,未經(jīng)授權的代理可能截獲該密鑰。During the transmission of Alice's public key, however, an unauthorized agent might intercept the key.
- 保證加密密鑰和哈希算法的安全Secure Encryption Keys and Hashing
- 公開(kāi)密鑰和秘密密鑰是基于一對想截獲報文的人不知道的非常大的素數。The public and private keys are based on a pair of very large prime numbers that are not known by anyone intercepting the message.
- 您可以將用于創(chuàng )建受信任公共證書(shū)的專(zhuān)用密鑰存儲在一個(gè)安全的中央位置。You can store the private key used to create trusted public certificates in a secure central location.
- 非對稱(chēng)密鑰由私鑰和對應的公鑰組成。An asymmetric key is made up of a private key and the corresponding public key.
- 使用該系統,未經(jīng)授權的用戶(hù)有可能知道的公共消息標頭將無(wú)法用于對密鑰進(jìn)行反向工程。Using this system, common message headers that might be known to an unauthorized user cannot be used to reverse engineer a key.
- 時(shí)創(chuàng )建、刪除、導出和導入RSA密鑰容器的能力。Protected configuration provides the capability to create, delete, export, and import RSA key containers when using the.