词汇 | example_english_digital-signature |
释义 | Examples of digital signatureThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Additional process digitisation can be provided by the integration of secondary services, such as electronic payment or digitalsignature. Simultaneously, auxiliary services like payment or digitalsignature and a monitoring or tracking function for the customer should be integrated. Payment can be undertaken if all necessary steps are carried out and a digitalsignature is used. A digitalsignature proves who sent the program, and that the program was not altered either by error or design. In this case, the entire encrypted message serves as a digitalsignature. Briefly, "electronic signature"has a wider meaning than"digitalsignature". From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Many states and organisations over recent years have developed digitalsignature systems and rules on them. From Europarl Parallel Corpus - English Electronic conveyancing, however, is about much more than substituting e-mail for the typed page, and the digitalsignature for the flourish of a fountain pen. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Its primary focus is on digitalsignature rather than on encryption. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 So people will carry around their digitalsignature in their head as a pass phrase. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 In fact what is currently defined is more akin to a digitalsignature. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 No additional data other than the digitalsignature which "locks" the data on to the chip will be held but not shown on the bio-data page of the passport. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 A map of the set of accessible archives is stored within every digitalsignature created in the system. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Digitalsignature schemes are often vulnerable to hash collisions, unless using techniques like randomized hashing. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The digitalsignature, however, is forensically identical in both legitimate and forged uses - if someone possesses the private key they can create a real signature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It is designed for high performance while avoiding security problems that have surfaced in other digitalsignature schemes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Digitalsignature schemes have the property that signatures can be computed only with the knowledge of the correct private key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Encryption and digitalsignature are two fundamental cryptographic tools that can guarantee the confidentiality, integrity, and non-repudiation. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Once an exploit is discovered, a custom recovery image can be flashed which will skip the digitalsignature check of firmware updates. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. However, combined with hash trees, a single key could be used for many messages, making this a fairly efficient digitalsignature scheme. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. By comparison, traditional public-key certificates include a copy of the public key and the digitalsignature of the certification authority. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The lack of awareness of the system, the lack of understanding of the hardware, and fears about the digitalsignature lockout initially caused concerns. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Digitalsignature schemes, in the sense used here, are cryptographically based, and must be implemented properly to be effective. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Note that a sig block is "not" the same as a digitalsignature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A sig block is easily forged, whereas a digitalsignature uses cryptographic techniques to provide verifiable proof of authorship. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Message authentication involves processing a message with a private key to produce a digitalsignature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Public-key cryptography can also be used for implementing digitalsignature schemes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Biometric data such as fingerprints and a digitalsignature are contained in a microchip embedded in the card. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. To combat this, they included a digitalsignature protection method which prevented unauthorized 7800 games from being played on the system. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The digitalsignature long prevented homebrew games from being developed until the original encryption generating software was discovered. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Then the pair ("r", "s") is the digitalsignature of "m". From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The resulting blind signature can be publicly verified against the original, unblinded message in the manner of a regular digitalsignature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In contrast, a digitalsignature is generated using the private key of a key pair, which is asymmetric encryption. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Since this private key is only accessible to its holder, a digitalsignature proves that a document was signed by none other than that holder. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The digitalsignature is made using a document signing key which itself is signed by a country signing key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The validity of a digital document is authenticated by verifying that the digitalsignature logically matches the bit string representation of the document. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The protocol identifies a peer with its endpoint address while the file index format is changed to incorporate a digitalsignature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A developer, for example, may apply a digitalsignature to an applet, thereby labeling it as safe. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Highly complex instruments are now needed not only for interpreting the document but also for producing the digitalsignature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. They can be as easily destroyed as well, leaving nearly no digitalsignature and absolutely no physical evidence whatsoever. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Digitalsignature schemes can be used for sender authentication and non-repudiation. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Another type of application in public-key cryptography is that of digitalsignature schemes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Digital signatures cryptographically bind an electronic identity to an electronic document and the digitalsignature can not be copied to another document. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The certificate includes information about the key, information about its owner's identity, and the digitalsignature of an entity that has verified the certificate's contents are correct. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This is particularly easy for software agents as an identity most probably will be proved by digital signatures or something that can be copied. A digitally signed text may also be encrypted for protection during transmission, but this is not required when most digitalsignature protocols have been properly carried out. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In fact, in modern practice, a digitalsignature of some text is always electronically processed in some sense, for the cryptographic mechanisms are impracticable without computers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Policy programs could be allocated based on the more general idea of credentials instead of digital signatures alone. Another common term for cryptographic signature is digitalsignature; the similarity of the term to electronic signature can invite confusion, which is why for this article cryptographic is used. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. More generally, the resource can also be a task that a group of people can complete together, such as creating a digitalsignature, or decrypting an encrypted message. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Like a handwritten signature, a digitalsignature is used to protect a document, such as a digital contract, against forgery by another party or by one of the participating parties. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Thanks to the production technology of electronic identity cards, risk of falsifying documents shall be reduced and digital presentation and digitalsignature shall be enabled to citizens. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The alleged sender could in return demonstrate that the digitalsignature algorithm is vulnerable or flawed, or allege or prove that his signing key has been compromised. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In addition to a digitalsignature, they provide a recent news headline as proof that the warrant canary was recently posted as well as mirroring the posting internationally. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. When ownership of a digitalsignature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Only if all of these conditions are met will a digitalsignature actually be any evidence of who sent the message, and therefore of their assent to its contents. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Kleptography, a subfield of cryptovirology, is concerned with the study of asymmetric back doors in key generation algorithms, digitalsignature algorithms, key exchanges, and so on. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A digitalsignature is reminiscent of an ordinary signature; they both have the characteristic of being easy for a user to produce, but difficult for anyone else to forge. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The public key is used to encrypt plaintext or to verify a digitalsignature; whereas the private key is used to decrypt ciphertext or to create a digitalsignature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The question of digital signatures will gain in importance as secure electronic communications are developing between commercial and public service providers and users. From Europarl Parallel Corpus - English Legal recognition of digital signatures and writing on a non-discriminative basis, is an important step in this procedure. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 From that point of view electronic or digital signatures are vital. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The effect of this amendment might therefore be to limit the reservation to digital signatures but not electronic signatures. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The need for action is particularly urgent in the case of authentication services and digital signatures. From Europarl Parallel Corpus - English Concepts such as algorithms, encryption and hashing, which underpin the creation of digital signatures, are a wonder of mathematical science. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Proof of age, like proof of identity, can be achieved by using authentication services, such as certified digital signatures. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The new pilot uses clever-forms software, the internet and digital signatures. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 They have acknowledged that digital signatures and kitemarks are the way forward. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 It is therefore not necessary to refer explicitly to digital signatures in this schedule. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 As we move towards the new global information networks with the potential for electronic commerce, we need a clear legal framework and a proper system—for example, for confidential digital signatures. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 Although technology facilitates the activity, it also provides some of the answers to the problem, through digital signatures, watermarks, tracing the digital origin of material and so on. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 We will achieve that by developing a corporate information technology strategy for government, establishing frameworks across government on issues such as digital signatures, smart cards and websites. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 It is a wide area and issues such as intellectual property rights, information security, privacy, encryption, digital signatures, payment taxation and so on are emerging as important. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The publication disallows creation of digital signatures with a hash security lower than 112-bits after 2013. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It captures relations among data, metadata, analysis files and other components, and includes support for audit trails, versioning and digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Peers can protect their identities from each other's by using reply onions, digital signatures, or similar technologies. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Passwords or digital signatures can be used for authentication. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Thus, the electronically transmitted votes from the precincts no longer bear digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Specifically, the microchip contains a digital certificate for online authentication and (optionally) a certificate for digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. It also provided a legally recognized method of authentication of electronic documents by means of digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. An analogy for digital signatures is the sealing of an envelope with a personal wax seal. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Similarly, a key pair used for digital signatures consists of a private signing key and a public verification key. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These will not always be available, and so all such digital signatures will be less than credible. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The specification also allowed for server-based digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Signcryption provides the properties of both digital signatures and encryption schemes in a way that is more efficient than signing and encrypting separately. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Digital signatures employ a type of asymmetric cryptography. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This is especially true if the non-repudiation aspect of digital signatures is a concern (it may not be). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The integrity of the log data integrity is ensured through the use of digital signatures and cryptographic hashes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He is an author of several works in the field of cryptographic hash functions and digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. On the other hand many unexpected uses of digital signatures were discovered by recent cryptographic research. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. They are implemented as smart cards containing two certificates, one to be used for authentication, and another one for generating digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Digital signatures can be used to authenticate the source of messages. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Through careful application of redundancy, encryption, digital signatures, automated monitoring and correction, large quantities of data could be reliably and easily retrieved. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. He has also worked in the areas of secure multi-party computation, public-key encryption, and digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Increasingly, digital signatures are used in e-commerce and in regulatory filings as digital signatures are more secure than a simple generic electronic signature. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Cryptography provides information security with other useful applications as well including improved authentication methods, message digests, digital signatures, non-repudiation, and encrypted network communications. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. On the chip there are also optional fingerprint templates and the infrastructure required for digital signatures. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This construction was later superseded by the construction of digital signatures from any one-way trapdoor permutation. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. As with digital signatures it is misleading to assume a direct correspondence between the real-world and the digital concept. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Digital signatures are still present in this version. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。