A public key interface module may include a public key, a private key, an anonymous key and a management key.
The key Kpc is confidentiality key and the key Kpi is integrity protection key.
A key holder (300) for a key of a trapped-key interlock, a key tag assembly including the key holder (300), and a method of tagging a key.
A key message can include a key-encryption-key (KEK) associated with a KeyDomainID and a KeyGroupID.
The key server may respond with a birth key encrypted key encryption key.
An input may be a key code, key card or physical key.
A key with USB interface comprises a key handle (1) and a key head (2) that integrates with the key handle (1).
If key rotation is initiated, a transitional key may be generated by encrypting the current key with a built-in system key.
The Home Agent derives a key from the key information, the key being a shared key between the Mobile Node and the Home Agent.
The re-encryption key generation means generates the re-encryption key on the basis of the first private key and the second re-encryption key generation key.
The wrench assembly includes a wrench subassembly having an upper wrench and a lower wrench.
The wrench (204) includes a wrench body (2041) and a wrench clamping element (2042).
A torque wrench comprises a wrench head (1) and a wrench body (2).
Individual wrench arms can be used either as a wrench handle or as a wrench tool depending on which end of the wrench the user grasps.
The wrench acts much like a box end wrench.
The portable key assembly is set with a key body, a lock fastener, and an abbreviated key handle on one end of the key body.
When the key is needed, the wearer simply opens the snap buttons and removes the key from the key retainer.
The key identifier identifies a key that has been divided into a number of key pieces.
The key identifier references a key having a validity period, the key capable of decrypting the authentication data.
The key comprises a M-bit master key (12) and an information carrier key (2).
A second private key associated with the first private key and a second public key corresponding to the second private key are also created (220).
The trusted authority uses the private key corresponding to the public key that was used to encrypt the master key to determine the master key.
The key server unseals the migration key, and provides a returned key (e.g., the migration key or a session key) to the destination machine for unsealing the secrets.
A method of cryptographic key generation comprises generating a public key and a private key wherein the public key contains all of the information required to recover the private key.
The key keeping device holds the disengaging key to limit the removal of the key and allows the removal of the key when predetermined operation is performed relative to the key.
The first key distribution center and the second key distribution center have a public-private key pair respectively-a private key x and a public key Px, and a private key y and a public key Py.
The user key is derived from the encrypted user key using the medium inherent key.
The system stores the private key with the key reference and transmits the public key to the sender.
The contents key is derived from the encrypted contents key using the user key.
The first node generates a unique key, encrypts the unique key with a first shared secret key to generate a first encrypted unique key and transmits the first encrypted unique key to the second node.
If a match is found, the terminal (118) generates a random secret key, encrypts the secret key with the stored public key, and transmits the encrypted secret key.
The sender and receiver can be provided with a shared key, a receiver_key and a sender_key.
A key-using operation execution unit (1010) uses the key generated by the key generator (140) to execute key-using operations such as generation of keyed hash values.
The public key is used to encrypt the symmetric key.
Requêtes fréquentes français :1-200, -1k, -2k, -3k, -4k, -5k, -7k, -10k, -20k, -40k, -100k, -200k, -500k, -1000k,
Requêtes fréquentes anglais :1-200, -1k, -2k, -3k, -4k, -5k, -7k, -10k, -20k, -40k, -100k, -200k, -500k, -1000k,
Traduction Translation Traducción Übersetzung Tradução Traduzione Traducere Vertaling Tłumaczenie Mετάφραση Oversættelse Översättning Käännös Aistriúchán Traduzzjoni Prevajanje Vertimas Tõlge Preklad Fordítás Tulkojumi Превод Překlad Prijevod 翻訳 번역 翻译 Перевод