Примеры использования The digital signature на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Once that's done, the system will check the digital signature of any installation package,
It was suggested that the guide should better reflect the idea that the digital signature was technically invalid
The digital signature verification might fail because the files have been tampered with
container is created, of which the digital signature is an inseparable part.
The digital signature has many different appearances, such as failstop digital signatures, blind signatures
where the originator is identified by a digital signature, the digital signature is an[enhanced]
The digital signature file shall be in binary OpenPGP format as per RFC 4880[6], and shall neither be compressed nor encrypted.
then creates the digital signature from that hash using the sender's private key.
In the Virtual Desktops Properties dialog box, on the Digital Signature tab, select the Sign with a digital certificate check box.
for RSA key generation, the Diffie-Hellman key exchange, the Digital Signature Algorithm, and other cryptographic algorithms and protocols.
We recommend this option for preserving evidence for law enforcement purposes because the original files are not altered and the digital signature contained in the data is also exported.
adopted by National Institute of Standards and Technology(NIST) as the Digital Signature Standard DSS.
The digital signature has many different appearances, such as fail stop digital signatures, blind signatures and undeniable digital signatures. .
It is also necessary to exempt from the digital signature devices fee only the natural persons at the expense of economic agents, which have more resources.
All the digital signature specific knowledge is encapsulated within SIM card
This command is used to compute the digital signature of previously computed hash code see PERFORM HASH of FILE,§ 3.6.12.
TCS_373 The card private key is used to compute the digital signature and is implicitly known by the card.
This command is used to verify the digital signature, provided as an input, in accordance with PKCS1 of a message, whose hash is known to the card.
Once you are issued the digital signature certificate, you can sign e-documents using the private key that corresponds to such certificate.