在 英语 中使用 Can verify 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
A recipient of the coin, a payee, can verify the signatures in order to verify the chain of ownership.
It makes a lot of sense on paper since a blockchain can verify both the identity and the vote made by a person.
You can verify if your image data are acceptable before you save them or recover files from them.
Besides SGX, another way distributed compute protocols can verify computations is with dispute resolution.
When your, you know, two-year-old Nvidia card can verify second in the quarter millisecond, that was good enough.
Using rabbitmqctl list_bindings you can verify that the code actually creates bindings and queues as we want.
In this way, we can verify the general security status of the product and confirm security problems that are caused by the cloud.
While each block is encrypted, it does have a unique identifier, which means anyone on the network can verify it.
One is what I feel and observe at this moment or what I can verify, investigate, and study.
Whilst blockchains can verify a payment has been received and prevent double spending(albeit imperfectly), many other problems are unsolved.
The"Proofs" here can verify the accuracy of the transaction, and will not disclose the transaction data to the nodes.
There is a test playground for the Salmon Protocol, and I can verify that it already works.
Each message that is sent after the encryption is negotiated must contain a MAC so that the other party can verify the packet integrity.
O'Reilly offers four rules for a trust-but-verify approach to algorithms: The expected outcomes are known and external observers can verify them;
Signed tokens can verify the integrity of the claims contained within it, while encrypted tokens hide those claims from other parties.
The IAEA is the only relevant authority that can verify the fulfilment of the obligations undertaken under the safeguard agreements of member States.
As I have played this club, I can verify the data is accurate.
Provide a cryptographically unique computer identity so that an operator can verify that a server or device is legitimate.
If you deleted your account yourself you can write in and, if we can verify you as the account owner, we can restore the account.
That leader is also responsible for broadcasting the block to the network, so that the other peers can verify the validity of its contents.