영어에서 Cryptographic keys 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Each CSP supports different character lengths for cryptographic keys.
For more information on cryptographic keys and signing, see Top in The GNU Privacy Guard Manual.
And Google includes the Titan M security module to capture cryptographic keys.
They could gain access to vehicle data or cryptographic keys during the ECU manufacturing process, for example.
And Google is including the Titan M Security Module to house cryptographic keys.
The Android Keystore system lets you store cryptographic keys in a container to make it more difficult to extract from the device.
For additional security or performance reasons, a combination of cryptographic keys can be used.
If the cryptographic keys associated with the digital signatures are in any way compromised, the entire Bankline Direct infrastructure will be compromised.
When you initiate a conversation with someone on Signal, you and the recipient exchange so-called cryptographic keys.
EnlargeResearchers have devised an attack on Android and iOS devices that successfully steals cryptographic keys used to protect Bitcoin wallets, Apple Pay accounts, and other high-value assets.
The U.S. Patent and Trademark Office has awarded a patent to the Bank of America(BOA) for a device which stores cryptographic keys.
Cryptographic keys The Android system requires that each installed application be digitally signed with a certificate that is owned by the application's developer(that is, a certificate for which the developer holds the private key). .
Use a secure random number generator, SecureRandom, to initialize any cryptographic keys generated by KeyGenerator.
If you need to store a key for repeated use, use a mechanism, such as KeyStore, that provides a mechanism for long term storage and retrieval of cryptographic keys.
Once user consent is obtained, the authenticator generates the appropriate cryptographic keys and creates a new credential.
Each of the smart cards 14,15 includes a secure processor which, as is well known to the person skilled in the art, allows secure storage of data such as cryptographic keys.
Our CycurKEYS product is a security software solution that creates and manages cryptographic keys, symmetrically and asymmetrically(PKI).
At a technical level, adding support for Schnorr digital signature scheme would give Bitcoin users a new way to generate the necessary cryptographic keys used to store and send Bitcoin.
Our CycurKEYS product is a security software solution that creates and manages cryptographic keys, symmetric and asymmetric(PKI).
ISAKMP(Internet Security Association and Key Management Protocol) is a protocol defined by RFC 2408 for establishing Security Associations(SA) and cryptographic keys in an Internet environment.
Even if such an ECU were to be fittedin another identical vehicle, its engine performance characteristics could not be changed: the cryptographic individual key of an ECU has to match all the cryptographic keys within the ECU network of a vehicle.
The data set includes the entity's public cryptographic key.
Important: Your application must be signed with a cryptographic key whose validity period ends after 22 October 2033.
In one such instance, the cryptographic key protocol is based on one or more asymmetric Rivest Shamir and Adelman(RSA) public and private keys. .
All applications need to be signed with a cryptographic key that expires after October 22, 2033.
A digital signature is generated using a cryptographic key provided to you by Google.
Passwords are also used to protect files andother stored information, such as password-protecting a single compressed file, a cryptographic key or an encrypted hard drive.
Issued by a certification authority, an SSL security certificate is a small data file digitally attaching a domain name, server name or host name to an organization's name and a public cryptographic key.
Prior to his work in the transportation industry, Drew was a technical director, managing two of the largest(FIPS 140-2)cryptographic testing laboratories and frequently provided cryptographic key management and protocol expertise to various national security programs.