Examples of using Corresponding private in English and their translations into Russian
{-}
-
Official
-
Colloquial
However, even when a certificate is deleted, the corresponding private key is not deleted.
A public key certificate, usually just called a certificate, is a digitally signed statement that binds the value of a public key to the identity of the person, device, orservice that holds the corresponding private key.
Public investment to support corresponding private investment in specific industries.
A"recipient" of the certificate desiring to rely upon a digital signature created by the signatory named in the certificate can use the public key listed in the certificate to verify that the digital signature was created with the corresponding private key.
Information encrypted with the public key cannot be decrypted without the corresponding private key, which only the merchant has.
In most cases, the users would not normally be in a position to ascertain a number of factors relevant to the validity of a certificate, such as the identification procedures used by the certification authority, orwhether the holder of the public key also held the corresponding private key.
If the abstract process is in the same Diagram as its corresponding private business process, then the activities that are common to both processes can be associated.
To associate a key pair with a prospective signer, a certification authority issues a certificate, an electronic record which lists a public key as well as other details andconfirms that the prospective signer identified in the certificate holds the corresponding private key.
Remember: Any public key only decrypts messages that were encrypted by their corresponding private key, which only the malware author will have access to.
The certification authority has complied with all applicable requirements of these Rules in issuing the certificate and, if the certification authority has published the certificate or otherwise made it available to such a relying person,that the holder listed in the certificate[and rightfully holding the corresponding private key] has accepted it;
If the collaboration process is in the same Diagram as one of its corresponding private business process, then the activities that are common to both processes can be associated.
The principal function of a certificate is to bind a public key with a particular signatory.A"recipient" of the certificate desiring to rely upon a digital signature created by the signatory named in the certificate can use the public key listed in the certificate to verify that the digital signature was created with the corresponding private key.
The author comes to the conclusion that within the given classification of murders,it is necessary to allocate the corresponding private techniques of their preliminary and judicial examination.
The“receiving address” is the public key and the corresponding private key is used to digitally sign transactions that transfer value from the sender's“receiving address”.
For example, crimeware could be distributed with an incorporated public cryptographic key, whose corresponding private key is kept secret by the attacker.
To associate a key pair with a prospective signatory, a certification service provider(or certification authority) issues a certificate, an electronic record which lists a public key together with the name of the certificate subscriber as the"subject" of the certificate, andmay confirm that the prospective signatory identified in the certificate holds the corresponding private key.
A recipient of the certificate can use the public key listed in it to verify that the digital signature was created with the corresponding private key, and that the message has not been changed since it was digitally signed.
To associate a key pair with a prospective signatory, a certification services provider(or certification authority) issues a certificate, which is an electronic record that lists a public key together with the name of the certificate subscriber as the"subject" of the certificate, andwhich may confirm that the prospective signatory identified in the certificate holds the corresponding private key.
Then, using the public key and the new hash result,the verifier checks whether the digital signature was created using the corresponding private key, and whether the newly computed hash result matches the original hash result that was transformed into the digital signature during the signing process.
It is clear, in any event, that article 24, paragraph 1, is different in nature to CRC rights and obligations, being, as described by Nowak, a comprehensive duty to guarantee that all children within a State party's jurisdiction are protected, whether through support for the family,through support for corresponding private facilities for children, or other measures.
Corresponding statistics for the private sector are not available.
To use the private key corresponding to the public key listed in the registration certificate;
The holder identified in the certificate[rightfully]holds the private key corresponding to the public key listed in the certificate;
The certification authority has verified that the person requesting the certificate holds the private key corresponding to the public key listed in the certificate;
The United Nations is also increasingly recognizing that in order for apartnership to be sustainable, there must be a business case and corresponding incentives for private sector partners.
In order toencourage transfer of technology and corresponding know-how from the private sector, specific financial and other incentives should be instituted.
The total external debt of developing countries and countries with economies in transition hadincreased in 2003 and there had been a corresponding rise in private debt in sub-Saharan Africa.
Ii that the person who is[named][identified]in the certificate holds[at the relevant time] the[private key corresponding to the public key][signature device] referred to in the certificate;
Over one fifth ofwage earners work for municipalities or the State as fixed- term, whereas in the private sector the corresponding share is about 10 per cent.
Their primary drawback is that for any hash-based public key,there is a limit on the number of signatures that can be signed using the corresponding set of private keys.