鈅
目的是探讨八肽胆囊收缩素(CCK-8)对经钥孔戚血蓝蛋白(KLH)免疫小鼠T淋巴细胞亚群的影响。
The aim is to study the effects of cholecystokinin octapeptide (CCK-8) on T-lymphocyte subsets in keyhole limpet haemocyanin (KLH)-immunized mice.
在前一节中,我们交换了一个秘钥。
In the previous section, we exchanged a secret key.
这两个选项允许实施公钥匹配。
These two options allow for enforcement of public key matching.
当然,您需要提供公钥来进行验证。
Of course, you'll need to provide your public key to verify that.
信任存储库通常仅包含公钥。
The truststore normally only contains public keys.
步骤8 将公钥复制到远程计算机。
Step 8 copies the public key to the remote computer.
公钥:可用于对消息进行加密或验证。
Public key: Can be used to encrypt or verify a message.
后者一直包装在公钥证书中。
The latter are always wrapped in public key certificates.
当人们提到术语公钥时,通常是指证书。
When people use the term public key, they normally mean certificate.
这些签名公钥被称为证书。
These signed public keys are called certificates.
创建一个包含公钥的授权文件,如下所示。
Create an authorization file containing the public keys, as shown below.
从每个证书中提取公钥。
Extract public keys from each of the certificates.
CA通过公开输出的方式提供自己的公钥。
The CA makes its own public key readily available through print publicity.
消息的发送方使用接收方的公钥加密消息。
The sender of the message USES the recipient's public key to encrypt the message.
附录4:公钥加密术语。
Appendix 4: Public-key cryptography terminology.
发布您的密钥到一个公钥服务器上。
Publish your key to a public key server.
接收方使用发送方的对应公钥验证数字签名。
The receiver uses the sender's corresponding public key to verify the digital signature.
另一方使用这个公钥加密其秘钥。
The second party USES this public key to encrypt its secret key.
用户拥有一对密钥:公钥和私钥。
A user has a pair of keys: public key and private key.
为您的网站获取公钥及私钥。
Get public and private keys for your website.
学习如何握住开启自己职场回归之钥?
Learn how you hold the key to launching your own career comeback.
你只能给别人公钥,千万别给别人私钥。
Only ever give out your public key, never your private key.
接下来,您需要发布您的密钥到公钥服务器。
Next, you need to publish your key to a public key server.
RSA公钥密码系统就是基于这种因数分解特性的。
RSA public-key cryptography is based on this property of factorization.
这是摘录算法、金钥从属算法和可能的其它算法的组合。
It is a combination of a digest algorithm, a key dependent algorithm, and possibly other algorithms.
这种应用程式必须指定附加金钥、算法、处理和再现需要。
Such an application must specify additional key, algorithm, processing and rendering requirements.
本节将提供逐步指导帮助您创建实例、秘钥、映像和存储。
This section will provide step-by-step instructions to help you create instances, keys, images, and storage.
任何给定用户的公钥和私钥在数学上是不能相关的。
The public key and private key for any given user aren't mathematically related.
公有密钥分布于名为公钥证书(PKC)的容器中。
Public Keys are distributed in containers called public key certificates (PKC).
这种涉及到私钥和公钥对的方式也被称作公钥密码术。
This approach involving private and public key pairs is also known as public key cryptography.