1.   A public-key user needs to obtain and validate a certificate containing the required public key.

2.   Clearly, one advantage of public-key cryptography is that no one can figure out the private key from the corresponding public key.

3.   The public key is used to Decrypt information at the receiver and is not kept secret.

4.   This is significant because it means that spontaneous private transactions can occur without requiring individual users to have an established public key.

5.   When some one wants to send you a private message, they scramble it using your public key.

6.   Each PGP user has a public key, which is made available without any attempt at hiding it.

7.   His public key, in turn, would be signed by VeriSign.

8.   In a public-key encryption system, a person has a public key and a private key.

9.   In this system, a person has a public key and a private key.

10.   Just use your public key to encrypt it, and your private key to decrypt it.

a. + key >>共 307
low 11.90%
return 7.01%
real 4.22%
the 2.40%
public 2.21%
private 2.21%
big 2.21%
spare 2.02%
piano 1.92%
different 1.73%
public + n. >>共 762
support 2.43%
fund 2.08%
appearance 2.05%
hearing 1.96%
comment 1.87%
official 1.85%
transport 1.69%
education 1.68%
statement 1.66%
office 1.58%
key 0.04%
每页显示:    共 23