public int hashCode()
public boolean equals(Key k)
public int compareTo(Object o)
public boolean equals(Object o)
public boolean compareTo(Key k)
第1题:
第2题:
Which statement is true about a certificate authority?()
第3题:
In a public-key cryptosystem,(71)encrypted with the public key can only be deciphered with the private key from the same(72). Conversely,(71)encrypted with the private key can be decrypted only with the public key. Users can make their public keys(73)available or place them at a key distribution center or others to access. However, the private key must be(74)safe. In public-key systems there's no(75)to find a safe channel for communicating a shared secret key.
A.binarytext
B.hypertext
C.plaintext
D.supertext
第4题:
public class X { public X aMethod() { return this;} } public class Y extends X { } Which two methods can be added to the definition of class Y?()
第5题:
public class Person { private name; public Person(String name) { this.name = name; } public int hashCode() { return 420; } } Which is true?()
第6题:
第7题:
Which of the following authenticates a web server to the remote client in PKI?()
第8题:
Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.
A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private
第9题:
PKI是()。
第10题:
public class Parent { int change() {…} } class Child extends Parent { } Which methods can be added into class Child?()