- 相关搜索
- 任何杂凑而成的东西
- 更多网络例句与杂凑相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The proposed HAGA method considerably improves the execution efficiency by accessing the fitness values of the searched solutions saved a priori in a hashing table during the optimization process.
本文所提出之杂凑基因演算法能够在最佳化搜寻过程中,将已搜寻过的解之适应值预先储存於杂凑表中以提供后续演化过程中资料之存取,因而大幅地改善基因演算法之执行效能。
-
In the combined approach, the HAGA determines the optimal displacement ratios and number of fictitious charges used in CSM, and then obtains the optimal contour design of support insulators to minimize and uniform the tangential electric field along the dielectric boundary.
在此复合式方法中,杂凑基因演算法先用来决定电荷模拟法中之假想电荷与配置比之最佳值;然后再用杂凑基因演算法来获得支持碍子之最佳化外型,以便能够将支持碍子介质边界上之切线电场强度分布均匀化且最小化。
-
Changing the title, even by a single letter, will change most of the digits in the hash code.
杂凑值也被称为杂凑码、杂凑结果、消息摘要或数字指纹。
-
A primary motivation for cryptographic hash functions is that they serve as compact representative images of input messages, which they can uniquely identify. For example, the MD5 hash code "72c067b50c90837c95186d019f686700" can be looked on as the "fingerprint" to represent this thesis title uniquely.
密码学杂凑函数也称Hash函数、哈希函数或单向散列函数,它可以将任意长度的消息压缩到固定长度的杂凑值。
-
A mathematical formula, called a hashing function, is used to produce a unique number that will identify the record's physical location on the disk.
所谓的杂凑函数,是用来制造了一个独特的识别号码,将记录的物理位置在磁盘上。
-
The smart card system is due to an application of RFID, the first scheme of our research is using this to help store the information of authentications. It uses hashing function combined with smart card to the network authentication for the most part to cut down the cost of computation as well as communication and further accomplish higher security.
智慧卡属於射频辨识的一种应用,本研究的机制一为使用智慧卡系统辅助储存认证用资讯,并采用杂凑函数结合智慧卡的方式来进行网路认证,以降低计算与通讯的成本,并达到高度安全性。
-
In this thesis, a novel robust image hashing scheme is proposed.
在本篇论文中,我们建立了一个创新的、具有强健性的影像杂凑技术。
-
The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.
在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。
-
The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.
在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。
-
At the same time, Biham gave an attack on 40-step SHA-1[6] and Joux improved upon the results of Biham and Chen[5] by presenting practical collisions in SHA-0 [24].The most important result is the break of MD5 by Xiaoyun Wang and Hongbo Yu.
比特追踪法是现今分析MD4系列杂凑函数所使用的最为广泛有效的方法,它的技术细节在2005年欧密会上公开,是破解包含MD5和SHA-1在内的多数MD4系列杂凑算法的理论基础。
- 更多网络解释与杂凑相关的网络解释 [注:此内容来源于网络,仅供参考]
-
hash algorithm:杂凑算法
Hash Addressing 杂乱寻址法 | hash algorithm 杂凑算法 | hash multiset 杂凑多重集
-
gallimaufry:杂凑
galligaskins 灯笼裤 | gallimaufry 杂凑 | gallinaceous 鹑鸡类的
-
gallimaufry:杂凑/搀杂
galligaskins /宽松绔子/灯笼绔/ | gallimaufry /杂凑/搀杂/ | gallinaceous /鹑鸡类的/鸡的/
-
default hash code provider:预设杂凑程序代码提供者
default entity 内定实体 | default hash code provider 预设杂凑程序代码提供者 | default message processing 预设讯息处理
-
hash table:杂凑表
编写一个杂凑表(hash table)类编写一个杂凑表(hash table)类,以字符串作为关键字存放和查找记录.提供公共成员函数进行杂凑表的记录插入,查询和删除.
-
hash function:杂凑函数
指属于同一配对密码匙;"储存库"(repository)指用作储存及检索证书及其他与证书有关的资讯系统;"杂凑函数"(hash function)指将一串数元配对或转换成为另一串定为杂凑结果的数元的算法,
-
hashing function:杂凑函数
此种函数,一般称之为杂凑函数(Hashing function)或键值对应位址转换(key to address transformation). 对於有限的储存空间,能够有效使用且在加入或删除时也能快的完成,利用杂凑法是最适当不过了. 因为杂凑表搜寻在没有碰撞(collision)及溢位(overflow)的情况下,
-
hashing:杂凑
杂凑 杂凑(hashing)是存储表数据一种可选择的方法,用以改进数据检索的性能.要使用杂凑,就要建立杂凑聚集,将表装入 到该聚集.在骠凑聚集中的表行根据杂凑函数的结果进行物理学存储和检索.杂凑函数用于生成一个数值的分布,
-
random rehash:随机再杂凑
随机读取 random read | 随机再杂凑 random rehash | 随机再杂凑法 random rehash method
-
random rehash method:随机再杂凑法
随机再杂凑 random rehash | 随机再杂凑法 random rehash method | 随机再杂凑技术 random rehash technique