查询词典 alternate key
- 与 alternate key 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Want us not to want to go intentionally only key word of load one's writing with fancy phrases, do not become a few false key word, density of home page key word is in 3%7% is advisable, also do not exceed 10% at most.
只要我们不要故意的去堆砌关键字,不要做一些虚假的关键字,首页关键字密度在3%7%为宜,最多也不要超过10%。
-
At present, group key management mainly divided into goup key distribution and group key agreement, both of them have their own character and can be used in different applications.
目前已有的组密钥管理协议主要包括组密钥分配协议和组密钥协商协议,总体来说,他们各有优缺点,适用于不同的情况。
-
Hybrid schemes in a KEM-DEM structure is regarded as the most natural approach to public key encryption with IND-CCA security and practical efficiency. Traditional KEM is realized by public key scheme, which only provides confidentiality security for session key used by DEM. In 2005, combining the idea of signcryption with the KEM-DEM model hybrid encryption, Alexander proposed a signcryption KEM-DEM model hybrid signcryption primitive.
KEM-DEM结构的混合密码体制是获得IND-CCA安全最实际有效的方法,传统的KEM由公钥加密方案实现,仅提供DEM使用的会话密钥的保密性安全。2005年Alexander等人将签密的概念与KEM-DEM结构的混合密码体制相结合,提出了Signcryption KEM-DEM结构的混合签密。
-
To choose a key is easy; to choose a strong key is a bit harder; to remember such a key is the hardest thing.
要选择的关键是容易,选择一个强大的,关键是有些困难,要记住这样一个关键是最难thing。
-
This invention provides a method for transferring third party landing based on IP network including: a door network station carries a ciphered KEY generated randomly by a service server to send a link request to a third party network station so as to avoid transmission of user ciphered codes and ensure absolute security of user codes, besides, since the third party network station calls back the Web server by copying the ciphered KEY to verify the cryptographic key so as to secure the absolute safety of shaking hands, since the door network station does not transfer user ciphered codes with the third party network station, which is not necessary to synchronize with the door station about codes, thus the requirement of complicated maintenance to synchronization on ciphered codes to the third party is reduced.
本发明提供了一种基于IP网络转接第三方登陆的方法,其关键是,由门户网站携带业务服务器随机生成的加密KEY向第三方网站发送链接请求,避免了用户密码的传输,因而保证了用户密码的绝对安全性。再有,由于第三方网站通过复制加密KEY回调Web服务器,由Web服务器进行密钥验证,因而又保证了握手的绝对安全性。应用本发明,由于门户网站与第三方网站之间不传递用户密码,使得第三方网站无需与门户网站进行密码同步等机制的处理,在大大提高安全性的同时,降低了对第三方网站对于密码同步机制等复杂维护的要求。
-
A code rule of correspondence mapping from secret key to magic cube transformation is proposed,Which can realize that the secret key is not limited by both type and size,and the key space is huge.
提出了一种新的密钥与魔方变化的编码对应法则,使该加密算法的加密密钥不受类型、大小的限制,具有密钥空间大的特点。
-
The academic research of this center includes the nation-level key subjects: nonnasality clinic medicine, surgery and inner medicine; Sichuan province-level key subjects such as ophthalmology, psychiatry, and pathological physiology;"211 project" key subjects such as pathology and pathological physiology, surgery, and medical jurisprudence.
该中心的学术科研包括国家级重点学科:口腔临床医学、外科学、内科学;四川省重点学科:眼科学、精神病学、病理生理学等方面;"211工程"重点建设学科:病理学和病理生理学、外科学、法医学等。
-
The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.
在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。
-
The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.
在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。
-
The mobile communication terminal of the invention includes: the inputting part of the key which is arranged with character key; the message receiving part which is used to transmit the literal message that is made with the literal message making mode or receive the literal information; the displaying part which is used to show the content of information input by the key inputting part when it is in the literal message making mode; the memorizer used to storage the program which is relevant to the literal message making mode; the control part which realigns the characters and controls it showing on the displaying part at the literal message making mode when the inputting character has overtopped the character input range.
本发明中的移动通信终端,包含:设置有文字键的键输入部;用于传送通过文字消息制作模式制作的文字消息,或是接收文字消息的消息收发部;在所述文字消息制作模式时,用于显示通过所述键输入部输入的消息内容的显示部;用于存储所述文字消息制作模式相关的程序的存储器;在所述文字消息制作模式时,当输入的文字超出文字输入范围的情况下,对文字进行重新排列并控制其显示在所述显示部的控制部。
- 相关中文对照歌词
- The Remembering: High The Memory
- Down On Longboat Key
- Key Lime Pie
- The Key
- Ring Ding Dong
- Love Is The Key
- J'Adore
- Key West
- Paranoia Key Of E
- Key Of Life
- 推荐网络例句
-
Although translator has turned from being a crystal ball by which the original culture can unrestrainedly penetrate to another crystal ball by which the target culture can freely traverse, the translator's personal embodiment, in the process of cognitive act, are still absent in translation studies. Translators are still subjects without body or simply disembodied subjects.
译者虽然由原语文化可以自由穿透的玻璃球变成了译语文化可以自由穿越的玻璃球,但译者认知过程中的个体体验在翻译研究中依然缺席,译者依然仅仅是一个没有躯体体验的主体。
-
Chillingly, he claimed our technology is 'not nearly as sophisticated' as theirs and "had they been hostile", he warned 'we would be been gone by now'.
令人毛骨悚然的,他声称我们的技术是'并不那么复杂,像他们一样,和"如果他们敌意",他警告说,'我们将现在已经过去了。
-
And in giving such people " a chance to be themselves," he saw himself as a champion of th South's hardscrabble underclass, both black and white.
他给了这些人一个"成就自己"的机会,同时将自己看成是南方那些贫困的下层人民的声援者。