查询词典 authentication
- 与 authentication 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Furthermore, a compound 802.1x and WEB authentication scheme is provided to ensures cryptographically protected access while preserving pre-existing public WLAN payment models.
提出了一种802.1X和WEB认证的混合型认证协议,该协议在进行WEB认证时将利用802.1X协商后产生的密钥进行,可有效的抵抗窃取服务、基站伪装、消息窃听等攻击,并与现有公共无线局域网Web认证相兼容。
-
A deniable authentication protocol is proposed in this paper.
提出了一种新的可否认的认证协议。
-
A definition of an ideal functionality for deniable authentication is formulated.
根据可否认认证的安全目标,形式化地建立了UC安全的并行可否认认证模型。
-
A deniable authentication scheme for secret communication suits the sender to parallel implementation is provided.
本文提出了一种用在秘密通信中的、合于发送端并行实现的可拒绝认证方案。
-
We use the character of dynamic conferences, introduce verification secret key set, give the calculation formule of probability of some successful attacks in authentication schemes for dynamic confereices.
在这一部分,我们讨论了网络拓朴结构不是完全图的情形,提出了通信图认证系统,利用图的特征,得出了要使系统充分安全,各用户应掌握的密钥空间的大小,给出了一种构造通信图认证系统的方法。。
-
We analyse the probability of success in deception by malicious groups of receivers, discuss the threshould schemes with limited the number of malicious receivers, give the calculation formule of probability of successful attacks in any transmitted information, and information - theoretic lower bounds,show the size of the secret key space for each participation under the securiey level, provide the construction about the authentication schemes.
第三部分提出了动态会议认证系统,利用动态会议系统的特点,引入验证密钥集,我们运用熵函数,交互信息量及概率分布等方法,对限制内部欺骗者个数的情况进行了分析,得出了欺骗者对系统实施各种攻击成功概率的计算公式及信息论下界,说明了系统在某一安全水平下,各用户应掌握的密钥量。
-
The method has some characteristics:(1) it adapts to medical images authentication due to the high Signal-to-Noise when the watermark was embedded into images.(2) It ensures the fragileness of watermark when it combines with the statistical information of wavelet coefficient to choose the embedding position.(3) It has a strong localization ability for tampering because of the characteristics of wavelet decomposition in the space-frequency domain.(4) It uses the secret key which can resist the malice attack even if opening the algorithm completely to protect the proposed method.
本算法具有以下几个特点:(1)图像嵌入水印后具有较高的信噪比,适用于医学图像的认证;(2)结合小波系数的统计信息来选择嵌入水印的位置,保证了水印的易碎性;(3)小波分解在空频域的特性使得算法对篡改具有很强的定位能力;(4)利用密钥对算法进行保护,即使公开算法,也能抵挡恶意攻击。
-
To assist the signature specialists, the authentication system for off-line Chinese signatures was developed based on a new Integrated Neural Network, which was composed of the modules, namely Feature Distributed Network, Neutral Networks Classifier and Decision Fusional Network.
离线手写签名鉴别是一种基于生物特征的身份识别技术,利用集成神经网络对手写签名进行自动鉴别。该集成神经网络由特征分配网络、神经网络认证主体和决策融合识别网络三部分构成。
-
To assist the signature specialists, the authentication system for offline Chinese signatures was developed based on a new Integrated Neural Network, which was composed of the modules, namely Feature Distributed Network, Neutral Networks Classifier and Decision Fusional Network.
离线手写签名鉴别是一种基于生物特征的身份识别技术,利用集成神经网络对手写签名进行自动鉴别。该集成神经网络由特征分配网络、神经网络认证主体和决策融合识别网络三部分构成。
-
Medicines GMP certification of enterprise, the production of a new drug, pharmaceutical supervisory and administrative departments shall accept: hacky priority to 30 June 1998 any medicines GMP authentication enterprise, the pharmaceutical supervisory and administrative departments will no longer accepts drug production application.
取得药品gmp认证证书的企业,在申请生产新药时,药品监督管理部门予以优先受理:迄至1998年6月30日未取得药品gmp认证的企业,药品监督管理部门将不再受理新药生产的申请。
- 推荐网络例句
-
And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.
47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。
-
Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.
提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。
-
Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...
嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。