英语人>网络例句>authentication 相关的网络例句
authentication相关的网络例句

查询词典 authentication

与 authentication 相关的网络例句 [注:此内容来源于网络,仅供参考]

The plug-in has three advantages: First, each packet is authenticated by a One-time Signature, so there is no need for both sender and receiver maintain a buffer and there is no delay for signing and verifying and authentication failure of current packets do not effect the authentication of other packet. Second, we design a mechanism to regenerate Merkle Trees, so just only one normal digital signature signing operation is required to provide unlimited number of One-time Signature for signing unlimited length of

插件有如下特点:一、使用一次签名对每个包单独签名和认证,接发双方不需要缓存包,没有延迟,而且当前包的认证失败或者丢失不影响其他包的认证;二、设计了两颗树交替更新的机制,只需要开头一个普通数字签名,就能确保有效的一次签名能源源不断的生成,因此可对无限长的流签名;三、在包的层次上操作,因此可以处理任何流媒体类型。

Our company is a manufacturer of professional lighting console, dimmer pack, lighting equipment connecter. In 2003, the company succeeded in passing the ISO9001 international quality system authentication, at the same time, it also managed to obtain the IQnet international authentication and became the formal member of ESTA, USA.

我公司是从事专业调光控制台、可控硅箱、灯光设备接插件生产的制造商,公司于2003年顺利通过了ISO9001国际质量体系认证,同时获得IQnet国际认证证书,同年成为美国ESTA正式会员,部分产品已获得CE认证。

As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today's communication network. It can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission.

在现代的数字通信网络中,数字签名作为数据认证技术中的一项关键技术,可以解决否认、伪造、篡改及冒充问题,用来保证信息传输过程中的完整性,提供信息发送者的身份认证和不可抵赖性。

Introduces the fingerprint identification technology used in ID authentication,provides a solution for the network ID authentication system based on fingerprint identification,gives the system topology and software architecture.

介绍了指纹识别技术及其在身份认证方面的应用,提出了基于指纹识别的网络身份认证系统的一种解决方案,给出了系统的拓扑结构和软件体系结构。

We propose a dynamic identity authentication scheme through a theorem about relative prime numbers, which can prevent replay attacks from taking place. In addition, we present a threshold signature scheme without a trusted party by use of joint secret sharing technique. Finally, the security flaw in an enhanced password authentication scheme is pointed out and the security of an enhanced key agreement protocol is analyzed.

首先基于一个关于互素数的定理设计了一个动态身份认证协议,该协议使攻击者不可能通过回放攻击来假冒用户;利用联合秘密共享技术设计了一个无可信中心门限签名方案;最后,分析了一个改进的身份认证协议存在的安全漏洞,以及一个改进的密钥协商协议的安全性。

The presented security adequacy of unilateral authentication secure, mutual authentication secure, unilateral session key secure, or mutual session key secure is proved not only substantial but also necessary to meet 4 security definitions respectively under the computational model of matching conversation and indistinguishability.

在基于匹配对话和不可区分性的计算模型下,证明了给出的保证密码协议单方认证安全、双方认证安全、单方密钥安全和双方密钥安全的充分必要条件分别满足4个可证安全定义。

What's more, we also study some key techniques and realization difficulties of image authentication in-depth, including referent block to help tamper localizing, sign bit adjustment for binary encoding, mean quantization improvement, diagonally extension to help tamper localizing, and discard isolated error point to tolerate incidental distortion. These techniques can be used for good reference to the development of image authentication technique.

此外,我们还对数字图像鉴别的一些关键技术和实现难点进行了深入研究,主要包括有:参考点辅助定位技术、二值编码中的符号处理技术、均值量化方法的改进技术、对角扩展和去除孤立点技术等,这些技术的研究都对数字图像鉴别技术的发展具有很好的借鉴意义。

In chapter 6, an authentication protocol is proposed and the logical verification is done to it. It is proved that this protocol can satisfy the security requirement of Diffie's identity authentication protocol [37] and Janson and Tsuduk's key distributior protocol [39] . In addition, its ability of resisting the replaying attack has been discussed.

本文第六章中提出了一种鉴别协议,并对该协议进行了逻辑验证,证明它可以满足Diffie的身份鉴别协议的安全需求〓,以及Janson和Tsuduk的密钥分发协议的安全条件〓,另外还着重讨论了它是可以抵抗伪造攻击的。

In this paper, various kinds of Identity-Authentication schemes are analyzed and compared, and the Individual Identity-Authentication scheme is designed to meet the requirement of the jarl MIS, which was based on fingerprint identification technology, digital signature technology and ID technology. The design is also realized in the registration management system by fingerprint.

本文通过对各种身份认证方案进行综合的分析和比较,并结合监狱指纹点名管理系统对身份认证方案的具体要求,设计了基于指纹识别、数字签名及智能卡技术于一体的个人身份认证方案,并将它在监狱指纹点名管理系统中予以实现。

In this paper, various kinds of Identity-Authentication schemes are analyzed and compared, and the Individual Identity-Authentication scheme is designed to meet the requirement of the jarl MIS, which was based on fingerprint identification technology, digital signature technology and ID technology.

本文通过对各种身份认证方案进行综合的分析和比较,并结合监狱指纹点名管理系统对身份认证方案的具体要求,设计了基于指纹识别、数字签名及智能卡技术于一体的个人身份认证方案,并将它在监狱指纹点名管理系统中予以实现。

第4/54页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.

然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。

Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.

镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。

A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.

付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。