英语人>网络例句>authentication 相关的网络例句
authentication相关的网络例句

查询词典 authentication

与 authentication 相关的网络例句 [注:此内容来源于网络,仅供参考]

Theoretical analysis indicates that the proposed scheme is capable of identifying the authenticators with the authentication key data.

分析显示,基于RS码的认证密钥图像半脆弱水印具有很好的完整性认证和鲁棒性认证功能。

Article 35 The judicial authentication documents shall be signed or sealed by the judicial authenticators.

第三十五条司法鉴定文书应当由司法鉴定人签名或者盖章。

In case on such consent may be reached through negotiations, the people's court shall designate the authentication institution and authenticators.

第二十六条当事人申请鉴定经人民法院同意后,由双方当事人协商确定有鉴定资格的鉴定机构、鉴定人员,协商不成的,由人民法院指定。

At the request of a party or as required by an arbitral tribunal, an authentication agency shall send the authenticators to participate in the hearing.

根据当事人的请求或者仲裁庭的要求,鉴定机构应当派鉴定人参加开庭。

Judicial authentication refers to the activities that authenticators identify, make judgments and offer expertise on the special issues involved in litigation by using scientific technologies or special knowledge.

在这些活动中,鉴定者做出鉴定和判断,并就一些特殊的诉讼案通过使用科学技术和特殊知识提供专门意见。

When two communicants and an adversary obtain correlated information through independent binary symmetric channels from a random source, and the adversary's channel is noisier than those of communicants, an authentication scheme which uses the correlated information between the two communicants is proposed based on the coding theory to make possible information theoretic secret key agreement against active attacks.

在无条件安全密钥协商中,假定通信双方通过相互独立的无记忆二元对称信道来接收二元对称信源所传送的信息作为初始信息,在这种条件下,本文提出了一种利用他们之间的初始相关信息对公共信道上的消息进行认证的具体方案,从而使得无条件安全密钥协商具有抗主动攻击的能力。

In this we are configuring form authentication for Internet application.

在此,我们正在配置为Internet申请表认证。

The scheme has the structure of hierarchical PKGs, so a lowerlevel PKG can share the workload of secret information generation and identity authentication with a higherlevel PKG. At the same time the scheme has the property of proactive security, that is, the whole lifetime of signature is divided into several time periods, and the shares of private key need to be renewed in each time period. However, new shares can construct the same private key as old shares.

方案具有分层的PKG结构,低层PKG可以分担高层PKG的秘密信息产生和身份认证的任务;同时具有动态安全的特性,将签名的整个生命周期分成若干时间段,每个时间段都对密钥份额进行更新,更新后的份额重构的密钥保持不变。

A hierarchical IDbased proactive threshold signature scheme is presented. The scheme has the structure of hierarchical PKGs, so a lowerlevel PKG can share the workload of secret information generation and identity authentication with a higherlevel PKG. At the same time the scheme has the property of proactive security, that is, the whole lifetime of signature is divided into several time periods, and the shares of private key need to be renewed in each time period.

方案具有分层的PKG结构,低层PKG可以分担高层PKG的秘密信息产生和身份认证的任务;同时具有动态安全的特性,将签名的整个生命周期分成若干时间段,每个时间段都对密钥份额进行更新,更新后的份额重构的密钥保持不变。

In terms of how to realize the authentication at court , different understandings exist in theory and practice .

对于如何实现当庭认证,在理论上和实践中有不同的理解。

第53/54页 首页 < ... 46 47 48 49 50 51 52 53 54 > 尾页
推荐网络例句

And Pharaoh spoke to Joseph, saying, Your father and your brothers have come to you.

47:5 法老对约瑟说,你父亲和你弟兄们到你这里来了。

Additionally, the approximate flattening of surface strip using lines linking midpoints on perpendicular lines between geodesic curves and the unconditional extreme value method are discussed.

提出了用测地线方程、曲面上两点间短程线来计算膜结构曲面测地线的方法,同时,采用测地线间垂线的中点连线和用无约束极值法进行空间条状曲面近似展开的分析。

Hey Big Raven, The individual lies dont matter anymore - its ALL a tissue of lies in support of...

嘿大乌鸦,个别谎言的事不要再-其所有的组织的谎言,在支持。