查询词典 elliptic system
- 与 elliptic system 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This article presents some background knowledge, including the symmetric and asymmetric encryption system in cryptography field, the developments of the elliptic curve cryptosystem and PKI.
本文介绍了密码学领域里的对称加密体制和非对称体制、椭圆曲线的发展现状和PKI架构。
-
Thus, this article proposes to apply Elliptic Curve Encryption System in security system of campus card.
由此可见任何存储或者是处理能力的增加都意味着智能卡成本的大幅度提高。
-
In Chapter 3, a certain polynomial Hamilton system with 3 degree is given. By elliptic integral formulas, the monotonicity of the periodic orbits of this system is verified.
在众多文章中,讨论次谐轨的分岔都需要一个条件,那就是在同宿轨附近的周期轨是单调的,第三章给出了一个具体的三次平面Hamilton系统,利用椭圆积分公式验证了这个系统的一对同宿轨附近的周期轨的周期是单调的,这包含了三种情况,周期轨在右边同宿轨内部,在左边同宿轨内部以及在整个同宿轨圈外部。
-
The improved system utilizes good properties of elliptic curve cryptography system and adopts zero knowledge proof .
改进的系统利用了椭圆曲线良好的密码特性,并采用零知识证明方法。
-
In current electronic commercetransaction,the design and realization based on elliptic curve CA system provides a new reference for the design of authentication system.
在目前的电子商务交易中,基于椭圆曲线的CA 系统的设计与实现,为认证系统的设计提供了一种新的参考。
-
From the practice angle,using system method,in deliberatesabove the current CA system foundation,the elliptic curve password system is applied to the CA system.
从实践的角度,运用系统的方法,在研讨当前CA 系统基础之上,将椭圆曲线密码体制应用于CA 系统。
-
Further on, malfunction repair phase is established based on elliptic public-key cryptology in telecontrol system, which can improve reliability of secure telecontrol system implementation.
进一步地,提出了在遥控体制中建立以椭圆公钥技术为基础的故障恢复阶段,以有效提高安全遥控体制实施的可靠性。
-
At first, this paper studies the structure and security situation of electric enterprises information network, then introduces the basic theory of intrusion tolerance. After that, we study the key technology of intrusion tolerance: set up a distributed intrusion detection system model based on mobile agent; study the object replication technology and improve the voting algorithm; analyze and research the elliptic curve encryption system.
论文首先研究了电力企业信息网络结构以及安全现状,接着介绍了入侵容忍的基本理论,然后着重研究了入侵容忍的关键技术:建立了一种基于移动Agent的分布式入侵检测系统模型;研究了对象复制技术,改进了表决算法;分析和研究了椭圆曲线加密体制。
-
In inertia system K,geometric sphere is changed to elliptic sphere in K system by Lorentz transformation ,and the pre-sphere of optical wave in K system is changed to sphere in K system.
对惯性系K中的几何球面施以洛仑兹变换,在K′系得到扁椭球面;对K中的光波前球面,在K′系则得到球面;两者皆源于时空的基本属性,但前者是由于物体长度的相对性,后者则是由于光速的不变。
-
A 40Hz event related potentialdetecting system is introduced here. The system employs the elliptic—type filters which have excellent edge features to extract signals of narrow band frequency . It exploits the correlation—threshold method proposed by us to cancel the musc1e artifacts.
详细介绍了我们建立的一套 40 Hz ERP(4 0 Hz事件相关电位)信号检测系统,该系统使用边缘特性最好的椭圆窄带滤波器提取窄带信号,采用我们提出的相关域值法很好地剔除了肌电干扰,并在微机上实现了实验自动化和结果自动统计。
- 推荐网络例句
-
According to the clear water experiment, aeration performance of the new equipment is good with high total oxygen transfer coefficient and oxygen utilization ratio.
曝气设备的动力效率在叶轮转速为120rpm~150rpm时取得最大值,此时氧利用率和充氧能力也具有较高值。
-
The environmental stability of that world - including its crushing pressures and icy darkness - means that some of its most famous inhabitants have survived for eons as evolutionary throwbacks, their bodies undergoing little change.
稳定的海底环境─包括能把人压扁的压力和冰冷的黑暗─意谓海底某些最知名的栖居生物已以演化返祖的样态活了万世,形体几无变化。
-
When I was in school, the rabbi explained everythingin the Bible two different ways.
当我上学的时候,老师解释《圣经》用两种不同的方法。