查询词典 in security
- 与 in security 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Provable Security is a formal method for proving the security of cryptographic schemes, in which the difficulty of breaking a particular scheme is formally related to that of solving a widely believed computational hard problem. Provable security has already become an important theme of theoretical researches in modern cryptography. This dissertation investigates the provable security of public-key encryptions and hybrid encryptions of asymmetric and symmetric encryptions. This includes the various formal security notions and the constructions can be proved to achieve them. Among the constructions, hybrid encryptions are themselves an important way to obtain public-key encryption schemes with chosen ciphertext security. The main results are as follows:(1) The one-wayness of the trapdoor one-way function in NTRU depends on the randomness of the session key, which is different from previous ones. Based on this observation, a new kind of trapdoor one-way function, trapdoor one-way functions with an auxiliary random variable is proposed.
可证明安全性是一种证明密码学方案安全性的形式化方法,它将密码学方案的安全性归约为公认的计算难题,已成为现代密码学领域中理论工作的主线,本文主要研究公钥加密与单双钥混合加密的可证明安全性,这包括它们的各种形式化安全性定义以及达到这些安全性定义的方案构造,而单双钥混合加密本身也是一种构造选择密文安全公钥加密的重要方法,本文得到的主要结果如下:(1)在研究NTRU公钥加密的特殊性基础上,对于公钥加密的陷门单向函数加密模型进行了扩展,提出了具有辅助陷门单向函数的概念,并将其扩展到多元的情况,讨论了可能的密码学用途。
-
This paper,after reviewing endowment insurance,cooperation medical treatment,bottommost life security and immigrant worker's security,concludes the following problems in rural social security system of Heilongjiang: wide coverage of security with lower insurance payment;many problems existing in implementing new-type rural cooperation medical system and bottommost life security system;ever-increasing government's focus on immigrant worker's security.
黑龙江省是一个农业大省,在确保全国粮食供应方面做出了很大贡献。近年来,随着经济发展和社会进步,黑龙江省的农村社会保障制度建设也有了一定发展。但是,不可否认的事实是,黑龙江省农民的一些生产和生活仍然缺乏必要的保障,如农村养老保险问题、看病问医困难的问题等等。
-
From the aspects of systematology and tourist geology, tourist security is taken as a risk system, which is a special complicated and correlated system consisting of the tourists and the environment of the scenic spot. The implication, formation, structure and the research content of tourist security are preliminarily explored; and the security analysis, security assessment, and security measures of the system are correlatively studied so as to find sane solution of the security problem existing in the development of modern tourist industry.
笔者从系统论和旅游地理学的角度,把旅游安全作为一个风险系统进行研究;认为旅游安全风险系统是由旅游者与旅游景区环境共同组成的一个复杂的特定的相互依赖的系统;初步探讨旅游安全风险系统的组成、结构和研究内容;对旅游安全风险系统的安全分析、安全评价和安全措施进行了相关研究;通过研究,以期弄清现代旅游业发展中存在的安全问题,提出旅游安全风险对策。
-
It is known that the security defense intensity of the information system depends on the weakest part of Maginot line. If there is no appropriate security architecture as a guide, it is difficult for the various security components in the information system to coordinate with each other and to work in order. Then, it often appears the "safety shortcomings" phenomenon, resulting in the vulnerability in the security and all the protection efforts in the information system are in vain. 2 Trusted computing and security mechanisms come apart.
众所周知,信息系统的安全防护强度取决于"马奇诺防线"中最为薄弱的环节,如果没有合理的安全体系结构作为指导,信息系统中各安全部件就难以相互协调、有序工作,就很容易出现"安全短板"现象,从而导致信息系统安全防护不堪一击,所有的努力功亏一篑。2可信计算和安全机制相脱节。
-
This article first has carded on the limits to the spirit security concept,then discusses in this foundation by the Mallow's Hierarchy of Needs theory,social safety-valve theory, harmonious society theory as theoretical stupors of spirit protection,Pointed out that the spiritual security supply and demand contradictory prominent,the spiritual security emergency lag is the existence subject matter in our country spirit security development.The reasons are manifold.If we want to achieve the spirit protection,we must steps in the multiple participation,the system design recuperation,the theoretical research strengthen and the integration of multiple resources. Only in this way,Social security can play the role of social safety net and truly promote social harmony.
本文首先对精神保障的概念进行了界定,并在此基础上以马斯洛需求层次论、社会安全阀理论、和谐社会理论等作为支撑,对我国精神保障的发展现状进行了分析,指出精神保障供求矛盾突出、精神保障应急滞后是目前我国精神保障发展存在的主要问题,而其原因是多方面的,所以一定要通过多元主体的参与、制度设计的调理、理论研究的强化、多方资源的整合等才能达成精神保障的发展,才能更好的发挥社会保障的安全网作用,真正促进社会和谐。
-
This text makes the basic theories problem of the related society security as the studying point of departure, and clarifies the theories foundation of the society security tax, and through drawing lessons from the international social advanced experience, combined actual circumstance of our country, clarifies the necessity and possibility to lay the social security tax in the our country, and on the foundation of the first step design of the basic frame of the social security tax, further puts forward to need to be adopted of related integration in laying social security tax .
本文以相关社会保障基本理论问题为研究起点,阐明了社会保障税的理论依据,通过借鉴国际社会的先进经验并结合我国的实际情况,阐明在我国开征社会保障税的必要性与可能性,并在对社会保障税税制基本构架进行初步设计的基础上,进一步提出了需要采取的与开征社会保障税相关的配套措施。
-
By analysis of the financing"s status and existing programs, we can point out the necessity and feasibility of introduction the social security tax in China, and collection of social security tax is the best way to conclude the social security funds.By the comparition and analysis of other countries" style of social security tax, it can give more lessons; in the premise of Chinese actual situtiation , we point out the overall design about the principle, the style, system design, and matching police. It will give benefits to the perfection of social security system..
然后,又通过对世界各国的社会保障税模式进行比较和分柝,以资对我国社会保障税的开征提供可借鉴的经验,并在尊重我国实际情况的前提下,从社会保障税设计应遵循的原则、社会保障税模式的选择,税制要素设及其配套建设等方面提出了我国社会保障税的总体设计,以期对我国社会保障体系的完善有所裨益。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
Security" means any note, stock, treasury stock, security future, bond, debenture, evidence of indebtedness, certificate of interest or participation in any profit-sharing agreement, collateral-trust certificate, preorganization certificate or subscription, transferable share, investment contract, voting-trust certificate, certificate of deposit for a security, fractional undivided interest in oil, gas, or other mineral rights, any put, call, straddle, option, or privilege on any security (including a certificate of deposit) or on any group or index of securities (including any interest therein or based on the value thereof), or any put, call, straddle, option, or privilege entered into on a national securities exchange relating to foreign currency, or, in general, any interest or instrument commonly known as a "security, or any certificate of interest or participation in, temporary or interim certificate for, receipt for, guarantee of, or warrant or right to subscribe to or purchase, any of the foregoing.
参见笔者文章,《美国&公司&的主要经营组织形式及法律特征分析》,&corporation&与&Company&在我国虽然都被翻译为&公司&,但它们在英文中却是两个完全不同的概念。
-
Pacific Security Net (http://www.tpy888.cn) are set up at China's largest professional security market - Security Pacific markets on the basis of professional industry portal website was founded in 2006 in 2007 after to reposition and re-revision, after a short period of time quickly attract a large number of security companies register for web site publishers to more than 100,000 products in the security industry have a strong media influence.
太平洋安防网(http://www.tpy888.cn)是建立在中国最大的安防专业市场——太平洋安防专业市场基础上的行业门户网站,网站始建于2006年,在2007年经过重新定位及改版后,短时间内迅速吸引了大量的安防企业注册,网站发布产品超过十万件,在安防行业内有着很强的媒体影响力。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。