英语人>网络例句>in security 相关的网络例句
in security相关的网络例句

查询词典 in security

与 in security 相关的网络例句 [注:此内容来源于网络,仅供参考]

The Israelis named in the case, besides former defense minister Ben-Eliezer, are the following former officials: Dan Halutz, Israeli air force commander at the time; Doron Almog, a general in charge of Israel's southern command; Giora Eiland, president of the national security council; Michael Herzog, a senior defense ministry official, Moshe Ya'alon, head of the Israeli defense forces and Abraham Dichter, a senior security official.

以方涉案人员名单中,除了前国防部长本埃利泽;还有前政府官员:哈卢茨,他当时任以色列空军司令;多伦阿尔莫格,当时负责以色列南部指挥的将军;埃朗德,国家安全委员会主席;迈克尔赫尔佐格,一位国防部高级官员;摩西卡亚龙,当时负责以色列国防军和亚伯拉罕迪希特的一名高级安全官员。

We propose a dynamic identity authentication scheme through a theorem about relative prime numbers, which can prevent replay attacks from taking place. In addition, we present a threshold signature scheme without a trusted party by use of joint secret sharing technique. Finally, the security flaw in an enhanced password authentication scheme is pointed out and the security of an enhanced key agreement protocol is analyzed.

首先基于一个关于互素数的定理设计了一个动态身份认证协议,该协议使攻击者不可能通过回放攻击来假冒用户;利用联合秘密共享技术设计了一个无可信中心门限签名方案;最后,分析了一个改进的身份认证协议存在的安全漏洞,以及一个改进的密钥协商协议的安全性。

Since, moreover, for God and the amendment of our kingdom and for the better allaying of the quarrel that has arisen between us and our barons, we have granted all these concessions, desirous that they should enjoy them in complete and firm endurance forever, we give and grant to them the underwritten security, namely, that the barons choose five and twenty barons of the kingdom, whomsoever they will, who shall be bound with all their might, to observe and hold, and cause to be observed, the peace and liberties we have granted and confirmed to them by this our present Charter, so that if we, or our justiciar, or our bailiffs or any one of our officers, shall in anything be at fault towards anyone, or shall have broken any one of the articles of this peace or of this security, and the offense be notified to four barons of the foresaid five and twenty, the said four barons shall repair to us (or our justiciar, if we are out of the realm) and, laying the transgression before us, petition to have that transgression redressed without delay.

此外,基于对神的爱,为了促进国家昌明,为了更好的消除我们与男爵们之间的冲突,我们已同意授予上述各项权利,愿各位男爵完全而完满地得享自由,直到永远,为此我们同意授予如下之保障措施:各位男爵可凭心意从国中选举二十五名男爵,这些男爵应尽其全力遵守、维护并确保所有人遵守我们所授予的、由本宪章确认的和平与各项自由权利;故,兹明确,如我们、或我们的司法官、或我们的执行吏、或我们的任何其他官员侵犯任何人或违反和解条文与保证条文中任何一款,并且,如上述二十五名男爵中有四人获知违规情节,则该四名男爵即可面见我们,如我们不在国内,则面见司法官,指出错误行为,并要求立即纠正。

Hybrid schemes in a KEM-DEM structure is regarded as the most natural approach to public key encryption with IND-CCA security and practical efficiency. Traditional KEM is realized by public key scheme, which only provides confidentiality security for session key used by DEM. In 2005, combining the idea of signcryption with the KEM-DEM model hybrid encryption, Alexander proposed a signcryption KEM-DEM model hybrid signcryption primitive.

KEM-DEM结构的混合密码体制是获得IND-CCA安全最实际有效的方法,传统的KEM由公钥加密方案实现,仅提供DEM使用的会话密钥的保密性安全。2005年Alexander等人将签密的概念与KEM-DEM结构的混合密码体制相结合,提出了Signcryption KEM-DEM结构的混合签密。

The formation in the world of professional maintop pattern design software, well known for not more than five, where the corporations'entering there are three products, that is,巴可 the company's Fortune; Hungarian Jura company Geoli Jspre software and now has more than 10 introduces a set of security design software, distribution in the Ministry of public security and the plant and design centre.

纲前寰宇上变成商品化的副业版纹安排软件好众,闻名的不不及五家,其洋出去洋国阛阓的有不一财产物,即巴可公司的Fortune;匈牙利Jura公司的Jspre软件和Geoli,纲前不国外共引进了10缺套不攻伪安排软件,漫衍在公安部和各印钞厂及安排洋心。

The security verification based on the content authentication is implemented through feature extraction, choosing of the shared encryption key, transformation of the Hash function and generation of the Merkle tree, which is simulated in the environment of NS-2. The result shows that the proposed mechanism has better performance in the efficiency and security.

通过特征提取、选取共享密钥、Hash函数变换和构造Merkle树实现基于内容认证的安全性检验,并在NS-2环境下进行了仿真模拟,结果表明所提出的安全机制具有较好的效率和安全性。

Mr. Zhou and his wife are the County Public Security, the patisserie is very fortuitous for them. In 1997, the county public security bureau in materials Hanban Mr. Zhou's work, because the gambling debt of more than 20 million of debt.

周先生夫妇都是公安县人,开蛋糕店对于他们来说很偶然。1997年,在公安县物资局驻汉办工作的周先生,因为赌钱欠下了20 多万元债务。

this paper presents a whole design of network security audit and monitoring system, including the design of monitoring module in proxy and network capability, etc. and it also proposes the implement flow of these function models including the implement flow of security audit model and network monitoring model, it also gives the design and realization of ip address peculate model and monitoring module in proxy.

该文给出了网络安全审计与监控系统的整体设计,提出了系统监听方式下和网桥方式下的拓扑结构,该文还给出了系统的功能模型实现流程,包括安全审计模型的实现流程和网络监控模型的实现流程,系统中的ip地址盗用模块设计和代理服务器监控模块设计和实现。

In order to improve the security, a signature scheme based on two hard problem assumptions is proposed. The security of the scheme is based on the difficulties of simultaneously solving the elliptic curve and quadratic residue. A attacker can't forge the signature of messages even if a attacker can solve theelliptic curve discrete logarithm problems or quadratic residue problem in the scheme.

为了提高签名的安全性,本文对Wang等人提出的签名方案进行改进,提出了一个基于椭圆曲线离散对数问题和二次剩余问题的数字签名方案,并对该方案的安全性进行分析,指出在椭圆曲线离散对数问题或二次剩余问题可解的情况下,攻击者也无法伪造消息的签名。

In order to cause the farmer resident to carry on smoothly, in view of the farmer comprehensive quality question,the loses farmer's compensation question,the social security question,lateral economic ties question, we need to enlarge the education investment, strengthen farmer's education training, solve there children's education problem; we should formulate compensation standard reasonably, make land legislation scientific, perfect government function; we must establish a scientific,comprehensive and unified social security system gradually; we need to desalinate the relation of household register and the social authority slowly, reduce the city admittance threshold, form a lateral economic ties to conform to the Chinese national condition;we should try our best to develop country company.

为使农民市民化顺利进行,针对农民综合素质,失地农民补偿,社会保障,户籍制度等问题,需要加大教育投入,加强农民的教育培训,解决其子女的教育问题;科学制定补偿标准,科学土地立法,完善政府职能;逐步建立一个科学的,全面的,统一的社会保障体系;慢慢淡化户籍与社会权力的关系,降低城市准入门槛,形成一个符合中国国情的户籍制度;大力发展乡镇企业。

第31/100页 首页 < ... 27 28 29 30 31 32 33 34 35 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。