英语人>网络例句>internet mail access protocol 相关的网络例句
internet mail access protocol相关的网络例句

查询词典 internet mail access protocol

与 internet mail access protocol 相关的网络例句 [注:此内容来源于网络,仅供参考]

If two parties want to sign a contract C over a communication network, they must "simultaneously" exchange their commitments to C Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchange partial commitments in a piece by piece manner The party of secondly sending commitments may have a slight advantage; a "fair" protocol must keep this advantage within acceptable limits The protocol for signing a contract is improved based on the research result of secure multiparty computation In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub protocol, but he can't gain more information about the whole signature by accumulating the signed bit or the committed bit After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party At this moment, the party doesn't care about the advance quit of the other party, because he has gained the whole signed information Finally, it is proved that this protocol is quit fairness

作者中文名:曲亚东;侯紫峰;韦卫摘要:在网络环境中解决合同签订问题需要保证信息交换的同时性,以前提出的协议都会给第2个发送者部分计算特权,利用不经意传输协议则可以解决这个问题。在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别宣布承诺,并得到对方对合同的完整签名;在宣布承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议。在文章的最后利用多方安全计算的结论证明了该协议满足终止公平性。

If two parties want to sign a contract C over a communication network, they must "simultaneously" exchange their commitments to C Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchange partial commitments in a piece by piece manner The party of secondly sending commitments may have a slight advantage; a "fair" protocol must keep this advantage within acceptable limits The protocol for signing a contract is improved based on the research result of secure multiparty computation In this protocol, the parties obliviously transfer the signed bit and the committed bit; the other parties can prove the validity of this bit based on the confirming sub protocol, but he cant gain more information about the whole signature by accumulating the signed bit or the committed bit After the parties exchange the whole signed information, they declare the commitment about the signature respectively, and gain the whole signature of the other party At this moment, the party doesnt care about the advance quit of the other party, because he has gained the whole signed information Finally, it is proved that this protocol is quit fairness

在网络环境中解决合同签订问题需要保证信息交换的同时性,以前提出的协议都会给第 2个发送者部分计算特权,利用不经意传输协议则可以解决这个问题在协议执行过程中,参与者将合同的签名位以及他对签名位的承诺不经意传输给对方,对方可以利用验证子协议证明该位的有效性,但是他却不能通过位交换次数的增加获取更多的完整签名的信息;在完成签名位的交换之后,参与者分别宣布承诺,并得到对方对合同的完整签名;在宣布承诺时,协议参与者已经获得全部的签名内容,要么是签名位,要么是对方对该位的承诺,因此参与者并不需要担心对方提前终止协议在文章的最后利用多方安全计算的结论证明了该协议满足终止公平性1 引言两个参与者A和B想要通过网络协商签订合同C 为了保证公平性,参与者必须同时交换自己对合同的签名,然而在实际的网络环境中,想要完全同时地交换对合同的签名是不可能的,他们必须将签名分成若干块依次地执行,以保证大致的同时性但是这种方法依然存在着问题

In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.

本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。

Internet ethics develops with the development of internet technology,which is used to adjust the internet action and makes sure the good order of internet .Freedom,globality and distribution of internet have improved the behavior bodies also do some unmoral things for example:internet rack,internet virus ,internet crime and so on .

网络的自由性、全球性以及传播方式的超地域性,扩大了行为主体的行为能力、行为方式和行为范围,与此同时,作为行为主体的网民也出现了一些不道德行为:网络黑客、网络病毒、网络犯罪等。

In China, the Electronic Business and the Internet Sales stilted late and until 1996, they were attempted by Chinese enterprises , Now the Internet Sales has been adopted by the Chinese enterprises, All kinds of Internet investigations, Intersperses , All kinds of Internet investigations , Internet advertisements , Internet distributions and Internet services have interfered in the trade of enterprises ,However , compared to the developed countries , the general conditions of Chinese Internet sides is at a low level and it remands on the primary stage .

中国的网络营销起步较晚,直到1996年才开始被中国企业尝试,与发达国家相比,中国网络营销发展的总体水平较低,仍停留在起步阶段。

Professional Main Products are:(1) all kinds of electric locks Product Series: electromagnetic lock series, electric plug lock series, electric locking series lock series, hotel lock series, all kinds of special-shaped electric lock series;(2) sizes Intelligent Access Management Series: Single door machine, access control attendance machine, fingerprint access control machine, single-door two-way controller, two two-way controller, four one-way controller (communication mode may choose 485 or TCP / IP);(3) access control electric locks surrounding attachment Series: electric plug lock folder dedicated Frameless door, magnetic lock dedicated stent, the models go out button, a dedicated lock access control power supply, various types of access control card , EMID reader / issuer, and intercom access control system, a dedicated power lock delay.

专业主营产品有:(1)各式电锁产品系列:电磁锁系列、电插锁系列、电锁口系列、指纹锁系列、酒店锁系列、各式异形电锁系列;(2)大中小型智能门禁管理系列:单门一体机、门禁考勤机、指纹门禁一体机、单门双向控制器、两门双向控制器、四门单向控制器、(通讯模式均可选择485或TCP/IP);(3)门禁电锁周边附件系列:电插锁专用无框门夹、磁力锁专用支架、各款式出门按钮、门禁专用锁电源、各类型的门禁感应卡、EMID读卡器/发卡器、对讲门禁系统锁延时专用电源。

Open Shortest Path First is a routing protocol developed for Internet Protocol networks by the Interior Gateway Protocol working group of the Internet Engineering Task Force. The working group was formed in 1988 to design an IGP based on the Shortest Path First algorithm for use in the Internet.

最短路径优先是Internet 任务工程组的一个工作组为IP网络开发的一个内部网关路由选择协议,该工作小组成立于1988年并致力于为INTERNET应用设计一个基于最短路径优先算法的内部网关路由协议。

On the basis of analyzing modbus protocol and tcp/ip protocol, the design method of retrenching tcp/ip protocol is proposed, and multi-connection signal gathering device based on tcp/modbus protocol is designed. the method of transmitting data between the signal gathering device and multi-hosts in the internet is analysed.

在详细分析tcp/ip协议和modbus协议的基础上,提出对tcp/ip协议进行精简的设计方法,设计了基于tcp/modbus协议的面向多连接信号采集器,重点分析了信号采集器和多台计算机通过internet传输数据的方法。

The new protocol can implement neat access control of audit logs verification based on recorder ID, time, subject, object and recorder type, so the new protocol is more efficient at access control of audit log verification than SK protocol.

在查证阅读证据记录的权限申请与分配方面新的协议与SK协议相比更加灵活和符合实际问题而且通信量更少。

According to ICANN related to ICANN auction proceeds will be distributed mainly used to promote the Internet to maximize the public interest, including ways to reduce the fee to register to share part of their profits to improve the Internet infrastructure, protect the security and stability of the Internet, ICANN's activities related to financial support, reducing the access threshold for the Internet to enhance the penetration of the Internet, ICANN in the Internet industry to strengthen the status.

根据ICANN的相关办法,拍卖所得将由ICANN进行分配,主要用于促进互联网的公共利益最大化,包括以降低手续费的方式使注册人分享部分收益、改善互联网基础设施、保障互联网的安全与稳定、对ICANN的有关活动提供资金支持、降低互联网的准入门槛,提高互联网的普及程度、加强ICANN在互联网行业中的地位等。

第2/500页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Bring My Mail
FanMail
Santa.Com (aka I'm Gonna Email Santa)
Internet Thugs Attack
My Internet Girl
You've Got Mail Enhancement
Internet Going Nutz
Internet Connection
Big Sunglasses
Access Me
推荐网络例句

But this is impossible, as long as it is engaging in a market economy, there are risks in any operation.

但是,这是不可能的,只要是搞市场经济,是有风险的任何行动。

We're on the same wavelength.

我们是同道中人。

The temperature is usually between 300 and 675 degrees Celsius.

温度通常在摄氏300度到675度之间。