英语人>网络例句>key-board 相关的网络例句
key-board相关的网络例句

查询词典 key-board

与 key-board 相关的网络例句 [注:此内容来源于网络,仅供参考]

This scheme selects the minimal span set of all predistributed keys by running the adaptive key selection algorithm. It can maintain the security of the network and improve the connectivity among sensors simultaneously and integrate with the existed key predistribution schemes very easily.

该方案通过运行自适应****选择算法生成部署集中所有预分配****的最小生成集,从而在维持较高安全性的同时极大地提高了传感器节点之间的连通概率,并且能很容易地与现有的****预分配方案相结合。

There are 3 key provincially supported disciplines, 10 key construction disciplines of university, 6 brand-making majors of university, 2 provincially model laboratories, 15 elaborate courses of university and 1 provincially elaborate course.

学校全面加强学科建设,按照强化基础学科,突出优势学科,扶持新兴学科的思路,对原有学科布局进行了优化和重组。

This opportunity the Expo offers to rebrand Liverpool and the region in the eyes of a key Chinese audience is one of the key tangible benefits the business plan spells out.

世博会所提供的让利物浦重新标志该城市和西北部其它地区品牌的机会是中国观众有目共睹的。而这也是此商务计划提到的最直接的重要收益之一。

The scheme adopts a multi-agent system and a threshold secret share technology, in which the secret information and the shares are carried by many different agents, adopts D-H key exchange technology to encrypt intermediate result to hide real intention of agent, to protect the privacy of agents and to enhance the reliability and the fault-tolerance capability of the mobile agent system. A mobile agent with limited authorization can sign a message on behalf of a user at far-end without divulging the user s private key. In order to avoid rebuilder attack the time-stampe mechanism is adopted.

运用信息加密和身份认证技术,实现了移动Agent和Agent平台间双向身份认证,有效地防止了恶意Agent对Agent平台的攻击或越权访问以及恶意Agent平台对Agent的攻击;引入远端可信任的代理平台作为数据处理平台,采用多代理系统和门限秘密共享技术,将加密信息和密钥由多

Secondly, most of typical scheme for MANET multicast reking are based inbalanceable key tree, the most import problem of multicast reking is providingforward security when member leaves and backward security when member join, then,how to improve efficient of multicast reking, decrease the cost of reking, is the coreproblem of balanceable key tree for MANET multicast reking.

对于大规模自组织网络,采用完全集中式或完全分布式的组****管理的方式容易形成系统单一失效点、产生网络分割、不同步等问题,实际应用中宜采用结合集中式和分布式优点的分散式的组****管理框架,子组中心管理和用户子组管理是框架的两个管理层次,对子组中心管理关注的是组****分发的安全性和效率,如何实现分布式身份可验证的组****分发是自组织网络组****管理的关键问题。

For resettable zero-knowledge, we introduced a new registered public-key model: the weakpublic-key model.

对于可重置零知识,我们引入了一个新的注册公钥模型:弱公钥(weak public-keyWPK)模型。

Database encryption and user-dependent restorable key management scheme insure the security of key storing, backuping and restoring.

给出了数据库加密技术和依赖用户的可恢复密钥管理机制的设计,实现了用户密钥的安全存储、备份与恢复。

To discuss on a new way of preventing malpractice and dispute,to lower the atio of medical accident,and to give reference to improving management under new situation,the author put forward view points from links influencing medical safe as followed:Firstly,improve quality of health service stop revent medical malpractice and dispute.Secondly,streng then safe education to firm the foundation of prevention.Thirdly,enforce management of military wounded to prevent their misdeed. Fourthly,pay attention to key position and key link to actualize the regulations of medical safe management.

为了探讨医疗事故和纠纷防范的新路子、新方法,降低医疗安全事故的发生率,以及为新形势下提高医疗安全管理水平提供参考,本文针对公立医院特点,从影响医疗安全的各环节入手,提出了防范医疗事故和纠纷的有效措施:一是努力提高医护质量,从源头预防各类医疗事故和纠纷的发生;二是大力加强安全教育和作风建设,打牢医疗安全防范的思想根基;三是加强对病员管理,预防病员违法违纪;四是抓住重点部位、关键环节安全管理,制定并确保各项医疗安全管理制度落到实处。

Forward security is achieved by an evolutional parameter,which is updated with the evolution of time segment,and the group public key and members' certificates are updated along with the parameter.If a menber's private key is betrayed,the attackers can't forge the member's previous signatures.Revocation is achieved by Certificate State List,which needs the group center to update the CSL in real time,and the previous signatures of the revocative members are still valid.

前向安全性通过一个进化参数实现,进化参数随着时间段的变化而进化更新,从而使群公钥和成员证书进化更新,即使成员密钥泄露,攻击者也无法伪造该成员以前的签名;成员撤消通过证书状态列表实现,只需群中心实时更新成员证书状态列表,被撤消成员其以前的签名仍然有效。

So conforming to the authenticated key agreement security attributes defined by L. Law, an Elliptic Curve Cryptography based Secure and efficient authenticated key agreement protocol - SEAK protocol are proposed.

为此,按照L.Law所定义的认证密钥协商协议的安全特性,提出一种基于椭圆曲线密码体制的安全高效认证密钥协商协议——SEAK协议。

第62/100页 首页 < ... 58 59 60 61 62 63 64 65 66 ... > 尾页
相关中文对照歌词
Key Lime Pie
The Key
Minor Key Sonata
Down On Longboat Key
Laid Back 'n Low Key
Key To Your Heart
Take The Key
Dota 2 Beta Key
My Key
The Key
推荐网络例句

Breath, muscle contraction of the buttocks; arch body, as far as possible to hold his head, right leg straight towards the ceiling (peg-leg knee in order to avoid muscle tension).

呼气,收缩臀部肌肉;拱起身体,尽量抬起头来,右腿伸直朝向天花板(膝微屈,以避免肌肉紧张)。

The cost of moving grain food products was unchanged from May, but year over year are up 8%.

粮食产品的运输费用与5月份相比没有变化,但却比去年同期高8%。

However, to get a true quote, you will need to provide detailed personal and financial information.

然而,要让一个真正的引用,你需要提供详细的个人和财务信息。