查询词典 public security
- 与 public security 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Provable Security is a formal method for proving the security of cryptographic schemes, in which the difficulty of breaking a particular scheme is formally related to that of solving a widely believed computational hard problem. Provable security has already become an important theme of theoretical researches in modern cryptography. This dissertation investigates the provable security of public-key encryptions and hybrid encryptions of asymmetric and symmetric encryptions. This includes the various formal security notions and the constructions can be proved to achieve them. Among the constructions, hybrid encryptions are themselves an important way to obtain public-key encryption schemes with chosen ciphertext security. The main results are as follows:(1) The one-wayness of the trapdoor one-way function in NTRU depends on the randomness of the session key, which is different from previous ones. Based on this observation, a new kind of trapdoor one-way function, trapdoor one-way functions with an auxiliary random variable is proposed.
可证明安全性是一种证明密码学方案安全性的形式化方法,它将密码学方案的安全性归约为公认的计算难题,已成为现代密码学领域中理论工作的主线,本文主要研究公钥加密与单双钥混合加密的可证明安全性,这包括它们的各种形式化安全性定义以及达到这些安全性定义的方案构造,而单双钥混合加密本身也是一种构造选择密文安全公钥加密的重要方法,本文得到的主要结果如下:(1)在研究NTRU公钥加密的特殊性基础上,对于公钥加密的陷门单向函数加密模型进行了扩展,提出了具有辅助陷门单向函数的概念,并将其扩展到多元的情况,讨论了可能的密码学用途。
-
Hybrid schemes in a KEM-DEM structure is regarded as the most natural approach to public key encryption with IND-CCA security and practical efficiency. Traditional KEM is realized by public key scheme, which only provides confidentiality security for session key used by DEM. In 2005, combining the idea of signcryption with the KEM-DEM model hybrid encryption, Alexander proposed a signcryption KEM-DEM model hybrid signcryption primitive.
KEM-DEM结构的混合密码体制是获得IND-CCA安全最实际有效的方法,传统的KEM由公钥加密方案实现,仅提供DEM使用的会话密钥的保密性安全。2005年Alexander等人将签密的概念与KEM-DEM结构的混合密码体制相结合,提出了Signcryption KEM-DEM结构的混合签密。
-
Article 268 In the case of an application or request for recognition and enforcement of a legally effective judgment or written order of a foreign court, the people's court shall, after examining it in accordance with the international treaties concluded or acceded to by the People's Republic of China or with the principle of reciprocity and arriving at the conclusion that it does not contradict the basic principles of the law of the People's Republic of China nor violates State sovereignty, security and social and public interest of the country, recognize the validity of the judgment or written order, and, if required, issue a writ of execution to enforce it in accordance with the relevant provisions of this Law; if the application or request contradicts the basic principles of the law of the People's Republic of China or violates State sovereignty, security and social and public interest of the country, the people's court shall not recognize and enforce it.
第二百六十八条人民法院对申请或者请求承认和执行的外国法院作出的发生法律效力的判决、裁定,依照中华人民共和国缔结或者参加的国际条约,或者按照互惠原则进行审查后,认为不违反中华人民共和国法律的基本原则或者国家主权、安全、社会公共利益的,裁定承认其效力,需要执行的,发出执行令,依照本法的有关规定执行。违反中华人民共和国法律的基本原则或者国家主权、安全、社会公共利益的,不予承认和执行。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
This thesis is composed of four sections. Section 1 gives an overview of theories about elderly security. It involves the demand of the aged, the concept, content, influential factors of family elderly support, the concept, content, type, model and economic effect of public pension, theories searched from the study of Chinese elderly security. Section 2 introduces the history of family elderly support, analyses the reasons of the existence of it, expatiates on the factors that weaken the function of it, such as modernization of agriculture, population aging, family miniaturization, urbanization etc. section 3 introduces the history of the social old-age insurance in Chinese rural areas, analyses its impendency from the aspects of social stabilization, the rights and interests of the peasants, rural employment. Section 4 is the most important part of the thesis. It first refers to foreign practical experiences on rural elderly security, then demonstrates the elderly support at home which combines family elderly support and social elderly support, especially analyses the public pension.
全文共分四部分:第一部分是养老保障概论,介绍了老年人的养老需求,家庭养老的概念、内容及影响因素,社会养老保险的概念、内容、类型、模式及经济效应,中国农村养老保障研究的相关理论;第二部分是中国农村家庭养老分析,介绍了家庭养老的历史,分析了其长期存在的依据,并进一步阐述了农业现代化、人口老龄化、家庭小型化和城市化等对中国农村家庭养老的冲击,弱化了家庭养老的功能;第三部分是中国农村社会养老保险分析,介绍了中国农村社会养老保险的发展历史,从社会稳定、农民权益和农村就业等方面分析了建立社会养老保险的迫切性;第四部分是建立中国农村社会养老保险制度的政策建议,是文章的重点,在借鉴国外农村养老实践经验的基础上,阐述了适合我国农村现实的家庭养老和社会养老相结合的居家养老,并对其中的社会养老保险进行了比较细致的分析。
-
The scheme decreases the computation and storage of mobile nodes with reduced commutation overhead.The security is also improved for the initially existence of the off-line trued third party.The scheme provides high availability and security due to the distributed public key management model and gives a good solution to the problem of public key revocation dependent on the localized trust model.The server nodes of public key management can be dynamically adjusted to adapt to the dynamic nature of MANET.
方案中不需要公钥证书的存在,减少了系统通信开销以及结点的计算量和存储容量;在组网时依赖于一个离线的可信任机构,提高了系统的可信度;采用分布式CA模型,克服了传统集中式CAN用性与安全性的问题;依靠局域化的信任模型,对恶意结点进行了有效的处理,较好地解决了公钥撤销问题;****管理服务结点可动态调整,能够较好地适应MANET的动态特性。
-
The first chapter, theorical base of this thesis, clarifies ordinary theory of finance expenditure and coming trend of Chinese finance-'public finance', under the background of public finance, social security is of great importance. Social security is closely related with public finance. Further, the thesis claries Welfare Economics value of social security.
第一章是本文的理论基础部分,阐述了财政支出的一般理论以及中国财政的未来发展趋势是&公共财政&,在公共财政这一背景下,社会保障必然占有相当重要的地位,并进一步阐述了社会保障的福利经济学价值。
-
Swindle, said Eastern Shopping and Yahoo Auctions Payment Error Information to the public, claiming a refund of the original contractors mistakenly set the previous trading installment deductions or victim error, mistake a refund will set phases such as the right to charge damaged, it tells the people to the ATM was required to operate changes, lifting hire charge; as soon as the public deceived again after the "Financial Supervisory Commission," said the account has been criminal to use the name of money laundering, must sink "financial security account" to avoid being the freezing of accounts, lured victims of the deposit removed, changed into the aforementioned fraud of financial security accounts.
1-2 Online Shopping Fraud 假借东森购物免付费显示电话、雅虎奇摩购物等方式通知民众,称原承办人误将退款设为分期扣款或被害人先前交易错误,误将退款设为分期扣款等将使权利受损,即向民众要求需至提款机操作变更,解除分期付款扣款;俟民众受骗上当后,再以「金融监督管理委员会」名义表示帐户已遭歹徒利用洗钱,需汇「金融安全帐户」,以免遭冻结帐户,诱骗被害人将存款解除,改存入前述诈骗之「金融安全帐户」。
-
Litigation fraud must be stipulated as a crime and be combated by public security organs with means of criminal investigation to ens...
同时建议修改刑法典第305条,将伪证罪的主体扩大到民事诉讼的当事人,从而从根本上解决诉讼欺诈在刑事司法上无法可依的尴尬局面。
-
Image in people's mind of Party and government of behavioral serious injury of the municipal public security bureau of Shangqiu.
商丘市公安局的行为严重损害了党和政府在人民心目中的形象。
- 推荐网络例句
-
She gently rebuff ed him, but agreed that they could be friends
她婉言拒绝了,但同意作为朋友相处。
-
If in the penal farm, you were sure to be criticized.
要是在劳改农场,你等着挨绳子吧!
-
Several theories about reigniting and extinguishing of the arc have been refered.
本文综合考虑了几种电弧重燃和熄灭理论。