英语人>网络例句>signature 相关的网络例句
signature相关的网络例句

查询词典 signature

与 signature 相关的网络例句 [注:此内容来源于网络,仅供参考]

Contract tj 1234 plsreturn onecopy with signature l/cozening.

兹奉上tj1234号合同请会签后寄回一份信用证开立中。

We observed a significant increase in a genomic signature of phosphatidylinositol 3-kinase (PI3K) pathway activation in the cytologically normal bronchelloal airway of smokers with lung cancer and smokers with dysplastic lesions, suggesting that PI3K is activated in the proximal airway before tumorigenesis.

在此项研究中,Adam Gustafson及其同僚在具备或没有肺癌的吸烟者中以及那些具备较高罹患肺癌危害的人寿检测了在覆衬着主要肺气道的细胞中的属于差别的与癌症有关的通路的基因表达程度。

Defensor Sporting midfielder Tabarè Viudez will be an AC Milan player;"There is not the signature yet, but the negotiation is about to be carried out, only the medicals and the contract are missing, it's a question of one or two days" has declared the uruguayan club chaiman Fernand Sobral"."

德芬索体育队的中场球员塔巴雷-韦德斯将要成为一名AC米兰球员:&到现在还没有签约呢,但谈判即将进行,只差体检和签合同了,可能会在接下来的一天或两天内进行。&乌拉圭德芬索体育队的主席费尔南德-索伯拉尔说。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

In this paper, by considering the convenience of consumers, we use group blind signature technology with the character of hash chain to create the dividable and anonymous e-cash. Thus the users can consume not only in the home mobile domain but also visit mobile domain without register and authentic. We use off-line e-cash to increase the efficiency of payment exchange. Under the fair principle of all participators, we set a convenient and secure mobile payment.

因此,以消费者使用上的最大便利性为考量,本研究利用群体盲签章加入杂凑链之特性的方式来产生可分割的匿名电子现金,让消费者不只可以在主系统业者的网域内作消费,当其到漫游业者的网域内消费时,也不需要额外的认证及注册过程,并采用离线验证的方式来增加付款交易的效率性,在考虑各角色公平的原则下,提供一个方便、安全的行动付款系统。

You are far from being a bad man--' Signature,'Eliphalet Weeks.'"

&'你决不是一个坏蛋--'落款:'埃里费勒特-维克斯。'&

These two works emblematize his signature stream-of-consciousness prose style, which mirrors characters' thoughts without the limitations of traditional narrative, a style he didn't use in Dubliners .

这两项工程emblematize他的签名意识流散文的风格,反映人物的思想没有限制的传统叙事,一种风格,他没有使用在都柏林。

We formalized a notion of security for partial delegation with warrant proxy signature schemes, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosen-warrant attack. We compare the new model with the previous formal models and identify their weakness.

重新给出了具有证书的部分代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,建立了形式化安全模型。

We define two security notions of identity based proxy multi-signature. One is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and a given identity attack. The other is existentially unforgeability under an adaptive chosen-message attack, an adaptive chosen-warrant attack and an adaptive chosen-identity attack.

本文给出了基于身份的代理多重签名的两种安全定义,第一是适应性选择消息攻击,适应性选择授权文件攻击,以及给定身份攻击下的不可存在性伪造;第二是适应性选择消息攻击,适应性选择授权文件攻击,以及适应性选择身份攻击下的不可存在性伪造。

His cleaned-up and pared-down signature collection was full of the kind of clothes that get fashion editors scribbling, not because they will make pretty pictures—although there's plenty of potential for lovely editorial pages in his paneled-chiffon evening numbers, accessorized here with lace stockings and fingerless gloves—but rather because they'll make such pretty additions to their closets.

他的清洁的-向上和剥-向下的签名收集是的全部一种衣服那获得样子编辑潦草的写法,不广告。因为他们将制造漂亮的画—虽然那儿有许多潜在的为了可爱的社论页在他的面板-薄纱傍晚民数记,装饰在这里有饰带长袜和fingerless手套—但是宁愿广告。因为制造这样的漂亮的加到他们的壁橱。

第88/100页 首页 < ... 84 85 86 87 88 89 90 91 92 ... > 尾页
相关中文对照歌词
Someday (I Will Understand) (Hi-Bias Signature Radio Remix)
Signature
Signature Of Divine (Yahweh)
My Signature Move
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力