查询词典 signatures
- 与 signatures 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
A must be written on the bill on the acceptance by the drawee signatures.
a承兑必须书写于汇票上,并由受票人签名。
-
Therefore, some these fields are thoroughly investigated in this dissertation, which are respectively mentioned as the following: 1. The Formal Description Language ISITL for Intrusion Signatures ISITL is a high-abstractive formal description language for representing intrusion signatures based on the interval temporal logic and first-order predicate calculus.
本论文对此展开了全面深入的研究,其内容主要包括: 1、基于时段时态逻辑和一阶谓词逻辑的入侵特征形式化描述语言ISITL ISITL克服了以往检测语言以"情景描述"为主的缺陷,转而采用形式化的方法来刻画入侵模式的入侵特征。
-
The results show that the KPW scheme is not a nominative signature scheme since the nominator not only can verify and prove the validity of given signatures but also can convert given signatures into universally verifiable signatures, and that the PL scheme is only a self-authentication signature scheme since anyone can verify the validity of given signatures.
摘要该文分别对一个指名签名方案和一个指名代理签名方案进行分析,结果表明:在KPW方案中签名人不仅能验证而且也能向第三方证明签名的有效性,甚至能将签名转化为通常的自认证签名,因此不是指名签名方案;在PL方案中任何人都可验证签名的有效性,它只是一个自认证签名方案。
-
All above laid a foundation for the research of polarimetric information processing and application. Then, target optimum polarization and polarimetric synthesis technique were studied. By constraining polarimetric states of transmitting and receiving antennas, co-polarized and cross-polarized signatures were obtained. Because the received wave was partially polarized, completely polarized, completely unpolarized, and total available power signatures were defined based on the power of the return wave.
接着,论文深入研究了目标最佳极化和极化合成技术,通过约束收发天线的极化状态可以得到共极化特征图和交叉极化特征图,由于雷达接收的电磁波通常是部分极化的,根据接收波的平均功率密度可以得到未极化特征图、完全极化特征图和匹配极化特征图,在极化特征图空间中搜索可以很容易地获得目标的最佳极化,这些目标最佳极化可以作为极化目标识别和分类的极化特征。
-
Finally this thesis analyses the efficient revocable group signature scheme with forward security proposed by Chen Shaozhen and Li Daxirig. An adversary can personate a legal group member by forge a group membership certificate, and then can forge group signatures that can be verified by a verifier. And the group manager can also forge group signatures that can be verified by a verifier. So the scheme is insecure. Meanwhile, there are redundancy steps in the scheme, thus the efficiency is low.
接着,对陈少真和李大兴提出的一种有效取消的前向安全群签名方案进行了密码学分析,一方面,攻击者可以通过伪造群成员证书来伪造能够通过验证的群签名;同时,群管理员也可以伪造一个可以通过验证的群签名,因此,该群签名体制是不安全的;另一方面,该体制存在冗余数据。
-
Aiming at the problem of fair exchange of digital signatures, a scheme of revocable concurrent signatures is proposed.
针对数字签名的公平交换问题,提出了可废除并发签名机制。
-
Furthermore, if it is necessary, the confirmer could convert confirmer signatures into standard ones such that the validity of these converted signatures can be publicly validated.
进一步地,在必要的时候,证实者还可以将证实签名转化为普通的数字签名,从而使得任何人都可以验证这些签名的有效性。
-
The seismic reflectance signatures of the Carboniferous volcanic rocks in the study area are divided into four types, including lobate/wedge reflection, tabular reflection, arc reflection, and mound/mushroom reflection. Based on previous studies and detailed well-seismic correlation, the lithofacies of volcanic rocks corresponding to different seismic reflectance signatures are recognized.
将该区石炭系火山岩体的地震反射特征划分为以下4种:舌状或楔状反射、板状反射、弧状反射、丘状或蘑菇状地震相反射特征;结合前人的研究成果和详细的井震对比,确定了不同的地震反射特征所对应的火山岩岩相。
-
Forward security is achieved by an evolutional parameter,which is updated with the evolution of time segment,and the group public key and members' certificates are updated along with the parameter.If a menber's private key is betrayed,the attackers can't forge the member's previous signatures.Revocation is achieved by Certificate State List,which needs the group center to update the CSL in real time,and the previous signatures of the revocative members are still valid.
前向安全性通过一个进化参数实现,进化参数随着时间段的变化而进化更新,从而使群公钥和成员证书进化更新,即使成员密钥泄露,攻击者也无法伪造该成员以前的签名;成员撤消通过证书状态列表实现,只需群中心实时更新成员证书状态列表,被撤消成员其以前的签名仍然有效。
-
This paper analyzes the existing ID-based blind signatures and proxy signatures. It is found that these systems need to trust a PKG unconditionally.
本文分析了现有的基于身份的盲签名和代理签名,发现这些系统都需要无条件信任私钥产生中心(PKG, Private Key Generator)。
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。