查询词典 signer
- 与 signer 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
"The signer has read and accepts all of the contents of the 'statement' in this column."
"本签署人已阅读并接受本栏'声明'的全部内容。"
-
After signing the contract, any signer must not leak the content of the contract to another.
本合同签订之后,签约双方中任何一方不得将合同内容泄露给第三方。
-
At the same time, this algorithm can also satisfy the need for the synthesized samples to include as much and as effective information of unspecific signer as possible.
算法同时考虑到合成样本尽可能包含非特定人的信息及其有效性,对数据所实现的变形不会被识别系统的初始化过程逆转。
-
John Witherspoon, afterwards a signer of the Declaration of Independence, as first president.
在此期间离职学院新新泽西州普林斯顿大学后,成立了"新边",与牧师约翰威瑟斯庞,后来签字的独立宣言,作为第一任总统。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
This is done mainly to assist the user (non-linguist/non-signer ) in understanding the nature and photological parameter in the de******ion of ShSL.
这种做法的主要目的是帮助使用者(非语言学家/非手语使用者)理解对西隆手语的一些描述。
-
The security analysis of the proposed scheme shows that it satisfies non-transferability, unforgeability, privacy of signer's identity and has low computational cost.
分析表明,新方案满足不可转发性、不可伪造性以及签名者身份保密的性质,并且具有较高的效率。
-
The security of the Fu-Kou-Xiao's proxy signature scheme with proxy signer's privacy anonymity was analyzed, and it was shown that the scheme did not possess the property of strong unforgeability.
对 Fu-Kou-Xiao 具有代理匿名性的代理签名方案进行分析,指出该方案不具备强不可伪造性。
-
The Chih-Yin Lin was partially improved on to be more propitious for controlling the signature flow, inserting the signer's opinions and programming the algorithms on the web.
对多重签名方案做了部分改进,使之更利于流程的控制、签名者意见的加入和在网络上的算法实现。
-
Would-be Signer to his companion on predicting that an important bloods death will be marked by flame
将会标记者对他的同伴,当他预言一名位高权重者的死亡将以火焰为记
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。