伪造
- 与 伪造 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Digital signature algorithm DSA is firstly used in confirmer signature and the new scheme has complete convertibility.
目的在于提供所谓的前向安全性:既使当前时段的秘密钥泄露没,对手也不能伪造与过去时段有关的数字签名。
-
Considering IP address spoofing attack, MCGA which is a kind of CGA (Cryptographically Generated Addresses) based on MAC address has been proposed.
针对邻居发现协议的伪造IP地址攻击,在现有的加密产生地址技术(Cryptographically Generated Addresses,以下简称CGA)基础上提出基于MAC地址的CGA技术。
-
We prove its semantic security on the hardness of Decisional Bilinear Diffie-Hellman problem and its unforgeability on the hardness of Computational Diffie-Hellman problem.
我们利用DBDH问题的困难性证明了方案的语义安全性,同时利用CDH问题的困难性证明了方案的不可伪造性。
-
Some have involved defacing Estonian websites , replacing the pages with Russian propaganda or bogus apologies .
有些人开始参与为爱沙尼亚的网站换肤,有的则将网站中的网页用俄罗斯的宣传资料或是伪造的歉条替代。
-
Publications discretionally published, printed or reproduced without approval, publications published in a forged or disguised name of a publishing entity or newspaper , the book number, serial number or publisher 's code, and so on
包括:未经批准擅自出版、印刷或者复制的出版物,伪造、假冒出版单位或者报刊名称出版的出版物,非法进口的出版物,买卖书号、刊号、版号出版的出版物等
-
The historical parts of the Priestly Code depend on the Yahwistic and the Elohistic documents, but Wellhausen's adherents believe that the material of these documents has been manipulated so as to fit it for the special purpose of the Priestly Code; Dillmann and Drive maintain that facts have not been invented or falsified by P, but that the latter had at hand other historical documents besides J and E. As to the legal part of P, Wellhausen considers it as an a priori programme for the Jewish priesthood after the return from the captivity, projected backwards into the past, and attributed to Moses; but other critics believe that P has systematized the pre-exilic customs of worship, developing then, and adapting them to the new circumstances.
历史部分祭司码取决於Yahwistic和Elohistic文件,但豪森的信徒认为,这些文件材料已被操纵,以适应它的特殊用途的祭司码; Dillmann和驱动保持这一事实没有发明或伪造的P ,但后者在手其他历史文件除了J和大肠杆菌作为法律的一部分磷,豪森认为这是一个先验方案犹太祭司返回后从被关押,预计倒退到过去,由於摩西;但其他批评者认为磷已系统化前放逐海关的礼拜,然后发展,并使之适应新的情况。
-
Our scheme is unforgeable, exculpable, unlinkable, and coalition-resistant.
在我们的系统中,签章不能被伪造、群体成员不会被构陷签章、签章之间没有关联、而且能避免联合攻击。
-
We also prove that the new scheme is not only indistinguishable against chosen-ciphertext attacks but also existentially unforgeable against chosen-message attacks.
可证明新方案在选择密文攻击下不可区分,在选择消息攻击下存在不可伪造。
-
Secondly, we show a security flaw in a previous certificateless ring signcryption scheme (Wang et al.'s scheme). It is not existentially unforgeable for Type I adversary.
其次,本论文指出了Wang等的无证书环签密方案的一个安全缺陷,对于第一类攻击者,此方案并不是存在不可伪造的。
-
We formalized a notion of security for partial delegation with warrant proxy signature schemes, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosen-warrant attack. We compare the new model with the previous formal models and identify their weakness.
重新给出了具有证书的部分代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,建立了形式化安全模型。
- 推荐网络例句
-
And discuss some key point of integrated management system design, include hazard identification and risk assessment and risk control in the occupational health and safety management, the measure of satisfaction target of customer, the flawlessness of law system, the integration of the integrated management system and enterprise standardization system, unify lead institution and work orgnization, integreted internal audit and integrated management review.
同时,论述了一体化管理体系构建中的几个主要问题,包括职业健康安全管理中的危险源辨识、风险评价和风险控制、顾客满意度的科学监测、法律、法规体系的完善、一体化管理体系与企业标准化体系的有机结合、统一的领导机构和工作机构、一体化的内部审核和管理评审。
-
Deepwater Taranaki is investigated for its petroleum potential, using all available seismic data tied to shallow-water wells.
运用与浅水井相关的现有全部震波探测数据考察了深海区塔拉纳基盆地的油藏前景。
-
If you're huffing and puffing at any point during the run, slow down and make sure you can take deep breathes.
如果你任何时候在跑步过程中气喘如牛,降低速度并且确保你能够深呼吸。