英语人>网络例句>匿名 相关的搜索结果
网络例句

匿名

与 匿名 相关的网络例句 [注:此内容来源于网络,仅供参考]

If set to YES, anonymous users will bepermitted to create new directories under certain conditions. For this to work,the option write_enable must be activated, and the anonymous ftp user must havewrite permission on the parent directory.

如果设置为YES,匿名用户将被允许创建新的目录,以下条件必须满足:write_enable选项设置为YES;匿名用户对父目录有写权限。

A further difficulty attending the restricted use of the term is that some of the Apocrypha are pseudonymous, whereas some of the Pseudepigrapha are not pseudonymous.

另一项困难出席了限制使用的术语是,一些伪经是匿名的,而一些Pseudepigrapha不是匿名的。

Anonymity and pseudonymity lend to both privacy and these safeguards for safety and peace of mind.

匿名匿名之使用增添隐私和防护使之和平安全。

For example, anonymity and pseudonymity protect the privacy of people's identities, which has the functional benefit that someone may speak at a political rally ?

假如,如果匿名匿名之使用可以保护人们的身份隐私,这样哪个人会说隐私的功能利益会形成政治的集会?

Anonymous communication simulation subsystem simulates the reroute mechanism of anonymous communication system; data collection subsystem collects and analyses data in network.

匿名通信仿真子系统对匿名通信的重路由机制进行仿真;数据采集分析子系统则对网络中的通信流进行数据采集和分析。

Ring digital signature is a new kind of anonymous signature which can provide unconditional anonymity of the signer.

环数字签名是一种新的匿名签名,能保证签名用户的无条件匿名性。

Ring signature is a new kind of anonymous signature which can provide unconditional anonymity of the signer.

摘要环签名是一种新的匿名签名技术,能保证签名用户的无条件匿名性。

This paper defines a strong security model for multi-recipient signcryption scheme in the random oracle model, which is semantically secure against adaptive chosen-ciphertext insider attack, existentially forgeable chosen-message attack and anonymous chosen-ciphertext insider attack. By analyzing, we point out that Li-Hu-Liu Multi-Recipient Signcryption Scheme is insecure against the adaptive and anonymous chosen-ciphertext insider attacks.

摘要在随机预言模型下定义了一个多接收者签密方案的强安全性模型,该模型满足适应性选择密文内部攻击安全性、选择消息抗存在性伪造和密文匿名安全性;通过分析指出, Li、Hu和Liu等人提出的多接收者签密方案,不具有适应性选择密文内部攻击安全性和密文匿名性,并给出所定义强安全性模型中的攻击方法;随后提出改进方案,该方案在强安全模型中证明是安全的。

It is also in the public domain in other countries and areas where the copyright terms of anonymous or pseudonymous works are 60 years or less since publication .

1996年1月1日,这部匿名或以别名发表,确实作者身份不明作品在原著作国家或地区属于公有领域,之前在美国从未出版,在美国以及版权期限是匿名别名作品发表起60年以下的国家以及地区属于公有领域。

In the random oracle model,it can be proved that the new protocol fulfills all the characteristics that anonymous subscription protocols should satisfy in order to be interesting or useful in practice,i.e.,anonymity,unlinkablility,unforgeability,coalition-resistance,etc.

在随机预言模型下,可以证明新协议满足了实用匿名订购协议所要求的全部特性,即匿名性、无关联性、不可伪造性、抵抗联合攻击等。

第3/51页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Do you know, i need you to come back

你知道吗,我需要你回来

Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.

1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。

Chapter Three: Type classification of DE structure in Sino-Tibetan languages.

第三章汉藏语&的&字结构的类型划分。