匿名
- 与 匿名 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The women who spoke on the condition of anonymity, came forward to talk with Serrano on their volition, and were not recommended or pre-selected by any humanitarian organization.
匿名与塞拉诺谈话的妇女是自愿前来的,而并非是由某人道主义组织推荐或事先选好的。
-
Soso wandered from town to town in the Caucasus, using numerous aliases.
Soso活动与高加索地区的城市之间,使用了很多的匿名。
-
One early comment by an anonymous user, referring to Wang and his mistress, reads,"We should take revenge on that couple and drown them in our sputa."
早期回帖的一个匿名用户意指王菲和他的情妇:&我们要对这两个人复仇,把他们淹死在我们的口水里。&
-
We discuss the issue of "fair use" and purpose a DRM system with anonymity and authorization transferability.
我们以使用者要求&合理使用&的理由为出发点,提出一个具有匿名性及可转移授权机制的DRM系统。
-
The open and anonymous nature of p2p system make it a ideal environment for malicious nodes to spread unauthentic and tampered files.
p2p系统内在的开放性和匿名性为恶意节点传播虚假文件和不完整文件提供了一个理想的环境。
-
In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.
本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。
-
Analysis shows that the protocol has good security, fair anonymity, unforgeability and practicability.
分析表明,该协议具有很好的安全性、公平匿名性、不可伪造性和实用性。
-
The security of the Fu-Kou-Xiao's proxy signature scheme with proxy signer's privacy anonymity was analyzed, and it was shown that the scheme did not possess the property of strong unforgeability.
对 Fu-Kou-Xiao 具有代理匿名性的代理签名方案进行分析,指出该方案不具备强不可伪造性。
-
Aiming at the actual need of impeach work, and on the basis of analyzing, concluding, summarizing and informing against the systematic current situation at present, the article structure the new model of electronic impeaching system, adopt group signature and bit commitment technology to realize each functions of the system respectively, and guarantee the security of accuser, such as anonymity, unforgeability, undeniable, unlinkability,traceability,etc.
论文针对检举工作的实际需要,在分析、归纳、总结了当前检举系统现状的基础上,构造了新型电子检举系统的模型,并分别采用群签名和比特承诺技术实现了系统的各项功能,保证了匿名性、不可伪造性、不可否认性、不相关性和可追踪性等安全性。
-
It is proved to be unforgeable in the standard model, and is unconditionally anonymous.
在标准模型下证明其能抵抗签名伪造攻击,且具有无条件匿名性。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。