安全性
- 与 安全性 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Its design and the manufacture first has all considered baby's security and comfortableness, and also has considered for the mother in the operation, the use convenienc
其设计和制造都优先考虑了婴儿的安全性和舒适性,并且也为母亲考虑了在操作、使用上的方便性
-
System Security 2009 will not allow me to open command prompt or any other.
系统安全性2009年将不会允许我打开命令提示符或任何其他。
-
In the light of the problems existing in aspects of the commonality , operating precision, reliability, etc.
针对电子保护组件使用中在通用性、动作精度、安全性等方面存在的问题,提出了解决的办法。
-
To the former one, it needs to build a database, which could keep the application program communality and safety.
对于前者要求建立起数据一致性和完整性强、数据安全性好的库。
-
The physicians were more knowledgeable than other groups regarding immunization recommendations, communicability, high-risk groups, effectiveness, and vaccine safety.
医生对疫苗的认识程度也高于其他员工,包括相关的接种建议、流感的传染性、高危人群、有效性以及疫苗安全性。
-
As more and more widely used of satellite communications network,more and more attention is paid on its security.
随着卫星通信网的推广,其安全性越来越重要。
-
Based this standard we will discuss how to model the sensor and how to design its compensator.
针对机器人遥操作数据通讯的安全性,提出了基于时间同步的数据交换模型和数据验证模型。
-
To ensure data security, accuracy, completeness and consistency.
确保了数据的安全性、正确性、完整性和一致性。
-
In this paper, we introduce the algorithm of Schoof-Elkies-Atkin to compute the order of elliptic curves over finite fields. We give out a fast algorithm to compute the division polynomial f〓 and a primitive point of order 2〓. This paper also gives an improved algorithm in computing elliptic curve scalar multiplication. Using the method of complex multiplication, we find good elliptic curves for use in cryptosystems, and implemented ElGamal public-key scheme based on elliptic curves. As a co-product, we also realized the algorithm to determine primes using Goldwasser-Kilian's theorem. Lastly, the elliptic curve method of integer factorization is discussed. By making some improvement and through properly selected parameters, we successfully factored an integer of 55 digits, which is the product of two 28-digit primes.
本文介绍了计算有限域上椭圆曲线群的阶的Schoof-Elkies-Atkin算法,在具体处理算法过程中,我们给出了计算除多项式f〓的快速算法和寻找2〓阶本原点的快速算法;标量乘法是有关椭圆曲线算法中的最基本运算,本文对[Koe96]中的椭圆曲线标量乘法作了改进,提高了其运算速度;椭圆曲线的参数的选择直接影向到椭圆曲线密码体的安全性,文中利用复乘方法构造了具有良好密码特性的椭圆曲线,并实现了椭圆曲线上ElGamal公钥体制;文中还给出了利用Goldwasser-Kilian定理和椭圆曲线的复乘方法进行素数的确定判别算法;最后讨论了利用椭圆曲线分解整数的方法并进行了某些改进,在PC机上分解了两个28位素数之积的55位整数。
-
Universally composable security guarantees that the protocol holds secure even when running in an arbitrary and unknown multi-party environment.
通用可组合安全性保证了该协议在任意的和未知的多方环境中运行时仍然是安全的。
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力