签名
- 与 签名 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In software protection, a method of giving a mark, or signature, that cannot be duplicated, to a floppy disk. A special test routine detects if a signature is present, and if it is not found the protected program will be disabled.
软件保护中,把不能复制的标记或签名存放在软盘上的方法,用一个特殊测试程序来检测签名是否存在,如不存在,则被保护的程序不能运行。
-
Proxy signer privacy protection is one of the important researches for the strong proxy signature.
代理签名人身份保密是强代理签名的一个重要研究方向。
-
In the process of signature, message was transformed to qubit, and the identity information of signer was attached to it.
在签名过程中,将消息转化为量子比特,在量子比特上进行签名并附上和消息相关的身份信息。
-
In order to solve the difficult problem of the very small number of training samples in off-line signature verification, a new scheme based on the movement relativity of images in different coordinates of Euclidian space is proposed.
为了解决可用签名样本极少条件下的脱机签名鉴定问题,本文还提出了一种新的基于平面图像移动相对性原理建模的方案。
-
At the same time,a blind signature scheme is presented,which is based on the new certificateless signature scheme.
同时,基于新的无证书签名方案,还给出一个无证书盲签名方案。
-
At the same time, a group signature scheme, based on the certificateless signature scheme given in this paper, is constructed.
利用所给的签名方案设计了一个无证书群签名方案。
-
A solution for signing any directed transitive binary relation is presented by combining the proposed scheme with the undirected transitive signature schemes available.
1引言传递签名是由Micali和Rivest[1]在2002年首先提出的,主要用于对具有传递性的二元关系进行高效签名,这在军事、政治和经济等领域都有重要应用。
-
Lack of disable driver signing feature caused the uncertified device drivers which are unsigned fail to connect and load, render the hardware useless or works imperfectly.
缺乏禁用驱动程序签名功能,造成未经装置驱动程式,这是未签名的无法连接和负载,使硬件无用或工程不完善。
-
The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. In addition, itcan realize the unknowability ofgroup's secretby constructing a secure distributed key generation protoco.l As a resul,t the proposed scheme is more secure than the two schemes.
结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性。
-
Security analysis shows that this new scheme can not only resist the above-mentioned conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. Moreover, by constructing a secure distributed key generation protocol, the proposal realizes the unknowability of the group\'s secret.
分析表明:新方案能够根本抵抗合谋攻击和上述伪造签名攻击;在保证匿名性的同时可以真正实现签名成员身份的可追查性;通过引入可验证秘密共享并设计安全的分布式****生成协议,实现了****影子的可验证性以及群共享秘密的不可知性,系统安全性大大提高。
- 推荐网络例句
-
I didn't watch TV last night, because it .
昨晚我没有看电视,因为电视机坏了。
-
Since this year, in a lot of villages of Beijing, TV of elevator liquid crystal was removed.
今年以来,在北京的很多小区里,电梯液晶电视被撤了下来。
-
I'm running my simile to an extreme.
我比喻得过头了。