英语人>网络例句>签名 相关的搜索结果
网络例句

签名

与 签名 相关的网络例句 [注:此内容来源于网络,仅供参考]

In software protection, a method of giving a mark, or signature, that cannot be duplicated, to a floppy disk. A special test routine detects if a signature is present, and if it is not found the protected program will be disabled.

软件保护中,把不能复制的标记或签名存放在软盘上的方法,用一个特殊测试程序来检测签名是否存在,如不存在,则被保护的程序不能运行。

Proxy signer privacy protection is one of the important researches for the strong proxy signature.

代理签名人身份保密是强代理签名的一个重要研究方向。

In the process of signature, message was transformed to qubit, and the identity information of signer was attached to it.

签名过程中,将消息转化为量子比特,在量子比特上进行签名并附上和消息相关的身份信息。

In order to solve the difficult problem of the very small number of training samples in off-line signature verification, a new scheme based on the movement relativity of images in different coordinates of Euclidian space is proposed.

为了解决可用签名样本极少条件下的脱机签名鉴定问题,本文还提出了一种新的基于平面图像移动相对性原理建模的方案。

At the same time,a blind signature scheme is presented,which is based on the new certificateless signature scheme.

同时,基于新的无证书签名方案,还给出一个无证书盲签名方案。

At the same time, a group signature scheme, based on the certificateless signature scheme given in this paper, is constructed.

利用所给的签名方案设计了一个无证书群签名方案。

A solution for signing any directed transitive binary relation is presented by combining the proposed scheme with the undirected transitive signature schemes available.

1引言传递签名是由Micali和Rivest[1]在2002年首先提出的,主要用于对具有传递性的二元关系进行高效签名,这在军事、政治和经济等领域都有重要应用。

Lack of disable driver signing feature caused the uncertified device drivers which are unsigned fail to connect and load, render the hardware useless or works imperfectly.

缺乏禁用驱动程序签名功能,造成未经装置驱动程式,这是未签名的无法连接和负载,使硬件无用或工程不完善。

The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. In addition, itcan realize the unknowability ofgroup's secretby constructing a secure distributed key generation protoco.l As a resul,t the proposed scheme is more secure than the two schemes.

结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性。

Security analysis shows that this new scheme can not only resist the above-mentioned conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. Moreover, by constructing a secure distributed key generation protocol, the proposal realizes the unknowability of the group\'s secret.

分析表明:新方案能够根本抵抗合谋攻击和上述伪造签名攻击;在保证匿名性的同时可以真正实现签名成员身份的可追查性;通过引入可验证秘密共享并设计安全的分布式****生成协议,实现了****影子的可验证性以及群共享秘密的不可知性,系统安全性大大提高。

第16/100页 首页 < ... 12 13 14 15 16 17 18 19 20 ... > 尾页
推荐网络例句

Breath, muscle contraction of the buttocks; arch body, as far as possible to hold his head, right leg straight towards the ceiling (peg-leg knee in order to avoid muscle tension).

呼气,收缩臀部肌肉;拱起身体,尽量抬起头来,右腿伸直朝向天花板(膝微屈,以避免肌肉紧张)。

The cost of moving grain food products was unchanged from May, but year over year are up 8%.

粮食产品的运输费用与5月份相比没有变化,但却比去年同期高8%。

However, to get a true quote, you will need to provide detailed personal and financial information.

然而,要让一个真正的引用,你需要提供详细的个人和财务信息。