英语人>网络例句>签名 相关的搜索结果
网络例句

签名

与 签名 相关的网络例句 [注:此内容来源于网络,仅供参考]

Considering the insecurity [3~5] or inefficiency[6] of current confirmer signature schemes,born of the canmenisch-michels formal model and structure,a new confirmer signature scheme based on DSA and RSA is proposed.

考虑到现存的证实数字签名方案或者是不安全的[3~5],或者是低效的[6],基于Canmenisch-Michels形式化模型和结构,提出一种新颖的完全基于DSA及RSA的证实数字签名方案。

Based on the ideas of undeniable digital signature and confirmer digital signature,a new zero-knowledge proof scheme of possessing a DSA digital signature is proposed which can be used to prevent the arbitrary distribution of digital signature.

引言 DSS[1] 是美国政府数字签名标准的缩写。DSS主要采用DSA数字签名算法[1] 及安全哈希函数SHA 1[2 ] 。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

We formalize a notion of security for proxy multi-signature and multi-proxy signature, i.e., existentially unforgeability under an adaptive chosen-message attack and an adaptive chosenwarrant attack.

本文给出了代理多重签名和多重代理签名的安全定义,即适应性选择消息攻击和适应性选择授权文件攻击下的不可存在性伪造,并建立了形式化安全模型。

To assist the signature specialists, the authentication system for off-line Chinese signatures was developed based on a new Integrated Neural Network, which was composed of the modules, namely Feature Distributed Network, Neutral Networks Classifier and Decision Fusional Network.

离线手写签名鉴别是一种基于生物特征的身份识别技术,利用集成神经网络对手写签名进行自动鉴别。该集成神经网络由特征分配网络、神经网络认证主体和决策融合识别网络三部分构成。

To assist the signature specialists, the authentication system for offline Chinese signatures was developed based on a new Integrated Neural Network, which was composed of the modules, namely Feature Distributed Network, Neutral Networks Classifier and Decision Fusional Network.

离线手写签名鉴别是一种基于生物特征的身份识别技术,利用集成神经网络对手写签名进行自动鉴别。该集成神经网络由特征分配网络、神经网络认证主体和决策融合识别网络三部分构成。

Seals attached by the natural persons in China has played a decisive role in some documents, and with the rapid change of the society and differences of roles played by the natural persons on different occasions, the legal signification of the seals becomes growingly important in defining the legal status of the natural persons and determining their act in the society.

签章是指某一自然人在民事法律性文件上签名或加盖印章或者签名并加盖印章的行为。其作用在于:一是&要式&作用;二是证据作用。自然人签章会发生在不同的场合,并且,随着签章人担任的社会角色的变化,其法律上的身份不尽相同,签章的法律效力也因此而有区别。故对于签章所产生的法律后果,必须结合签章行为人在某一具体法律关系中的法律身份才能加以界定。

Harn and Kiesler proposed a public-key cryptosystem, digital signature and authentic encryption scheme based on Rabin's cryptosystem, in this chapter, we will analyze the security of H-K digital signature scheme and H-K authentic encryption scheme, and point out that these cryptosystem are insecure.

Shao设计了两种数字签名方案,并称这两种数字签名的安全性建立同时在离散对数和素因子分解问题之上。

In the Harn digital signature scheme,the signatory need not compute any inverses and the person who verifies the key only need compute two modular exponents, so the computation work is less in comparison with other schemes based on discrete logarithm.

Harn数字签名方案中,签名者不需计算任何逆,验证者只需计算 2个模指数,因此相对于其它基于离散对数数字签名方案计算量大大减少。

In 2002, Micali and Rivest presented a special type of homomorphic signature—transitive signature.

Micali和Rivest在2002年提出了一种特殊的同态签名系统—传递性签名

第18/100页 首页 < ... 14 15 16 17 18 19 20 21 22 ... > 尾页
推荐网络例句

In the negative and interrogative forms, of course, this is identical to the non-emphatic forms.

。但是,在否定句或疑问句里,这种带有"do"的方法表达的效果却没有什么强调的意思。

Go down on one's knees;kneel down

屈膝跪下。。。下跪祈祷

Nusa lembongan : Bali's sister island, coral and sand beaches, crystal clear water, surfing.

Nusa Dua :豪华度假村,冲浪和潜水,沙滩,水晶般晶莹剔透的水,网络冲浪。