1、

Identity Based Encryption ( IBE ) schemes and Identity Based Broadcast Encryption ( IBBE ) schemes are often constructed by using bilineara.

本文的主要工作是研究基于身份的加密体制及其在电子邮件系统中的应用.

互联网摘选

2、

It is a worthwhile challengewith the key-exposure problem in identity-based signatures.

如何应对基于身份的签名系统中密钥泄漏的问题,是一项非常有意义的工作.

互联网摘选

3、

There are currently about 17 identity-based branches of feminism including black feminism and Marxist feminism.

依身份不同,现今女权主义约有十七个分支,包括黑人女权主义及马克思女权主义.

互联网摘选

4、

Based on this problem, this paper proposed an identity-based proxy blind scheme without trusted PKG.

基于这个问题,提出了一个基于身份无可信中心的代理盲签名方案,同时对方案的安全性进行了分析,表明该方案是安全的。

互联网摘选

5、

In this thesis, we discuss some digital signatures with additional properties, including identity-based ( simply ID-based) signature, ( partially) blind signature, untransferable signature, group signature and multi-signature.

本文主要讨论基于身份的签名、(部分)盲签名、不可传递签名、群签名等4种具有特殊性质的数字签名,也涉及了多重签名。

互联网摘选

6、

The identity in the primitive society was based on consanguinity.

原始社会存在身份,但这种身份是建立在血缘基础之上的.

网络文摘精选

7、

However, as far as we know, the research on identity-based signature schemes is not ideal enough.

因此,本文的研究重点为通过形式化的方法解决基于身份签名体制研究中的若干问题。

互联网摘选

8、

The nonlinear solution is applied to conical helical spring. In chapter three, based on Rayleigh identity, a formula of the effective magnetic permeability of MR fluids is derived.

第三章中,我们基于Rayleigh方程,运用迭代方法推导出磁流变液体系有效磁导率的一般解析公式。

互联网摘选

9、

That might mean either developing a uniform way to mark videos and images, showing when and who they were made by, or abandoning phone calls altogether and moving towards data-based communications — using apps like FaceTime or WhatsApp, which can be tied to your identity

这可能意味着要么开发一种统一的方式来标记视频和图像,显示视频和图像的制作时间和制作者,要么干脆放弃电话,转向基于数据的通信——使用FaceTime或WhatsApp之类可以与你的身份绑定的应用程序。

高考真题- 2019 北京 阅读C

10、

The VPN technology based on IPSec protocol can provide secure network transport services such as identity authentication, confidential data, and integrity protection of data flow. It plays an important role in network security area.

基于IPSec的VPN技术能对网络传输提供有效的实体认证、数据机密及数据流完整性保护等机制,在网络安全领域扮演重要的角色。

互联网摘选

11、

The second part introduced the key technology such as electronic evaluation method based on BP neural network, baseprice security technology, evaluation experts randomly selected technology and identity authentication technology.

本文的第二章从基于BP神经网络的电子评标方法、标底保密技术、评审专家随机选取技术和身份认证技术几个方面对招投标系统的相关技术进行了简单的分析和介绍。

互联网摘选

12、

Wireless Identity Authentication System Based on 2D Barcode and Smart Phone

基于二维条码和智能手机的无线身份认证系统

互联网摘选

13、

Identity authentication system based on fingerprinting and two-dimension bar code technology

基于指纹识别和二维条码技术的身份认证系统

互联网摘选

  • 今日热词
  • 热门搜索

简答网英语词典(dict.jiandongshicai.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:(如需回复请填写联系方式)
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈