因而国际上逐渐形成了两类理论:认证理论和声誉理论。
The international community gradually formed two types of theories: certification theory and reputation theory.
文章介绍了对现有信息隐藏系统模型的攻击形式,指出加入认证理论的必要性。
This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.
一些学校只好决定撤销花费最大的课程,尤其是新的文凭(一种一边学习理论,一边参加培训的资格认证)估计花费是考大学的两倍。
Some say they will have to abandon the most costly courses, in particular the new “diploma”, a semi-academic, semi-vocational qualification that they reckonis twice as expensive to run as A-levels.
用串空间的认证测试理论对其进行了形式分析,最后探讨了它在TLS协议中的应用。
And its formal analysis is presented using authentication test theory in the strand Spaces. Finally its applications to TLS protocol are discussed.
身份识别和认证以及数字签名技术是现有的安全理论中保证网络环境下信息安全传输的有力手段。
Identification recognition, authentication and digital signature are strong methods of available security theories to secure safe transmission in network environment.
本文从理论与实践、地道英语与中国英语、口试样本与语音书籍编排等角度进行了认证,并提供借助于音乐的特色培训纲要。
The present paper provides authentication from theory and practice, from pure English and "Chinese English", and from oral test samples and organization of phonetic books.
对照电子商务和数字证书认证机构的理论分析,以重庆市数字证书认证中心有限公司为案例进行了全面细致的分析和研究。
According to the theories of EC and Certification Authority, this article has do a total accord analyses and studies to the ChongQing Certification Authority Company.
一种理论的可行性是要通过实物检验来认证的。
The feasibility of a theory must be tested for certification through the physical.
本论文主要完成了以下工作:(1)指纹技术与电子商务安全认证的理论分析。
The main thesis completed the following work: 1. Fingerprint technology and e-commerce security certification of the theoretical analysis.
由于缺乏有效的认证中心及银行的支持,所以有些功能未能实现,但是这部分在理论上已得到了有效的证明。
Because lacks the effective authentication center and the bank support, therefore some functions have not been able to realize, but this part in theoretically obtained the effective proof.
对于如何实现当庭认证,在理论上和实践中有不同的理解。
In terms of how to realize the authentication at court, different understandings exist in theory and practice.
身份认证的密码学理论基础分析。
通过具体案例检验,验证了该认证体系有一定的理论价值和实用价值,具有实践操作性。
After this certification system is verified through a concrete case, it is proved that it has certain theoretical value, practical value and operating nature of practice.
认证字典是一类重要的数据结构,它在众多研究领域都具有重要的理论和应用价值。
Authenticated Dictionary (AD) is one of the important data structures, and it is of great theoretic and applicable value in many research fields.
以信息认证为逻辑起点,审计理论框架由信息认证、审计本质、审计目标、审计假设、审计准则等要素组成。
The theoretical framework for auditing consists of message authentication, audit essence, auditing objective, audit hypothesis, and auditing standard, etc.
根据侵权的一般理论分析了认证机构内部工作人员的责任。
The liability of employees is also analyzed according to the general theory of infringement.
基于PDX体制构造理论,设计出一个单向认证票证防伪系统,分析该系统的安全性和推广应用的技术优势。
On the base of structural theorem of PDX system, An anti-counterfeit system of document in one-way certification was released. Its safety, popularization and technology superiority were discussed.
论文的主要工作包括以下几个方面:1身份认证的密码学理论基础分析。
The contributions of the dissertation are as follows. 1 Cryptology is the foundation of authentication.
理论分析和实验表明,用该协议进行文件真实性认证,成功率在95%以上。
Theoretical analysis and experiential simulation show that the protocol can successfully authenticate the authenticity of the file searched with a probability exceeding 95%.
首先给出了一种融合认证架构,并且基于该融合认证架构进行理论分析和仿真。
A framework of integration authentication is put forward, and then the theoretical analysis and the simulation are carried out based on the integration authentication architecture.
我国公关员职业认证的理论与现实有脱节。
The theory of China's Professional Accreditation of Public Relations Practitioners are divorced from the reality.
本文首先扩展了串空间的理想理论,然后应用此扩展理论分析IKE2协议的核心安全:秘密性和认证性。
In this paper, we first extend the ideal theory of Strand Spaces, and then apply this extended theory to analyzing a complex Internet key exchange protocol, LKE2.
本文首先扩展了串空间的理想理论,然后应用此扩展理论分析IKE2协议的核心安全:秘密性和认证性。
In this paper, we first extend the ideal theory of Strand Spaces, and then apply this extended theory to analyzing a complex Internet key exchange protocol, LKE2.
应用推荐