In chapter 4, we give out a plan for key sharing, and it can resist cheat between membership .
在本文第四章中,构造了一种抗欺骗攻击的密钥分存方案。
参考来源 - 基于灰色半生成的信息分存研究The computations related to encryption, decryption and key sharing algorithm are all realized by C++ Builder font interface, while the algorithms related to data storage are written as stored procedures in background SQL Server database.
其中与加解密算法密钥分存算法有关的计算都在C++Builder5.0前台实现。 而与数据存储有联系的算法都在后台SQL Server相关数据库中的存储过程中实现。
参考来源 - 基于开票代理的电子投票系统的设计与分析·2,447,543篇论文数据,部分数据来源于NoteExpress
The key to seamlessness rests in infrastructure and information sharing.
无缝的关键在于基础设施和信息共享。
Indirect collaboration is the key principle behind information-sharing websites, just as it underlies the complex constructions that termites build.
间接协作是信息共享网站背后的关键原则,就像它是白蚁构建的复杂结构的基础一样。
For us, the key to intimacy is the sharing and minimization of selfishness.
对我们来说,保持亲密的关键就是分享,并将自私降到最低。
应用推荐