• 相反地,如果正在寻找材料使用利用,在没有征得允许或者没能确认那些领域的作品,也就是没能确认那些版权满期、以上权利都丧失作品情况下,你就不能任何事情。

    Inversely, if you're looking for material to use or reuse, you should not do any of these things without either asking permission or confirming that the work is in the.

    youdao

  • 连接握手时SSL利用算法数字证书在素不相识的各方之间建立信任交换当前会话

    At a connection handshake, SSL utilizes public key algorithms and digital certificates to establish trust between parties that haven't met before and exchange private keys for the current session.

    youdao

  • 二十世纪八十年代风靡一时电视剧霹雳游侠(Knight Rider)》中,主人汽车、霹雳车KITT可以利用涡轮推进(TurboBoost功能跨越障碍物,可以进行逼真交谈在必要自动驾驶

    IN THE cult 1980s television showKnight Rider”, the hero's car, KITT, could leap over obstacles using its Turbo Boost function, hold realistic conversations and drive by itself when necessary.

    youdao

  • 利用广义可验证秘密分享提出基于离散对数体制密钥分布式生成协议

    A distributed key generation protocol for public key cryptosystem based on discrete-log is proposed using generalized verifiable secret sharing.

    youdao

  • 为了设计交叉访问控制(XDAC)系统模型,采用了一种利用证书鉴别用户PK I方法

    In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.

    youdao

  • 进行推导基础上,本文利用工具SPV更多认证协议进行了自动化验证协议推导取得了一致的验证结果

    On the ground of deduction, the paper chose a more serials of public key authentication protocols to use the tool SPV for automatic verification, and got expected results.

    youdao

  • 利用技术传递通信临时密钥

    Utilize public key technology to transfer the temporary key.

    youdao

  • 进一步利用知识思想给出了抵抗替换攻击一般方法

    Furthermore, using zero knowledge idea, a general approach to withstanding the public key substitution attack is given.

    youdao

  • 各个乡镇景观指数的分析结果是,优势、高聚集度低分维数的区域为彭乡,土地利用大面积园地林地主导

    The results demonstrated that Penggong village had mainly high level of dominance and contagion and low level of fractal dimension dominated by large blocks of garden plot and woodland.

    youdao

  • 水印认证利用第三信任方和版权者不需要原始图像参与。

    By using the public keys, the image of watermark can be authenticated without the original image.

    youdao

  • 协议主要利用RSA钥和同态加密机制建立一个会话密钥

    The protocol can use the public key of RSA to create the contributory, forward secrecy the session key.

    youdao

  • 基础设施PKI利用数字证书网络安全交易提供基本保障。

    Public Key Infrastructure (PKI) is a base to provide Internet security services using public key certificate.

    youdao

  • 利用RS两锁密码协议构造一种非对称叛逆者追踪方案

    By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.

    youdao

  • 交通调查中,可利用模糊聚类分析将交通分区工业居住道路绿化广场各项用途进行分类。

    In traffic investigation, traffic sub-areas are classified by fuzzy cluster analysis through such USES as industry, residence, construction and road green plaza.

    youdao

  • 该文提出一种利用椭圆曲线密码体制ECC)智能卡方案

    This paper gives a solution by using Elliptic Curve Cryptosystem(ECC)as the public key scheme.

    youdao

  • 无锡太湖苏州母蟹为研究对象,利用差示扫描量热法测定其玻璃化转变温度并据此确定实验所采用的冻藏温度。

    The glass transition temperatures of Wuxi Taihu Crab and Suzhou Shangtang Crab were determined by differential scanning calorimeter, then the storage temperatures in this experiment were selected.

    youdao

  • 利用基础设施PK I技术设计实现了XML数据安全交换系统

    A security data exchange system based on XML was designed and realized by the use of public key infrastructure (PKI) technology.

    youdao

  • PK I技术利用理论技术建立提供安全服务基础设施

    PKI is infrastructure provide security service, based on public key theory and technology.

    youdao

  • 利用组合体制(CPK基本思想,结合椭圆曲线加密(ECC算法提出一种改进数字签名方案

    This paper represents an improved method of digital signature, which is based on the principle of combined public key(CPK) and combined with the algorithm of elliptic curve cryptosystem(ECC).

    youdao

  • 利用不经意多项式估值协议,该文提出了一种新的非对称叛逆者追踪方案

    Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.

    youdao

  • 本文利用女性主义视角,从审美形象牺牲精神两个方面对主人的女性主义意识进行分析

    This paper will analyze the two main characters' feminist consciousness in two aspects: aesthetic image and sacrifice spirit.

    youdao

  • 采用束缚能带理论,利用所提出的考虑卷曲效应的紧束缚能量哈密顿量,建立了双壁纳米管DWNT能带结构模型

    The band structure model of commensurate double-walled carbon nanotube (DWNT) was built by using tight-binding Hamiltonian with curvature effect included.

    youdao

  • 签名具有运算效率匿名特点,利用证书系统解决密钥管理问题。

    Ring signature has high computational efficiency and strong anonymity, so the the key management can be solved by using the certificateless public key system.

    youdao

  • 最后利用回归得到各个因子得分函数求得各个综合得分。

    Then regression method can be used by all the common factors of the score function, and can be integrated score obtained for each company.

    youdao

  • 改进门限代理协议利用接收方不是验证签密结果验证过程第三

    Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.

    youdao

  • 父母一起利用身边废弃物品设计机器人仔等

    And the parents abandoned the use of side items such as designing robots or dolls. .

    youdao

  • 语义学比较法畹教授1994年提出的一种利用语言深层语义对应规律鉴定同源,确定语言亲属关系方法。

    The semantical comparative method was initiated by Xing Gongwan in 1994 in order to judge cognate words and to illustrate the genetic relationship by deep semantic correspondence law among languages.

    youdao

  • 本文提出的一次性协议保护用户隐私的同时,保证了用户不能利用一次性盲钥进行犯罪

    One-off blind public key protocol not only can protect user's privacy, but also can ensure user can't commit by making use of one-off public key.

    youdao

  • 本文提出的一次性协议保护用户隐私的同时,保证了用户不能利用一次性盲钥进行犯罪

    One-off blind public key protocol not only can protect user's privacy, but also can ensure user can't commit by making use of one-off public key.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定