相反地,如果你正在寻找材料使用或再利用,在没有征得允许或者没能确认那些共公领域的作品,也就是没能确认那些版权满期、以上权利都丧失的作品的情况下,你就不能做任何事情。
Inversely, if you're looking for material to use or reuse, you should not do any of these things without either asking permission or confirming that the work is in the.
在连接握手时,SSL利用公钥算法和数字证书在素不相识的各方之间建立信任并交换当前会话的私钥。
At a connection handshake, SSL utilizes public key algorithms and digital certificates to establish trust between parties that haven't met before and exchange private keys for the current session.
在二十世纪八十年代风靡一时的电视剧《霹雳游侠(Knight Rider)》中,男主人公的汽车、霹雳车KITT可以利用其涡轮推进(TurboBoost)功能跨越障碍物,可以进行逼真的交谈,并在必要时自动驾驶。
IN THE cult 1980s television show “Knight Rider”, the hero's car, KITT, could leap over obstacles using its Turbo Boost function, hold realistic conversations and drive by itself when necessary.
利用广义可验证秘密分享,提出了基于离散对数的公钥体制的密钥的分布式生成协议。
A distributed key generation protocol for public key cryptosystem based on discrete-log is proposed using generalized verifiable secret sharing.
为了设计一种交叉域访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户的PK I方法。
In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.
在进行公理推导的基础上,本文还利用工具SPV对更多的公钥认证协议进行了自动化验证,与协议推导取得了一致的验证结果。
On the ground of deduction, the paper chose a more serials of public key authentication protocols to use the tool SPV for automatic verification, and got expected results.
利用公钥技术来传递通信的临时密钥。
Utilize public key technology to transfer the temporary key.
进一步利用零知识的思想给出了抵抗公钥替换攻击的一般方法。
Furthermore, using zero knowledge idea, a general approach to withstanding the public key substitution attack is given.
各个乡镇景观指数的分析结果是,高优势度、高聚集度和低分维数的区域为彭公乡,土地利用以大面积的园地、林地为主导。
The results demonstrated that Penggong village had mainly high level of dominance and contagion and low level of fractal dimension dominated by large blocks of garden plot and woodland.
水印的认证利用了第三信任方和版权者的公钥,而不需要原始图像参与。
By using the public keys, the image of watermark can be authenticated without the original image.
该协议主要利用RSA的公钥和同态加密机制建立一个会话密钥。
The protocol can use the public key of RSA to create the contributory, forward secrecy the session key.
公钥基础设施PKI利用数字证书为网络安全交易提供基本保障。
Public Key Infrastructure (PKI) is a base to provide Internet security services using public key certificate.
利用RS码和两锁密码协议构造了一种非对称的公钥叛逆者追踪方案。
By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.
在交通调查中,可利用模糊聚类分析将交通分区按工业、居住、公建、道路绿化广场等各项用途来进行分类。
In traffic investigation, traffic sub-areas are classified by fuzzy cluster analysis through such USES as industry, residence, construction and road green plaza.
该文提出一种利用椭圆曲线密码体制(ECC)智能卡公钥方案。
This paper gives a solution by using Elliptic Curve Cryptosystem(ECC)as the public key scheme.
以无锡太湖公蟹和苏州上塘母蟹为研究对象,利用差示扫描量热法测定其玻璃化转变温度,并据此确定本实验所采用的冻藏温度。
The glass transition temperatures of Wuxi Taihu Crab and Suzhou Shangtang Crab were determined by differential scanning calorimeter, then the storage temperatures in this experiment were selected.
利用公钥基础设施PK I技术,设计和实现了XML数据的安全交换系统。
A security data exchange system based on XML was designed and realized by the use of public key infrastructure (PKI) technology.
PK I技术是利用公钥理论和技术建立的提供安全服务的基础设施。
PKI is infrastructure provide security service, based on public key theory and technology.
利用组合公钥体制(CPK)的基本思想,结合椭圆曲线加密(ECC)算法,提出了一种改进的数字签名方案。
This paper represents an improved method of digital signature, which is based on the principle of combined public key(CPK) and combined with the algorithm of elliptic curve cryptosystem(ECC).
利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。
Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme.
本文将利用女性主义视角,从审美形象和牺牲精神两个方面对主人公的女性主义意识进行分析。
This paper will analyze the two main characters' feminist consciousness in two aspects: aesthetic image and sacrifice spirit.
采用紧束缚能带理论,利用所提出的考虑卷曲效应的紧束缚能量哈密顿量,建立了公度双壁碳纳米管(DWNT)的能带结构模型;
The band structure model of commensurate double-walled carbon nanotube (DWNT) was built by using tight-binding Hamiltonian with curvature effect included.
而环签名具有运算效率高、匿名性强的特点,利用无证书公钥系统可解决密钥管理问题。
Ring signature has high computational efficiency and strong anonymity, so the the key management can be solved by using the certificateless public key system.
最后可利用回归法得到各个公因子的得分函数,并可求得各个公司的综合得分。
Then regression method can be used by all the common factors of the score function, and can be integrated score obtained for each company.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
和父母一起利用身边的废弃物品设计机器人或公仔等。
And the parents abandoned the use of side items such as designing robots or dolls. .
语义学比较法是邢公畹教授1994年提出的一种利用语言间的深层语义对应规律鉴定同源词,确定语言亲属关系的方法。
The semantical comparative method was initiated by Xing Gongwan in 1994 in order to judge cognate words and to illustrate the genetic relationship by deep semantic correspondence law among languages.
本文提出的一次性盲公钥协议在保护用户隐私的同时,还保证了用户不能利用一次性盲公钥进行犯罪。
One-off blind public key protocol not only can protect user's privacy, but also can ensure user can't commit by making use of one-off public key.
本文提出的一次性盲公钥协议在保护用户隐私的同时,还保证了用户不能利用一次性盲公钥进行犯罪。
One-off blind public key protocol not only can protect user's privacy, but also can ensure user can't commit by making use of one-off public key.
应用推荐