The problem of distributed key generation based on vector space access structures is studied.
本文对基于向量空间接入结构的分布式密钥生成进行了研究。
Based on distributed key generation protocol, we design a verifiable Generalized Vickrey Auction protocol.
基于可验证的分布式密钥生成方案,设计了一个可验证的广义二次拍卖模型。
To satisfy the characteristic of distributed routing protocol, a distributed key generation algorithm based on RSA is presented.
为了适应分布式路由协议的特点,提出了分布式的基于RSA的密钥生成算法。
A distributed key generation protocol for public key cryptosystem based on discrete-log is proposed using generalized verifiable secret sharing.
利用广义可验证秘密分享,提出了基于离散对数的公钥体制的密钥的分布式生成协议。
And we mainly focus on the distributed key management framework: IGKMP and lolus , the rekeying protocol based on key tree , and periodical rekeying strategies.
其中重点讨论了目前流行的组播密钥管理框架,密钥树,分隙密钥更新方案。
This paper presents a multi-group access control scheme that achieves multi-privileged access by combining the centralized and distributed key management scheme.
该文提出了一种多重组的访问控制方案,该方案使用集中式与分布协同式相结合的密钥更新算法实现了多权限的控制。
The distributed key management system based on binary tree is divided into the key management system of one key center and the key management system of multi - layer binary tree.
基于二叉树的分布式密钥管理体系分为单个密钥中心下的密钥管理系统和多层二叉树密钥管理系统。
It gets two request parameters: one contains the name of the cache, which is the JNDI name of the Distributed Map, and the other one is the unique key for getting the data out of the Distributed Map.
它获取两个请求参数:一个参数包含缓存的名称,即分布式映射缓存的jndi名,另一个参数是用于从分布式映射缓存获取数据的唯一密钥。
You need to somehow measure key metrics across the distributed process to ascertain status.
您需要以某种方式跨分布的过程测量关键的量度,从而确定状态。
The key difference is that instead of sandboxes, where changes are made in the centralized approach, the distributed approach allows developers to work with their repositories while disconnected.
主要的区别是:在集中化的方式中,变更是在沙箱内完成的,而在分布式方法中则允许开发人员工作于分离的存储库。
Secret key cryptography is one of the most important technologies in distributed systems security.
秘密密钥加密是分布式系统安全机制中一种最重要的技术。
Data stored in Distributed Map can be accessed by handing over a unique key for the data object, also called the cache key.
通过移交数据对象的唯一密钥(也称为缓存密钥),可以访问存储在分布式映射缓存中的数据。
A key element in developing organizational capability is the determination of what deliverables can be performed by a distributed team across multiple time zones versus a co-located one.
提高组织能力的一个关键因素是决定哪些交付物可以被一个跨多个时区而不是一个单个地理位置的分布式团队来执行。
One of the key principles of robust distributed systems is the use of stateless behavior whenever possible.
创建健壮的分布式系统的一个关键原则是尽量使用无状态行为。
The constructor of the class extracts the JNDI name and the unique key, and then checks the Distributed Map for the data.
这个类的构造函数提取JNDI名和唯一密钥,并检查分布式映射缓存中的数据。
The ability to do end-to-end authentication and authorization is key to doing real distributed, multi-org composite apps.
有能力完成端到端的认证和授权是进行真正的分布式、跨组织组合应用的关键所在。
Performance is a key factor In such a distributed environment.
性能是此类分布式环境中的一个重要因素。
The partitioning key should not include a column with unevenly distributed data or with a small number of distinct values.
分区键不应该包括没有将数据均匀分布或具有少数不同值的列。
At the same time, the utility does not collect certain key statistics, such as multi-column and distributed statistics.
同时,工具不会收集某个键的统计数据,例如多列和分布统计数据。
The key difference between these two approaches is that file-based DISCO/WSIL is distributed and decentralized, whereas UDDI relies on a central repository.
这两种办法的主要差异在于基于文件的 DISCO/WSIL是分布式和非集中式的,而UDDI 则依赖于中心资源库。
Being able to facilitate remote interactions without making a jerk of yourself is a key skill whose importance will only grow as we continue to work in more distributed groups.
知道如何推动远程的互动过程而不是让自己看起来像个白痴,这个技能非常关键,而且当我们继续在分布性更强的集团公司中工作时,其重要性变得越来越大。
In a DPF environment, each table row is distributed to a database partition according to the distribution key specified in the CREATE table statement.
在DPF环境中,根据CREATE table语句中指定的分区键,表中的每个行被分布到一个分区上。
The partitioning key needs to be on a column or set of columns that are highly unique thus ensuring that the data will be evenly distributed across all the partitions that the table is defined on.
分区键需要位于高度惟一的一列或一组列上,从而确保数据均匀分布在该表所定义的所有分区上。
Before firing the back-end call, the run methods checks the Distributed Map cache with the unique key provided.
在执行后端调用前,run方法使用提供的唯一密钥检查分布式映射缓存。
With redundancy being the key feature of an ha cluster, the components that are essential in this example are node management, a distributed file system, volume management, and monitoring.
由于冗余是ha集群的关键特性,因而在这个例子中基本的组成部分包括节点管理、分布式文件系统、卷管理和监控。
Just to be clear, I am not disparaging the use of distributed systems, the key is to have the right platform for the solution.
要说明的是,我并不是不赞成使用分布式系统,关键是要为解决方案找到合适的平台。
In the initial example above, the key data was user profiles, which could be distributed (partitioned) across a set of machines for parallel processing.
在上例中,关键数据是用户配置文件,可以跨一组机器分布(分区)以进行并行处理。
If a good partitioning key is chosen, the data will be evenly distributed across the nodes, and for most, if not all, queries, the partitioning key will uniquely identify the node containing the data.
如果选定一个好的分区键,那么数据会均匀地分布在所有节点,对于大多数情况都是如此,如果不是这样,请进行查询,分区键将惟一地标识包含数据的节点。
But that work will prove extremely valuable when you consider how and when production update reports are distributed to key stakeholders.
但这项工作在你考虑何时和如何分发产品更新报告给利益攸关者时将被证明是物有所值。
SPKM provides authentication, key establishment, data integrity, and data confidentiality in an online distributed application environment using a public key infrastructure.
SPKM使用公钥基础设施在一个联机分布式应用程序环境下提供身份验证、密钥设立、数据完整性和数据机密性。
应用推荐