What you need is a utility method to simplify identity-based searches.
您所需要的是使用一种实用方法简化基于标识的搜索。
Multi-Identity and Mutative-Identity in Identity-Based Cryptography;
我们提出了多身份加密以及可变身份签名。
This paper proposes an identity-based proxy signcryption scheme from bilinear pairings.
该文应用双线性对提出一个基于身份的代理签密方案。
This paper presents an identity-based authenticated key exchange protocol in the standard model.
提出了一个标准模型下的基于身份认证的密钥协商协议。
Recently, an efficient identity-based partially blind signature scheme was put forward by Cui and Xin et al.
最近崔巍等人提出了一个高效的基于身份的部分盲签名方案(崔-辛方案)。
User identity-based VLAN is the VLAN mode which associates the VLAN division with the user identity directly.
基于用户标识VLAN是将用户标识直接作为VLAN划分依据的VLAN实现模式。
Therefore constructing identity-based public key architecture has become a new approach to solve secure Email problem.
构造基于身份的公钥系统已成为解决电子邮件安全问题的一种新的途径。
Compared to the previous identity-based verifiably encrypted signature schemes, the proposed scheme is more efficiency.
与已有基于身份的可验证加密签名方案相比,该方案效率较高。
In this paper, based on bilinear pairings, a new efficient identity-based universal designated multi-verifiers signature.
论文基于双线性对提出一种新的基于身份的广义指定多个验证者签名方案。
Combined with complete binary tree architecture, a new identity-based group key agreement protocol is proposed in this paper.
文中结合完全二叉树结构,提出了一种新的基于身份的群密钥协商协议。
It is unsuitable for pervasive computing environment which entities are strangers to use traditional identity-based authentication.
可是传统认证是基于身份的认证,不适合普适环境中对陌生实体的认证。
The invention discloses a novel identity-based privacy enhanced mail forwarding system, which belongs to the field of communication.
本发明公开了一种新型的基于身份的保密邮件转发系统,属于通信领域。
For the security need of the current electronic bidding, an Identity-based Cryptosystem (IBC) electronic bidding scheme is proposed.
针对当前电子招投标活动的安全性需求,提出一种基于身份密码体制(IBC)的电子招投标方案。
Taking advantage of the characteristics of bilinear pairings, an identity-based convertible limited verifier signature scheme is proposed.
利用双线性映射的特性,提出一个基于身份的可转化限制验证者签名方案。
The master private key is Shared by the private key of every node. Threshold and identity-based key management and authentication are used.
各节点使用其身份作为公钥,主密钥由各节点的私钥分享,从而形成基于身份的门限分布式密钥管理。
There are three authentication systems now: Public Key Infrastructure (PKI), Identity-Based Encryption (IBE) and Combined Public Key (CPK).
现今有三种认证系统:公钥基础设施(PKI)、基于标识的加密系统(IBE)和组合公钥系统(CPK)。
This result shows that an identity-based signature scheme can be used as a primitive block to design more complicated cryptographic protocols.
这一结果表明基于身份的数字签名方案可以作为安全的密码原语用于构建更复杂的密码协议。
The country's social divisions, however, are much more complicated than statistics suggest, involving lots of fine-grained, identity-based prejudices.
但是这个国家的社会分化远比数据表现出来的复杂,其中包含了很多微妙的、关于身份的偏见。
According to the MOV reduction theory, the identity-based encryption scheme which is based on the bilinear map will lose the high efficiency of elliptic curve.
根据MOV归约理论,采用双线性映射构造的基于身份加密方案使得该方案不具有椭圆曲线高效的优点。
Aiming at an identity-based signcryption scheme for multi-receiver beginning with the security attribute, this paper studies the security property of this scheme.
针对一个多接收者基于身份签密方案,从签密方案的安全属性入手,分析其安全性。
An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.
从身份认证和访问控制入手,结合PKI和RBAC技术,提出了一种针对电子病历的基于身份的授权模型。
To improve the security and performance of the authentification protocol in manufacturing grid, identity-based authentification protocols without random oracles were established.
为提高制造网格环境下认证协议的安全性和性能,构建了标准模型下基于身份的认证协议。
Since the appearance of certificate-based public key systems, much attention has been paid to identity-based public key cryptosystems to decrease the cost of certificates management.
为了减少证书管理的开销,基于身份的公钥密码体制在基于证书的公钥密码体制诞生后出现,并且越来越受到关注。
With the help of a group signature based on Hierarchical Identity-Based signature (HIBS) and bilinear map, a new secure and efficient sealed-bid electronic auction scheme was presented.
利用一个基于分层身份思想和双线性映射的群签名,提出了一个新的安全高效的密封式电子拍卖方案。
There are two approaches to defining equality and hash value: identity-based, which is the default provided by Object, and state-based, which requires overriding both equals() and hashCode().
有两种方法来定义对象的相等性和散列值:基于标识,它是 Object提供的缺省方法;基于状态,它要求Overrideequals() 和hashCode() 。
In this paper, we propose a novel secure multicast scheme with key agreement based on Elliptic Curve Cryptosystem and group communication inside Identity-based Public key Cryptography system.
提出一个应用椭圆曲线密码体制进行密钥协商而在基于身份的公钥系统内进行组通信的全新安全组播方案。
In order to eliminate the use of certificates in traditional proxy signature and the key-escrow problem in identity-based proxy signature, the notion of certificateless proxy signature was introduced.
无证书的代理签名方案在保留基于身份的代理签名不需要证书的优点下,成功地解决了基于身份的代理签名方案中的密钥托管问题。
This paper states all kinds of technologies on secure Email, analyses current popular secure Email system built on certificate-based public key architecture and introduces identity-based cryptosystem.
本文详细的陈述了安全电子邮件的各项技术,并对当前主流基于证书公钥密码体系的安全电子邮件系统进行分析,并引入了基于身份的密码系统。
For women in the military, the search for equality will still be based on functional equivalence, not identity or even similarity of task.
对于军队中的女性来说,寻求平等仍然是基于功能对等,而不是身份甚至任务上的相似性。
For women in the military, the search for equality will still be based on functional equivalence, not identity or even similarity of task.
对于军队中的女性来说,寻求平等仍然是基于功能对等,而不是身份甚至任务上的相似性。
应用推荐