Update the digital signature based on the requirement.
基于需求更新数字签名。
The system applies the signature based on the elliptic curve to realize.
该系统采用基于椭圆曲线的数字签名技术来实现。
Mamutu is a pure behavior blocker without signature based detection. mamutu 1.
是一个纯粹的行为阻滞剂没有签字基于侦查。
In this paper, a method for image signature based on histogram is put forward.
提出了一种基于直方图的图像签名方法。
An efficient Shared signature based on elliptic curve cryptography is presented.
提出了一种高效的基于椭圆曲线密码体制的联合签名方案。
To offer a high efficiency digital signature based on elliptic curve cryptography.
为给出一种基于椭圆曲线密码的高效率的数字签名方案。
A new convertible designated confirmer signature based on elliptic curve is presented.
提出了一个新的基于椭圆曲线的可转换的指定证实人签名方案。
An efficient and secure English auction protocol is proposed with signature based on proof of knowledge.
论文研究了英式电子拍卖协议,基于知识证明签名给出一个安全有效的电子拍卖协议。
A directed digital signature based on hyper elliptic curve cryptosystems was proposed and the security was discussed.
该文基于超椭圆曲线密码体制提出了一个单向签名方案,并分析了其安全性。
Two secure schemes of certificateless ring-signature and certificateless ring proxy signature based on CL-PKC are proposed.
基于CL- PK C提出了两个安全的无证书环签名方案和无证书环代理签名方案。
The results of comparison prove that this new digital signature based on discrete logarithm is more effective and secure than the others.
比较结果显示基于离散对数的数字签名方案比其他的数字签名方案效率要高,而且更安全。
The paper studies the English auction secure protocol. An efficient and secure English auction protocol is proposed with signature based on proof of knowledge.
论文研究了英式电子拍卖协议,基于知识证明签名给出一个安全有效的电子拍卖协议。
As another application of feature signature, multi-signature based duplicate image detecting method improved the mapping and encoding during vector quantization.
作为特征签名在重复图像检测方面的应用,基于多特征签名的重复图像检测方法改进了矢量量化过程中的编码映射方式。
By using signature based image feature, we stepped forward and proposed a multi-signature based image retrieval system and a multi-signature based duplicate image detecting method.
利用本文提出的基于特征签名的图像特征表示方法,本文进一步提出了基于多特征签名的图像检索系统,和基于多特征签名的重复图像检测方法。
With the help of a group signature based on Hierarchical Identity-Based signature (HIBS) and bilinear map, a new secure and efficient sealed-bid electronic auction scheme was presented.
利用一个基于分层身份思想和双线性映射的群签名,提出了一个新的安全高效的密封式电子拍卖方案。
A protocol of electronic election based on elliptic curve is proposed. The digital signature based on elliptic curve is used in this protocol. It provides the identity authentication and encryption.
提出了一个基于椭圆曲线的电子选举协议,该协议中多次用到基于椭圆曲线的数字签名,不仅达到了相应的身份认证,同时达到了加密的作用。
Combining process of bidding and cryptography, an efficient and secure inviting public bidding and bidding protocol of construction engineering is proposed with signature based on proof of knowledge.
论文研究了密码学在工程招投标中的应用,把招投标流程与密码学知识相结合,基于知识证明签名给出一个安全有效的电子招投标方案。
Verification of the signature is a key in any signature-based form implementation.
签名验证在任何基于签名的表单实现中都是关键部分。
Because a digital signature is based on public key cryptography, it generally takes much more time to compute a digital signature than a MAC.
由于数字签名是建立在公用密钥密码术基础上的,因此计算一个数字签名所花的时间往往要比计算一个mac长得多。
Signature pricing is "based on market conditions," says Fred Kimball, the boss of Kimball Petition Management, the oldest of these firms.
签名价格“基于市场行情”。弗莱德·凯姆·鲍尔,凯姆·鲍尔倡议管理处(这些公司中历史最长的)总监说。
We divide our project into twelve components based on logical relationships among functions. We use the ODC signature template (Lotus 123) to make up our ODC planning document.
我们将项目按照功能中的逻辑关系划分为十二个组件,并使用OD C信号模板编辑ODC计划文档。
A global aspect utilizing a signature pattern based on packages and the inheritance hierarchy would serve you better in this situation.
在这种情况下,利用基于包和继承层次结构的签名模式的全局方面可以做得更好。
A digital signature is a math-based method of attaching a "personal" identity to a message.
数字签名是一种向消息附加“个人”身份的数学方法。
This signature is based on a common IBM master key, which is available only inside IBM.
此数字签名基于公用IBM主控密钥,此密钥仅在 IBM内可用。
Experts point to the need to go beyond the current generation of signature-based anti-virus software.
专家指出,需要超越目前基于签名的反病毒软件技术。
Signature-based pointcuts cannot capture the join points needed to implement certain crosscutting concerns.
基于签名的切入点不能捕获实现某种横切功能所需要的连接点。
Worth noting, however, is that many IPS sensors use signature-based detection, meaning that attacks are added to a database as they are discovered.
但是,值得牢记的是,许多IPS嗅探器使用基于特征码的检测方法,这意味着当攻击被发现的时候才能被加入到数据库中。
Cooperation was based on a written agreement-complete with the signature of Lavrenty Beria, head of the notorious nkvd-which is shown in the film.
两者之间的合作基于一份书面协定。在这份协定上,有臭名昭著的苏联秘密警察头子(NKVD,苏联内务人民委员会)贝利亚完整的签名,片中有过展示。
Cooperation was based on a written agreement-complete with the signature of Lavrenty Beria, head of the notorious nkvd-which is shown in the film.
两者之间的合作基于一份书面协定。在这份协定上,有臭名昭著的苏联秘密警察头子(NKVD,苏联内务人民委员会)贝利亚完整的签名,片中有过展示。
应用推荐