助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   第一个方案 的翻译结果: 查询用时:0.477秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

第一个方案
相关语句
  “第一个方案”译为未确定词的双语例句
     The ciphertext in the first system is the resulting of applying the Canetti-Halevi-Kazt approach to the Boneh-Boyen Identity-Based Encryption scheme.
     第一个方案的密文由应用Canetti-Halevi-Kazt的方法到Boneh-Boyen的基于身份加密而得到.
短句来源
     The first one improved efficiency by 2.5%. The efficiency has been increased 0.42-0.96% by the second scheme.
     第一个方案使整机效率提高2.5个百分点,第二个方案使整机效率进一步提高了0.42~0.96个百分点。
短句来源
     The first one is constructed from(one of) the Selective ID-Based Encryption(Selective-IBE) scheme proposed by Boneh and Boyen recently,yet the second one is transformed from the Full ID-Based Encryption(Full-IBE) scheme obtained by Waters.
     第一个方案基于Boneh和Boyen提出的一个Selective IBE方案,另外一个方案基于Waters提出的Full IBE方案.
短句来源
     One is a perfect scheme,which can be generalized to multi-qubit inputs Deutsch-Jozsa algorithm.
     第一个方案是比较理想的方案,这个方案可以推广到多个量子比特输入的Deutsch-Jozsa量子算法.
短句来源
     In addition, two schemes for quantum secure conditional direct communication are also proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission.
     在第一个方案中,借助于Alice的局域幺正变换,Alice和Bob两人的局域测量,Alice和Charlie两人公开的经典通信,在Charlie的配合与帮助下,Alice以确定的方式将秘密信息传送给了Bob。 在第二个方案中,通过Alice和Charlie两人公开的经典通信,以及Alice和Bob两人的局域测量,实现了Alice和Bob之间的保密通信。
短句来源
更多       
  相似匹配句对
     A SCHEME FOR METHOD BASE MANAGEMENT SYSTEM
     一个方法库管理系统的方案
短句来源
     Thus the scheme can be realized easier than the former one.
     显然,该方案一个方案更简化.
短句来源
     One Controllable Proxy Signature Scheme
     一个可控制的代理签名方案
短句来源
     Part one is the introduction.
     一个部分为引言。
短句来源
     the emergence of the first thing;
     一个事物的出现;
短句来源
查询“第一个方案”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  the first string
The first string of the neoteric high-energy neutrino telescope IceCube successfully began operating in January 2005.
      
Figure A-3 illustrates the speed response of the first string to the 0.22 g deceleration of the leader.
      
If the first string argument to strtok is not null, the argument is saved as part of strtok's internal state.
      
In the first string, we use binary encoding and in the second, we use integers.
      
The concatenation of two strings is the string formed by the symbols of the first string followed by the symbols of the second one.
      
更多          


The problem in the constellation design of low elliptical orbits of the mobile sat-ellite communication system is discussed.An optimum method for the selection of phase of satel-lite constellation is suggested due to various the height of satellites in orbits. Adopting the con-stellation of the low elliptical orbit system for covering China has two schemes.The rirst schemeis:The constellation consists of 12 satellites with the low elliptical orbits(apogee at 2906 km,perigee at 427km). The second is:Adding...

The problem in the constellation design of low elliptical orbits of the mobile sat-ellite communication system is discussed.An optimum method for the selection of phase of satel-lite constellation is suggested due to various the height of satellites in orbits. Adopting the con-stellation of the low elliptical orbit system for covering China has two schemes.The rirst schemeis:The constellation consists of 12 satellites with the low elliptical orbits(apogee at 2906 km,perigee at 427km). The second is:Adding 4 satellites with the mid earth orbit on equatorialplane to compensate the drawback due to low coverage rate at low latitude in first system. Thesecond scheme can provide continuous coverage of China.

讨论低椭圆轨道移动卫星通信系统的星座设计问题,提出了星座中各卫星高度不断变化时,卫星群相位的优化设计方法。本文设计的覆盖我国的低椭圆轨道系统星座有二个方案:第一个方案是由12颗低椭圆轨道卫星(远地点为2906km而近地点为427km)组成;第二个方案为弥补系统对低纬度地区覆盖率低的缺陷,而增加四颗赤道平面中轨道卫星,提供对我目的连续覆盖。

This paper presents two design schemes for optical fiber transmission system for radar signal. In the first scheme, the digital and analog signals are transmitted respectively. The second scheme adopts all digital transmission. The system based on the first scheme has been succesfully developed and used in the radar of a certain type, and the system based on the second scheme is in the course of development. This paper also describes the key technologies for the system, and provides several optical fiber transmission...

This paper presents two design schemes for optical fiber transmission system for radar signal. In the first scheme, the digital and analog signals are transmitted respectively. The second scheme adopts all digital transmission. The system based on the first scheme has been succesfully developed and used in the radar of a certain type, and the system based on the second scheme is in the course of development. This paper also describes the key technologies for the system, and provides several optical fiber transmission schemes for radar signal suitable for long distance applications.

本文提出雷达信号光纤传输系统的两个设计方案,其中第一个方案采用数字信号与模拟信号分别传输的办法,第二个方案采用全数字传输。根据第一方案设计的系统已研制成功并应用于某型号雷达,第二个方案正在研制中。同时本文还对系统所使用的关键技术进行了论述。另外提出了几种适合长距离的雷达信号光纤传输方案。

Two new signature schemes with specified receiver were proposed in this paper. In both the schemes , forging signatures by the inside attacker is provably equivalent to forging Schnorr signature, and verifying the validity of the signature by the outside attacker is equivalent to breaking the Diffie-Hellman problem. The compu- tational complexity of the new schemes is smaller than those proposed by Cao-Li-Li and zhang-Cai-Xiao. Comparing to the sch- eme proposed by Cao-Li-Li, our first scheme inherent its advantage...

Two new signature schemes with specified receiver were proposed in this paper. In both the schemes , forging signatures by the inside attacker is provably equivalent to forging Schnorr signature, and verifying the validity of the signature by the outside attacker is equivalent to breaking the Diffie-Hellman problem. The compu- tational complexity of the new schemes is smaller than those proposed by Cao-Li-Li and zhang-Cai-Xiao. Comparing to the sch- eme proposed by Cao-Li-Li, our first scheme inherent its advantage that enjoying both the authentication and secr- ecy, and overcomes its disadvantage that using checksum to verify validity of the signature. Based the proposed schemes, we construct two novel efficient threshold shared verification signature schemes.

提出了两个新的指定接收者签名方案。内部攻击者要伪造签名,等价于伪造Schnorr签名,外部攻击者要验证签名,等价于解Diffie-Hellman问题。二者的计算复杂度均比Cao-Li-Li方案和Zhang-Cai-Xian方案更小,第一个方案保持了Cao-Li-Li方案中同时有保密性和认证性的优点,又克服了Cao-Li-Li方案中利用冗余信息来验证签名的不足。以他们为基础,还构造了两个高效的共享验证签名方案。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关第一个方案的内容
在知识搜索中查有关第一个方案的内容
在数字搜索中查有关第一个方案的内容
在概念知识元中查有关第一个方案的内容
在学术趋势中查有关第一个方案的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社