助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   签名方法 的翻译结果: 查询用时:0.022秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

签名方法
相关语句
  signature technique
     The paper fi r st introduces the digital signature technique, the scheme of the public encryp t key and the method of the group digital signature. Then an improved mode of m ult i-signature in ref. [1] is given.
     该文介绍了数字签名技术、公开密钥加密体制以及群体式数字签名方法,并对文献[1]中 多人签名的方案进行了改进,设计了群体签名一对一安全通信实现方案。
短句来源
     This paper presents a novel recoverable active signature technique of digital images(RADS) , according to the characteristics of image contents and the requirements of multimedia authentication.
     本文根据多媒体信息的特点和多媒体认证的具体要求,提出了一种新的数字图象可恢复性主动签名方法(RADS)。
短句来源
     In this paper,digital signature technique as typical asymmetrical encryption of net information security is discussed,especially the characters,important application,RSA algorithm and its security analysis and research direction of digital signature technique are introduced in detail.
     探讨网络信息安全非对称加密中典型的数字签名技术,着重阐述数字签名方法特点、重要应用、RSA算法实现、安全性分析及研究方向。
短句来源
  “签名方法”译为未确定词的双语例句
     RSA Digital Signature Method on Mobile Users
     RSA用于手机用户的数字签名方法
短句来源
     Planar Dictionary Signature Method for Physical Optimization of Objec t-Oriented Query
     支持OO查询物理优化的二维字典签名方法
短句来源
     ④The method of the realization and the application that is by the other Digital Signatures in the troops supplies purchase system.
     ④其它数字签名方法在军队物资采购系统中的实现和应用。
短句来源
     By the mechanism of authorization and S/MIME supported by SIP,multicast users,authenticating,authorizing,and secure communicating are acquired.
     该方法利用SIP协议身份验证机制、S/MIME加密与签名方法提供了组播用户身份验证、鉴权和安全通信.
短句来源
     A Scheme of Digital Signatures Based on 4 Times Karn
     一种基于4轮Karn加密算法的数字签名方法
短句来源
更多       
  相似匹配句对
     Methods:Forty patients were selected.
     方法:
短句来源
     Methods With Human Investigation Committee approval.
     方法
短句来源
     Signatures of Knowledge
     知识签名
短句来源
     Signature for XML
     XML的签名
短句来源
     It is used for the proof of author identity, because it has the following properties:(1) Signature is trusted.
     (1)签名是可信的。
短句来源
查询“签名方法”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  signature technique
Separators derived from the signature technique are used for distinguishing primary from overflow records and for subdividing overflow chains into segments allocated into the primary file.
      
Monitoring of structures or mechanical components by an acoustoultrasonic signature technique
      
However, increasing the value of splice offset will offset the benefit of landmark signature technique.
      
In PeerCast, we use the landmark signature technique to control the distribution of peer identifiers.
      
In this paper, we combine the advantages of wavelet-based, network-conscious image compression with a blind digital image signature technique.
      
更多          


A public key cryptosystem based on the invertibility theory of finite automata is introduced in this paper. The public encryption algorithm is implemented by a (τ+r, τ)-order memory finite automaton M which is the compound t)f a r-order input-memory finite automaton Mψ and a (τ, τ)-order memory finite automaton M1, Mψ being weakly invertible with delay free and Mi being invertible with delay τ, and the secrete decryption algorithm is implemented by the inverse M1' with delay τ of M1' and the weak inverse Mψ'...

A public key cryptosystem based on the invertibility theory of finite automata is introduced in this paper. The public encryption algorithm is implemented by a (τ+r, τ)-order memory finite automaton M which is the compound t)f a r-order input-memory finite automaton Mψ and a (τ, τ)-order memory finite automaton M1, Mψ being weakly invertible with delay free and Mi being invertible with delay τ, and the secrete decryption algorithm is implemented by the inverse M1' with delay τ of M1' and the weak inverse Mψ' with delay free of Mψ. The security of this finite automaton public key cryptosystem rests on the difficulties of finding weak inverse of nonlinear finite automata and of factoring matrix polynomials. It is also discussed that a scheme to implement digital signatures by this public key cryptosystem.

本文提出一种基于有限自动机可逆性理论的公开钥密码体制,它的公开的加密算法由一个非线性延迟O步弱可逆γ阶输入存储有限自动机M和一个延迟τ步可逆(τ,τ)阶存储线性有限自动机M_1经过复合后所得的(τ+γ,τ)阶存储有限自动机M所实现,它的秘密的解密算法由M_1的延迟τ步逆M_1′和M的延迟O步弱逆M所实现,这种有限自动机公开钥密码体制的保密性建立在求非线性有限自动机的弱逆的困难性和矩阵多项式因式分解的困难性之上,文中又讨论了用这种密码体制建立数字签名的方法。

A digital signature Public-key cryptosystem based on error correcting codes is presented in this paper. Not only this cryptosystem can sign for message being transmitted, but also can detect and correct errors in the received ciphertext. The security of this system is based on the difficulty of factoring large matrix, which satisfy the user's needs. The computation for generation and verification of signatures is very simple.

本文提出了基于纠错码的一类公钥体制数字签名方案。这类数字签名方法,不仅有足够高的安全性,而且还具有纠、检错和防篡改签名的能力。它的签名和验签的运算速度快、存贮量不大,数据扩展率也较小。

This paper analyses some used methods in digital signature,discusses some ways in which symmetric cryptosystem is as one-way function,presents several methods of digital signatuve with symmetric cryptosystem,and discusses their advantage /disavantage.

本文分析了使用在数字签名中的一些常见方法,讨论了对称密码体制作为单向函数的一些方式,提出了几种较实用的用对称密码体制实现数字签名的方法,并讨论了它们的优缺点。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关签名方法的内容
在知识搜索中查有关签名方法的内容
在数字搜索中查有关签名方法的内容
在概念知识元中查有关签名方法的内容
在学术趋势中查有关签名方法的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社