助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   credit card number 的翻译结果: 查询用时:0.185秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

credit card number
相关语句
  信用卡号码
     By applying the oblivious polynomial evaluation protocol, we present an asymmetric publickey traitor tacing scheme, which supports the asymmetric traceability without any trusted third party(s), does not reveal users sensitive information (e.g., the credit card number, the secret key of digital signature) to any entities and offers selfenforcement, direct nonrepudiation and full frameproof.
     应用不经意多项式估值协议构造了一种非对称的公钥叛逆者追踪方案,该方案具有无需任何可信方和不泄漏用户敏感信息(如信用卡号码或数字签字密钥)的非对称追踪能力,并有自身强化性、直接不可否认性、防诬陷性等特性.
短句来源
  相似匹配句对
     On the Credit Card Swindles
     论信用证诈骗罪
短句来源
     Card
     卡片,纸牌
短句来源
     Concern for Credit Card Security
     信用卡安全忧思
短句来源
     Card.
     Card.
短句来源
     On the credit
     论现代信用
短句来源
查询“credit card number”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  credit card number
When digital cash, e-check or credit card number are included in the bids for payment, the secret information is kept inside SAM.
      
When securing your hotel reservation, a valid credit card number and expiration date will be required.
      
Whenever possible, don't send your whole credit card number over the Internet.
      
With your housing form, please include a major credit card number or a check, made payable to the GMCVA.
      
When user purchase products, the system will check his credit card number if it is a valid credit card number.
      
更多          


By applying the oblivious polynomia l evaluation protocol,we present an asymmetric pub-lic -key traitor tracing scheme,whi ch supports the asymmetric traceabi lity without any trusted third party(s),does not reveal users' sensitive information(e.g.credit card number,the secret key of digital signa-ture)to any entities and offers self -enfo rcement,direct non -repudiation an d full frameproof.It is impor-tant that our scheme can dynamically revoke or restore the decryption privilege of the traitors' personal...

By applying the oblivious polynomia l evaluation protocol,we present an asymmetric pub-lic -key traitor tracing scheme,whi ch supports the asymmetric traceabi lity without any trusted third party(s),does not reveal users' sensitive information(e.g.credit card number,the secret key of digital signa-ture)to any entities and offers self -enfo rcement,direct non -repudiation an d full frameproof.It is impor-tant that our scheme can dynamically revoke or restore the decryption privilege of the traitors' personal key without updating any personal key of the remaining users.

应用不经意多项式估值协议构造了一种非对称的公钥叛逆者追踪方案。该方案具有无需任何可信方和不泄漏用户敏感信息(如信用卡号码或数字签字密钥)的非对称追踪能力,以及自身强化性、直接不可否认性、防诬陷性等特性。更重要的是,数据供应商能够动态地撤销或恢复某个叛逆者解密密钥的解密权限,而无需更新其他用户的解密密钥。

By applying the oblivious polynomial evaluation protocol, we present an asymmetric publickey traitor tacing scheme, which supports the asymmetric traceability without any trusted third party(s), does not reveal users sensitive information (e.g., the credit card number, the secret key of digital signature) to any entities and offers selfenforcement, direct nonrepudiation and full frameproof. It is important that our scheme dynamically revoke or restore the decryption privilege of the traitorss personal...

By applying the oblivious polynomial evaluation protocol, we present an asymmetric publickey traitor tacing scheme, which supports the asymmetric traceability without any trusted third party(s), does not reveal users sensitive information (e.g., the credit card number, the secret key of digital signature) to any entities and offers selfenforcement, direct nonrepudiation and full frameproof. It is important that our scheme dynamically revoke or restore the decryption privilege of the traitorss personal key without updating any personal key of the remaining users. Moreover, compared with the previous symmetric or asymmetric publickey traitor tracing schemes, our shceme is very efficient.

应用不经意多项式估值协议构造了一种非对称的公钥叛逆者追踪方案,该方案具有无需任何可信方和不泄漏用户敏感信息(如信用卡号码或数字签字密钥)的非对称追踪能力,并有自身强化性、直接不可否认性、防诬陷性等特性.更重要的是,数据供应商能够动态地撤销或恢复某个叛逆者解密密钥的解密权限,而无需更新其他用户的解密密钥.该方案与现有的对称或非对称叛逆者追踪方案相比是高效的.

An improvement on 3D secure protocol is proposed for securing E-commerce transactions. PATV ((Payment) Authentication Transaction Value) is introduced to protect privacy information in the overall e-business process. An internet banking system of cross-border remittances is demonstrated and integrated with the proposed improved protocol. It shows that remittance transactions can be securely performed without disclosing sender′s (credit) card number information among the members in 3D SET. In...

An improvement on 3D secure protocol is proposed for securing E-commerce transactions. PATV ((Payment) Authentication Transaction Value) is introduced to protect privacy information in the overall e-business process. An internet banking system of cross-border remittances is demonstrated and integrated with the proposed improved protocol. It shows that remittance transactions can be securely performed without disclosing sender′s (credit) card number information among the members in 3D SET. In addition, a novel way for remittance is provided.

改进3D安全协议,引入支付认证交易码,使得3D安全协议中的3个域间在保护敏感隐私信息的前提下进行安全交易.应用该协议给出跨国跨行网上银行个人转帐模型,表明改进的3D安全协议可在不披露汇款人信用卡号的前提下进行安全转帐,保障了交易中各参与者彼此间的信息隐私,并创新了汇款方式.

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关credit card number的内容
在知识搜索中查有关credit card number的内容
在数字搜索中查有关credit card number的内容
在概念知识元中查有关credit card number的内容
在学术趋势中查有关credit card number的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社