認證方案 的英文怎麼說

中文拼音 [rènzhèngfāngàn]
認證方案 英文
certification schemes
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (長桌) table; desk 2 (案件) case; law [legal] case 3 (案卷; 記錄)record; file 4 (提...
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  • 方案 : scheme; plan; programme; project; proposal; suggestion; formula; scenario; outline
  1. Cryptanalysis of a remote login authentication scheme based on geometric and improvement approach

    遠程登錄幾何認證方案的安全漏洞分析和解決辦法
  2. 6. analyze advance signature and identification scheme, a deniable authentication scheme is developed. this deniable authentication is suitable for argy - bargy prototype

    對中高級簽名和技術進行研究,在分析了群簽名,環簽名和可否簽名的基礎上,設計了可否認證方案
  3. A practical anonymous authentication with identity escrow

    一個實用的支持契據的匿名認證方案
  4. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證方案進行綜合的分析和比較,並結合監獄指紋點名管理系統對身份認證方案的具體要求,設計了基於指紋識別、數字簽名及智能卡技術於一體的個人身份認證方案,並將它在監獄指紋點名管理系統中予以實現。
  5. A practical efficient one - time password authentication protocol is presented which based on the symmetric algorithm, which conquers common challenge - response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack

    克服了通常的質詢響應認證方案的弱點,可以用在網路環境下,實現通信雙的相互,防止重放攻擊和冒充攻擊,實現簡單,執行效率高。
  6. ( 2 ) the prover can freely choose a group of users he wants to realize his anonymous scope

    ( 3 )利用群簽名和環簽名的思想,給出了一個可追蹤的匿名認證方案
  7. In this paper, the belief logic system gny and it ' s related implementation tool spearii are utilized, ssl protocol is a focused instance, then the detailed analysis procedure from initial protocol model to various evolution protocol models is given, later the final evolution protocol model and ssl protocol are contrasted and thus the security analysis conclusion is drawn for ssl. during the analysis procedure two practical security authentication solutions are designed based on evolution protocol models

    本文採用著名的信念邏輯gny邏輯系統及其相關的形式化工具spear ,以ssl協議為分析實例,詳細闡述了從初始協議模型到各個進化協議模型的分析過程,並將最終的進化模型與ssl協議作比較,給出ssl協議的安全分析,同時在分析過程中以協議模型為基礎設計了兩個實用的安全認證方案
  8. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案
  9. Npmc - national professional managers certificate

    全國職業經理資格認證方案討論稿
  10. Based on the analysis of available multicast authentication schemes, two multicast packet authentication schemes are presented. it is shown that these two schemes have advantages in resisting packet - loss, communication overhead, computation complexity etc, and thus they are suitable for multicast environment

    文章在對目前的多播認證方案分析的基礎上,提出了兩個多播數據包認證方案,分析表明,這兩個在抗丟包能力,通信代價、計算代價等面都獲得較好的性能,適用於兩種不同的多播環境。
  11. Digital authentication scheme based on proxy - signcryption

    基於代理簽名的數字認證方案
  12. Security analysis of ku - chien ' s remote authentication scheme

    遠程身份認證方案的安全性分析
  13. The experiment demonstrates the scheme is efficient for the authentication of text

    實驗表明,該是一種比較有效的文本認證方案
  14. The subsystem will be entered when users start to use the library management system

    這一部分使用了最常用的用戶名/口令模式的認證方案
  15. Design a user identity authentication scheme based on the elliptic curve cryptosystem

    設計了一種基於該橢圓曲線密碼體制的用戶身份認證方案
  16. An efficient and credible authentication schema was constructed based on the visual cryptography

    摘要基於視覺密碼體制構造了一個高效、可幸的身份認證方案
  17. 4 analyze some authentication schemes, especially some based on digital signature

    分析了目前的一些多播認證方案,特別針對數字簽名技術進行了詳細的研究。
  18. User identification and message authentication are two important aspects of network security. an interactive /. cro knowledge proofs based user identification and also a cross - domain message authentication scheme are proposed in the paper

    本文還設計了一個跨域的信息系統,給出了協同產品開發中的跨域信息模型,並提出了相應的跨域認證方案
  19. In order to solve the problems of current source authentication methods, this thesis brings forward a new source authentication scheme based on the events sequence - - - - esa ( events sequence authentication ). this scheme does not depend on the time synchronous mechanism, and it has the advantages of fast authentication and

    根據現有源法的不足和存在問題,本文提出了基於事件序列的源認證方案esa ( eventssequenceauthentication ) ,該不依賴時間同步機制,具有快速,抗丟失性和擴展性較好的特點。
  20. All the rina company management system certification schemes follow the same procedure : initial assessment, a three - year certificate of conformity with the reference standard, periodic validation audits during the three - year period and renewal audits prior to the expiry date

    所有的rina企業管理體系認證方案採用相同的程序:初審、有效期為三年的參照標準符合性書、三年內的定期驗審核和有效期滿前的復評。
分享友人