identity-based 中文意思是什麼

identity-based 解釋
基於身份
  • identity : n. 1. 同一,一致;同一性。2. 本體;正身;個性。3. 【邏輯學】同一性。4. 【數學】恆等(式)。
  • based : 基準
  1. Identity collator implements the character comparison based on the code point

    Identity排序器實現基於編碼點的字元比較。
  2. The identity in the primitive society was based on consanguinity

    原始社會存在身份,但這種身份是建立在血緣基礎之上的。
  3. This new trend undermines the traditional teaching of history in primary and secondary schools, which is based on the ethnocentric approach, by which nation states use to strengthen national collective identity, often in opposition to other states

    這一新趨勢削弱了傳統的中、小學歷史教學,傳統歷史教學建立在種族中心主義方法基礎之上,被民族國家用於加強民族集體認同(通常與其他國家相對立) 。
  4. With the ideas of designated - verifier signature scheme and proxy signature scheme, a new identity - based strong designated - verifier proxy signature scheme from bilinear pairings is proposed. the signature length of our scheme is shorter than wang ' s scheme [ 4 ]

    基於指定驗證者簽名和代理簽名的思想,提出了一個運用雙線性對的基於身份的強指定驗證者代理簽名方案,該方案比文獻[ 4 ]中的指定驗證者代理簽名方案的簽名長度更短。
  5. 2 ateniese g, de medeiros b. identity - based chameleon hash and applications. in proc

    然而,根據兩個原象值可以用來計算出指定接收者的私鑰
  6. 11 bellare m, namprempre c, neven g. security proofs for identity - based identification and signature schemes. in proc. eurocrypt 2004, interlaken, switzerland, may 2 - 6, 2004, springer - verlag, lncs 3027, pp

    為了該方案的可證明安全性,本文構造了一種基於rabin簽名的特殊變形,並在某種特殊的安全模型下證明了該方案的安全性
  7. Fuzzy recognition of the identity based on palm shape

    基於手掌形狀的身份模糊識別
  8. The fipwa based on electric integral equation ( efie ) is presented firstly, the green ’ s function expansion with sommerfeld identity ( based on bessel kernel ) is studied and the msdp for two cases is formulated. in order to improve the iteration property and avoid inner resonance, the combined field integral equation ( cfie ) fipwa is then constructed successfully

    首先研究了基於電場積分方程的快速非均勻平面波演算法,對索末菲恆等式(基於貝塞爾積分核)展開的格林函數進行了深入研究,分兩種情形解決了修正最陡下降路徑的設計問題。
  9. 15 boneh d, boyen x. efficient selective - id secure identity based encryption without random oracles. lecture notes in computer science 3027, cachin c, camenisch j eds.,

    在這種情況下,採用傳統的方法實現基於身份的多解密者的加密方案會引入大量的配對計算,其效率非常低下。
  10. There are currently about 17 identity - based branches of feminism including black feminism and marxist feminism

    依身份不同,現今女權主義約有十七個分支,包括黑人女權主義及馬克思女權主義。
  11. Ideal functionality for identity - based encryption schemes

    基於身份的公鑰加密的理想功能
  12. A survey of identity - based cryptography using pairing

    使用對技術的基於身份密碼學研究綜述
  13. A hierarchical identity - based cryptosystem

    一個基於分級身份的密碼系統
  14. A broadcast encryption scheme using hierarchical identity - based encryption

    一種基於身份分層結構加密演算法的廣播加密方案
  15. Identity - based cryptography applied in wireless local network security protocol

    基於身份密碼體制在無線局域網安全協議中的應用
  16. Information technology - security techniques - digital signatures with appendix - identity - based mechanisms

    信息技術.安全技術.帶附錄的數字簽名.基於等同的機構
  17. Information technology - security techniques - digital signatures with appendix - part 2 : identity - based mechanisms

    信息技術安全技術帶附錄的數字簽名第2部分:基於身份的機制
  18. Springer - verlag, 2001, pp. 213 - 229. 11 bohio m, miri a. efficient identity - based security schemes for ad hoc network routing protocols

    直到2001年,基於身份的加密方案才被boneh和franklin利用雙線性配對實現。
  19. 9 shamir a. identity based cryptosystems and signature schemes. lecture notes in computer science 196, springer - verlag, 1984, pp. 47 - 53

    為了降低管理數字證書所帶來的開銷, shamir在1984年提出了基於身份的密碼學。
  20. Based on bilinear pairings and the random oracle model, a new identity - based dynamic group key agreement protocol for mobile networks was proposed

    基於雙線性對和隨機預言模型,針對移動網路提出了一個動態群組密鑰協商方案。
分享友人