shared-key 中文意思是什麼

shared-key 解釋
分享鍵值
  • shared : 共同的
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Wep uses a secret key shared between the communicators

    Wep使用通信器之間共享的秘鑰。
  2. The egis includes two key platform components, namely shared platform for internet content and applications ( spica ) and shared common platform for electronic services ( scopes )

    電子政府基建服務主要由兩個平臺組成,即網上內容共享平臺和電子服務共享平臺。
  3. This workshop has come up with good results in that technicians at labs and representatives from the canola association and piloting households have learned the fast testing method on canola. meanwhile, experts from both countries, senior officers from businesses and technicians at the key links of the canola supply chain discussed, exchanged and shared their experience in managing canola supply chain, which will better promote the implementation of the canola project in santai

    本次會議和培訓取得了良好的效果,試驗室技術人員油菜協會和示範戶代表學習了雙低油菜快速檢測的技術和方法,同時參加這次會議的中加專家,企業高層領導,油菜供應鏈關鍵環節的技術人員討論交流分享了雙低油菜供應鏈管理經驗,這將更好地推動三臺縣項目工作的開展。
  4. Passing the shared secret around can become a potential liability : the shared secret can be exchanged out of band, or the shared secret itself may be encrypted using another key

    傳遞共享密鑰可能成為潛在的缺陷:共享密鑰可以通過不同的方式交換,或者共享密鑰本身使用其他密鑰加密。
  5. In this new protocol, the authentication code of the its initiator depend on the shared long term key, but the authentication code of the its responder relies on session key, and the session key is a hashed value of concatenation of the long - term shared key, the scalar multiplication of the long - term private key and ephemeral public key, and the scalar multiplication of the private key and long - term public key, which ensure that the protocol resists key - compromise impersonation

    在新協議中,協議起始方的認證碼依賴于長期共享密鑰,但協議的應答方的認證碼依賴于會話密鑰,且會話密鑰是由長期共享密鑰、長期私鑰與臨時公鑰的積和臨時私鑰與長期公鑰的積三部分串起來的哈希值,這就保證它具有密鑰泄漏的安全性。
  6. Cluster system is one of the hot spots in the research area of high performance computer, while system area network ( san ) that used to connect nodes is considered to be the key point in the cluster system the aims of this paper are to study dedicated high performance san network based on distributed shared memory architecture, and set up cluster system with high price performance ratio the main work and originalities in this paper list as followings : 1

    群機系統是高性能計算機研究領域的熱點之一,而用於連接群機系統內部結點的系統域網路( san )是群機系統研究的關鍵。本文在分佈共享存儲器結構的基礎上研究高性能專用san網路,構建高性能/價格比的群機系統。本文的主要工作和創新點如下: 1
  7. Smpdca architecture has six outstanding excellences : complexity of the control logics of smpdca is lower than large scale superscalar ; supplying shortest inter - processor communication latency using the shared li data cache ; no cost to maintain cache coherence ; hit rate of data cache increase ; easy to reuse many softwares of symmetric multiprocessor ( smp ) ; exploit the parallelism of applications from many levels. this paper present the architecture model of smpdca, and illustrated its function units, and discussed its key techniques, and analyzed the address image policy of multi - ported cache

    Smpdca結構具有六個突出優勢:相對于大規模的超標量結構而言, smpdca結構的控制邏輯復雜性明顯要低得多;相對于通過共享主存來實現處理器之間的通信的結構而言,通過一個共享的第一級數據cache來實現處理器之間的通信的smpdca結構能夠提供非常小的處理器之間的通信延遲;沒有cache一致性維護開銷;數據cache命中率提高;便於smp (對稱多處理器結構)的軟體重用;從多個層次上開發程序的并行性。
  8. Because of the powerful village government, the csc firm is incomplete market contact. in the property structure, the collective share and the cooperation share are hold by the village government in fact while manager is the key to the firm profits. the residual and controlling rights in csc firm are shared by the village government and the manager

    在產權制度結構中,集體股和企業股的實際控制人是由社區政府代表的,而經營者是決定企業收入流的關鍵;在股份合作制企業中,剩餘索取權和剩餘控制權是由社區政府和經營者共同分享的,但社區政府處于更有利的地位。
  9. Macs work by leveraging a shared secret key, one copy of which is used on the recipient end

    Mac透過使用一種共用秘鑰起作用,接收方端使用它的一個副本。
  10. Both peer a and peer b can use a shared key to exchange a secret message, or peer a can use the private key that corresponds to a public key that peer b holds to perform the same operation

    如對等點a和對等點b都可以用一個共享密鑰交換秘密的訊息,或對等點a可以使用對應于對等點b持有的公用密匙的私用密鑰來完成同樣的操作。
  11. Implementing software shared memory system in lan has become a hot subject in recent years. the system should achieve scalability, simple programming interface and should emulate parallel programming environment. there are three key aspects in implementing such a system : memory organization, data synchronization and communication

    在局域網軟體實現內存共享是近年來研究的一個熱門課題,實現的系統具有良好的可擴展性和簡單的用戶編程介面,並能實現在pc機組成的局域網小模擬高性能計算機運行并行科學計算程序。
  12. Moreover, a novel method is also proposed to using pdp driving ic to perform the traditional pwm modulation. the shared platform is also discussed. besides the circuit design and program, in the paper, according to the typical equivalent pixel unit circuit, analyze the key parameter of the circuit by the support of theory formula deduction, analysis and simulation. it ’ s favorable to improve the high - frequence property of fed sample and enhance the display quality

    實際上,文中還提出了採用pdp驅動晶元進行pwm調制的控制方法和相應驅動波形設計,並就與子行灰度調制方法共享有關硬體和軟體平臺來驅動fed顯示屏進行了有益的探討。除了電路製作和控制編程外,本文從fed顯示屏典型像元的等效電路入手,採用理論公式推導、分析和模擬結合,指出了驅動電路設計中的關鍵參數選擇準則。這有利於改善fed整機的高頻特性,提高fed的顯示質量。
  13. That is, it doesn t depend on the shared secret key

    即,它不取決于共享秘鑰。
  14. This paper mainly describes the implementation of virtual private network system ( vpn ), which bases on ip security protocols ( ipsec ) and pre - shared key mechanism

    本論文主要講述了基於ipsec協議體系和共享密鑰認證機制的vpn系統的實現。
  15. Nair said doctors had completed a key part of the operation, using a leg vein extracted from ladan ' s right thigh to replace for her a shared major vein that drained blood from the brains

    奈爾表示醫生們已完成了手術的關鍵部分。他們以拉丹右大腿取得的一段靜脈,為她倆其中的一個移植一根腦部供血動脈血管。
  16. The increasing fiscal expenditure is a shared headache faced by both developing and developed countries : developed countries in the west, blindly believing in economic development would automatically meet the need of increasing fiscal expenditure, excessively applied public expenditure as a key to stimulating economic development and tasted their own medicine by overburdening ever since 1960s

    財政支出規模不斷增長是一種全球經濟現象。西方發達國家認為經濟增長將會自動滿足財政支出的需要,因此從20世紀60年代起,財政支出一直保持強勁的增長勢頭,直至上世紀80年代,財政支出規模不斷增長給經濟帶來了承重的包袱,西方國家開始吞食財政支出規模過快增長的苦果。
  17. The key exchange algorithm protects information used to generate shared keys

    密鑰交換演算法保護用於生成共享密鑰的信息。
  18. List as follows : firstly, the saka protocol is analysed, because the authentication codes of the two protocol participants completely lie on the long - term shared key, so it does not resist key - compromise impersonation

    具體工作如下:首先,分析了saka協議,由於協議參與者雙方的認證碼完全依賴于長期共享密鑰,因此它不具有密鑰泄漏的安全性。
  19. In linux, shared segments are always named identified by a key. unnamed shared segments are not supported

    在linux中,共享內存通常都是有名共享內存(使用一個關鍵字惟一標識) ; linux不支持無名共享內存。
  20. The shared key authentication method requires that the wired equivalent privacy algorithm be used on both the wireless device and the access point

    共享密鑰認證( shared key authentication )方法要求在無線設備和接入點上都使用有線對等保密( wired equivalent privacy )演算法。
分享友人