key compromise 中文意思是什麼

key compromise 解釋
密碼匙數據外泄
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • compromise : n 1 妥協,調和,和解,互讓了結,私下了結 (between)。2 妥協方案,折衷方案,調和契約;中間物,折...
  1. Even for those families who can afford such lavish spending, striking a compromise between spoiling the kids and denying them is tricky, but possible. teaching kids how to budget and save is key, marshall says

    即便那些承受得住這樣大手大腳花錢的家庭,也要在寵慣孩子和拒絕孩子的要求之間平衡折中, -這是件頗費腦筋的事,不過這是有可能的。
  2. In this new protocol, the key confirmation is incorporated into the authenticated key agreement, and its key confirmation is a hashed value of concatenation of the scalar multiplication of the long - term private key and ephemeral public key, and the scalar multiplication of the private key and long - term public key, which ensure that the protocol achieves forward secrecy, and resists key - compromise impersonation

    在新協議中,加入了密鑰確認,其確認密鑰由長期私鑰與臨時公鑰的積和臨時私鑰與長期公鑰的積串起來的哈希值,這確保它具有前向保密性和密鑰泄漏的安全性。
  3. In this new protocol, the authentication code of the its initiator depend on the shared long term key, but the authentication code of the its responder relies on session key, and the session key is a hashed value of concatenation of the long - term shared key, the scalar multiplication of the long - term private key and ephemeral public key, and the scalar multiplication of the private key and long - term public key, which ensure that the protocol resists key - compromise impersonation

    在新協議中,協議起始方的認證碼依賴于長期共享密鑰,但協議的應答方的認證碼依賴于會話密鑰,且會話密鑰是由長期共享密鑰、長期私鑰與臨時公鑰的積和臨時私鑰與長期公鑰的積三部分串起來的哈希值,這就保證它具有密鑰泄漏的安全性。
  4. One way to compromise data encrypted with this type of cipher is to perform an exhaustive search of every possible key

    可以危及用此類型密碼加密的數據的一個方法是,對每個可能的密鑰執行窮舉搜索。
  5. However we will not compromise the faith of key mission organization and will give priority to our vision and mission

    然而,我們絕不妥協天匙宣教機構的信仰,且將以天匙宣教機構的異象和使命為優先。
  6. In the process to create and pass to the key account value, it is necessary to grasp the success factors for the kam which includes common interest, communication, commitment, credibility, compromise, collaboration and the change of the relationship. part 4 give a method for the kam of hd copper co., ltd., it requires the company construct the key account belief, make a key account management plan strategically, do the work that the plan requires and control the relationship between the key account and the hd copper co., ltd., check the work and notice the change of the relationship, and develop the new key accounts. the main innovative contribution in the paper includes the follow aspects : establishing a system analysis framework for kam in strategically thinking the relationship between the company and its key accounts, exploring the significance and profile of the key account group of profitability, strategy, and loyalty, putting forward three levels of the key accounts " value, concluding the success factors for kam, thinking the relationship between the company and its key accounts as four stages

    為了實現這個目標,本文的第三部分深入分析了大客戶關系管理的有效策略及需要把握的成功要素,為了制定有效的策略,需要把握大客戶關系變化的特徵,把大客戶關系發展過程中的生、長、衰、死四個階段都管理好:大客戶關系管理的有效策略是創造和提升大客戶價值,需要從價格、質量、速度、技術、創新和品牌等大客戶價值要素入手,把握大客戶價值創造的動態特徵,向大客戶傳遞核心大客戶價值、大客戶期望價值和超越大客戶期望的價值,大客戶價值是大客戶認知利益與大客戶認知價格的差額;在為大客戶創造和傳遞大客戶價值時,需要把握住大客戶關系管理的成功要素,包括企業與大客戶的共同利益基礎、雙向交流和溝通、企業信守承諾、樹立企業的信譽、企業對大客戶必要的妥協和讓步、與大客戶合作、注意公司與大客戶內部和外部環境及關系本身的變化。
  7. Both systems are used to decrease the damages due to the compromise of secret key. a new strong ( t, n ) - key - insulated public - key encryption scheme based on the cdh assumption is proposed according to the ( t, n ) - key - insulated public - key encryption model and security definition presented by yevgeniy - jonathan - moti. the new scheme has been proved against chosen - cipertext attack in random oracle

    採用yevgeniy - jonathan - moti提出( t , n )密鑰隔離公鑰加密的一般模型和安全性定義,提出基於cdh假設的強( t , n )密鑰隔離公鑰加密方案,並依據其安全性定義證明新方案在隨機神諭模型下是抗選擇密文攻擊的。
  8. And in the event of a key compromise, all users must replace their system drivers because all of them will have been compromised

    並且如果密鑰泄露,所有用戶都必須替換其系統驅動器,因為所有系統驅動器都將被泄露。
  9. Also, by modifying an existing first - price sealed bid scheme and combining the bit commitment, a new secure ( m + l ) st - price auction scheme is proposed. 6. methods to deal with the problem of secret key compromise in cryptosystem such as forward - secure model and key - insulated model are surveyed

    ( 5 )利用bit承諾技術給出了一類匿名競標的安全電子拍賣模型,構造了該模型的一個實例並證明了其安全性;給出了一個m + 1價位密封競標的電子拍賣方案。
  10. List as follows : firstly, the saka protocol is analysed, because the authentication codes of the two protocol participants completely lie on the long - term shared key, so it does not resist key - compromise impersonation

    具體工作如下:首先,分析了saka協議,由於協議參與者雙方的認證碼完全依賴于長期共享密鑰,因此它不具有密鑰泄漏的安全性。
  11. The main purpose of gdm is to find the consensus or a compromise. a key problem of multiple criteria group decision making ( mcgdm ) is to find the optimal solution on the condition of the maximum consistency and how to measure the consensus degree of the solution

    群體決策的主要目標是尋求一致或妥協,尋求極大化一致性的最優協調解以及如何測度解的一致性一直是多準則群體決策理論與方法研究的核心問題之一。
  12. Secondly, the uap protocol is analysed, because the key confirmation completely lies on the long - term private key, so it does not achieve forward secrecy, and resists key - compromise impersonation

    其次,對uap協議進行安全分析,由於其確認密鑰完全依賴于服務器的長期私鑰,因此它不具有前向保密性和密鑰泄漏的安全性。
分享友人