signature field 中文意思是什麼

signature field 解釋
簽字欄位
  • signature : n 1 簽名,署名,畫押,蓋章。2 【音樂】記號〈調號或拍子記號〉;【無線電】(廣播節目開始或完畢的)...
  • field : n 菲爾德〈姓氏〉。n 1 原野,曠野;(海、空、冰雪等的)茫茫一片。2 田地,牧場;割草場;〈pl 〉〈集...
  1. You can often write pointcuts this way by only using class names in a statically resolvable context such as in a field signature or type pattern

    只需在像欄位簽名或者類型模式這樣的靜態可解析的上下文中使用類名就可得到這樣的切點。
  2. Also, with the fast method for computing the, trace of the elements in the finite field, two blind signature schemes based on extended xtr system are presented, the security is equivalent to solving discrete logarithm problem of extended xtr group while the datum is only as 1 / 3 as that of the previous schemes

    和別的方案相比,該方案在匿名范圍選取上具有靈活性,在身份追蹤上具有限制性。 ( 4 )在xtr體制下,分別構造了一個環簽名、盲簽名和群盲簽名演算法。
  3. Selection of secure elliptic curves, implementation of elgamal encrytion and signature over big prime field ; 2. fpga implementation of point multiplication ; 3. at last put forward two blind signature based on ecc, nyberg - rueppel blind scheme and dsa blind scheme, these two schemes can be used in e - cash svstems

    作者所做的主要工作有: ( 1 )實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名: ( 2 )設計了標量乘的fpga功能模擬; ( 3 )最後提出兩種用橢圓曲線密碼體制實現的盲簽名方案,基於ecc的nvberg - rueppel盲簽名方案和基於ecc的dsa盲簽名方案,這兩種方案可以用於電子現金系統獲得匿名性。
  4. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  5. Available refactoring options include rename, extract method, extract interface, change signature, and encapsulate field

    可用的重構選項包括重命名、提取方法、提取介面、更改簽名和封裝欄位。
  6. Handwritten signature has its own virtues : handwritten signature has been a human behavior characteristic and been widely accepted and applied since ancient times ; online signature capture devices are much cheaper than iris and palmprint devices ; handwritten signature is more difficult imitated than other personal physical characteristics. therefore, online handwritten signature verification is hotspot in the biometrics field

    簽名鑒別具有其獨特的優點:手寫簽名自古以來就是一種被人們普遍認可並廣泛應用的行為特徵;手寫簽名的採集設備價格比虹膜和掌紋等採集設備更低廉;作為一種行為特徵,手寫簽名比人體物理特徵更難于模仿等。
  7. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  8. Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card

    Ecdsa等簽名驗證體制的選取, deffie - hellman等密鑰交換體制的研究。論文也討論了基於有限域上橢圓曲線公鑰密碼系統的若干應用和信息安全產品,如數字簽名,組簽名,在智能卡中的應用。
  9. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用檢測採用的是特徵檢測的方法,實現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常檢測能夠根據以往記錄的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確定,閥值設定的太高,有可能漏過真正的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵檢測系統把這部分異常記錄以一定的形式顯示出來或通知管理人員,交給管理人員去判斷,而這些ids系統難以判斷的記錄,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關聯起來,專家或管理人員根據經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證據理論的推理策略和示例學習方法,代替人工檢查分析,可以提高效率,降低誤警率,並可以對一個正在進行得可疑訪問實現實時檢測,通過搜索及時判斷,及時阻斷非法訪問,比事後得人工處理更有意義。
  10. During the off - line signature appraisal, few dynamic information can be available, the difficulty of the identification is tremendous. at present, the development of this field is slow

    離線簽名鑒定過程中,可用動態信息極少:鑒定難度大,目前該領域的研究發展比較緩慢。
  11. For example, digital signature, identity distinguish are both the new technology and application derived from the cryptography. ecc is the one of the known public crypto methods that provide the best strength - per - bit. with the deeper application of ic card in the field of finance and telecom, the ecc crypto system will not only upgrade the application level of ic card, but also open up more application fields

    橢圓曲線密碼體制( ellipticcurvecryptosystem ? ecc )是目前已知的所有公鑰密碼體制中能夠提供最高比特強度( strength - per - bit )的一種公鑰加密體制,而智能卡已廣泛用於金融、電信等領域,利用橢圓曲線密碼體制不僅將大大提高智能卡的應用水平而且還將大大拓寬智能卡的應用領域。
  12. Secondly, the signature of ship ' s magnetic field is simulated on the basis of the precious work. the adaptive weight vector method is used to detect the signal of magnetic field

    接下來,本文利用艦船磁場的建模理論,模擬了磁場通過特性曲線,利用自適應權向量方法對模擬的艦船磁場微弱信號進行檢測。
  13. The signature of a program element such as a type, method, or field consists of a few components, including the element s name, access specification, base types, method arguments, exception specification, and so on

    程序元素的簽名,如類型、方法或者由幾個組件組成的欄位,這些組件包括元素名、訪問規范、基本類型、方法參數、異常規則等。
  14. Returns a signature helper for a field

    返回欄位的簽名幫助器。
  15. Returns the signature of the field

    返回欄位的簽名。
  16. After you have successfully signed the electronic profits tax return, the certificate holder name and the signing date will be printed in the signature field of the form

    在簽署該電子利得稅報稅表后,數碼證書持有人的姓名及簽署日期將會顯示在該電子利得稅報稅表的簽署欄上。
  17. In the signature field, the person signing for the taxpayer should sign with a personal digital certificate. in the signature field of the supplementary form, the auditor should sign with the organizational digital certificate

    如簽署人的身分是納稅人,須在簽署欄以個人數碼證書簽署;核數師簽署報稅表附表時,須以機構數碼證書簽署。
  18. Finally, considering the problem which the cipher ' s secure level is not easy to be changed in the existing elliptic curve digital signature field - arithmetic algorithms, we express a large number as the structure data type and design a field - arithmetic algorithm in elliptic curve cryptography for different cipher security

    第四是針對現廣西大學碩士學位論文一基於橢圓曲線密碼體制的多重數字簽名技術研究有的橢圓曲線密碼體制密碼域算術算潔在實現上強度不易擴展的問題,我們將大整數用結構數據類型表示,設計適合不同橢圓曲線密碼強度的域算術算潔。
  19. The electronic signature has the legal effect only in the field of application that is stipulated by law

    電子簽名只在法律規定的范圍之內,具有法律效力。
  20. This paper advances some measures for controlling effectively the construction cost in the construction stage from aspects of optimizing the construction organization design, implementing the dynamic control of the construction cost, controlling the construction alteration, strengthening the field signature management, and strengthening the management of the project material prices, etc

    從優化施工組織設計、控制工程變更、加強現場簽證和工程材料價格的管理等方面提出了有效控制施工階段工程造價的措施。
分享友人