英语人>网络例句>devised 相关的网络例句
devised相关的网络例句

查询词典 devised

与 devised 相关的网络例句 [注:此内容来源于网络,仅供参考]

At the same time a new method for calculating activation energy was devised and applied to the new model.

同时还提出一种计算局部临界扩散势能的新方法,并应用于新模型。

Rules, for the game as we know it, were devised in England ages ago.

规则,为我们所知道的游戏,务求在英格兰知多少。

The rules, for the game as we know it, were devised in England ages ago.

规则,我们所知道的游戏,务求在英格兰知多少。

Rules, for the sport as we know it, were devised in England ages ago.

规则,我们所知道的运动,务求在英格兰知多少。

In light of this, he devised an algorism aimed at finding authoritative web pages.

Brin和Page也提出了Page-rank算法,并将它应用于搜索引擎google。

Allingham and his team devised an effective system to neutralize the mines, after which every ship was fitted with a neutralizing device using the system.

Allingham与其战友发明了一套有效的方法使地雷失效,在此之后每一艘船只都安装了带有该系统的中和设备。

The editing criteria of multi-satellite altimeter data are devised and data are pre-processed. In order to realize the full potential of satellite radar altimetry data, it is necessary to take into account a number of error sources and apply their associated corrections with an accuracy that is compatible with the proposed measurement precision.

分析并研究了卫星测高误差的来源及其削弱或消除方法,以用户手册的编辑标准为基础,参照并综合国际上同行的编辑方法,制定了针对不同测高数据的编辑准则,改善了各种地球物理改正的精度。

Amateurism was determined by adherence to the amateur rule, which was originally devised in the 19th century to prevent working class athletes from participating in sports such as rowing and tennis.

所谓业余就是要遵守业余原则。该原则是19世纪制订的,以防止工人阶级运动员参加诸如划船和网球的比赛。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

第1/43页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

If you are unfortunate enough to the lovelorn, please tell me, I will help you out, really, please contact me!

如果你不幸失恋了,请告诉我,我会帮助你摆脱困境,真的,请联系我啦!

China's plan to cut energy intensity by 20 percent and pollutant discharges by 10 percent between 2006 and 2010 is a case in point.

中国计划在2006年到2010间降低20%的能源强度和减少10%的主要污染物排放,就是一个这样的例子。

Well, Jerry would rattle off all the details of that movie.

那么,杰瑞会急促背诵那部电影所有细节。