词汇 | cryptographic |
释义 | BETA Examples of cryptographiccryptographic isn’t in the Cambridge Dictionary yet. You can help! Just one word or one group of ciphers—even one letter—lost can mean the nullification of months, perhaps even years, of cryptographic work. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The person providing the cryptographic services will then confirm their identity and provide a method of establishing that through a process of certification. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 However, there will be a national register of cryptographic services to acceptable standards, and that is what the clause is about. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 On the one hand one has registration; on the other one has the certification by the cryptographic services. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 The second technique is knowledge authentication, a family of cryptographic protocols that allow mistrusting parties to mutually compare information without actually revealing the information. Bit-commitment turns out to be an important primitive in cryptographic protocols. One might also wish to support cryptographic signatures on version numbers. First, it overlooks the dramatic progress that has been made in the practical implementation of quantum cryptographic systems. Our research programme is to develop techniques and tools for formal modelling, analysis and verification of quantum communication and cryptographic systems. She observes that they were subject to several different cryptographic techniques including the substitution of vowels by the immediately following consonants. This is the first step toward the verification of quantum cryptographic protocols. Names can model a wide variety of identifiers: communication channels, machine addresses, pointers, object references, cryptographic keys, and so on. Shor thus demonstrated that if one could build a quantum computer then most of our cryptographic protocols could be broken. Security describes the cryptographic techniques used to secure the communication channels and required data. Constraint solving for bounded-process cryptographic protocol analysis. Atomic messages typically are principal names, timestamps, nonces and cryptographic keys. Approved providers will be free to offer those cryptographic services required by their clients. From the Hansard archive Example from the Hansard archive. Contains Parliamentary information licensed under the Open Parliament Licence v3.0 |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。