secure

“secure”相关的资料有哪些?“secure”相关的范文有哪些?怎么写?下面是小编为您精心整理的“secure”相关范文大全或资料大全,欢迎大家分享。

Secure spread spectrum watermarking for multimedia

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

IEEE TRANSACTIONS ON IMAGE PROCESSING,VOL.6,NO.12,DECEMBER19971673

Secure Spread Spectrum

Watermarking for Multimedia Ingemar J.Cox,Senior Member,IEEE,Joe Kilian,F.Thomson Leighton,and Talal Shamoon,Member,IEEE

Abstract—This paper presents a secure(tamper-resistant)al-gorithm for watermarking images,and a methodology for digital watermarking that may be generalized to audio,video,and multimedia data.We advocate that a watermark should be constructed as an independent and identically distributed(i.i.d.) Gaussian random vector t

Provably Secure Timed-Release Public Key Encryption

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

Provably Secure Timed-Release Public Key Encryption

JUNG HEE CHEON

Seoul National University,Korea

and

NICHOLAS HOPPER

YONGDAE KIM

IVAN OSIPKOV

University of Minnesota-Twin Cities

A timed-release cryptosystem allows a sender to encrypt a message so that only the intended recipient can read it,and only after a speci?ed time.We formalize the concept of a secure timed-release public-key cryptosystem and show that,if a third party is relied upon to guarantee decryption after the speci?ed date,this concept is equivalent to identity-base

WCO Framework of Standards to Secure and Facilitate Global Trade

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

WCO Framework of Standards to Secure and Facilitate Global Trade

Capacity Building Workshop on ‘International Standards to Stimulate Paperless Trade’

WCO Framework of Standards

To Secure and Facilitate Global Trade

UNeDocs

A cross-domain (Trade, Transport and Customs) data model

Marianne Wong Mee Wan Senior Assistant Director of Customs (Malaysia)

UN/CEFACT

RMC

WCO

WCO Framework of Standards to Secure and Facilitate Global Trade

Outline

About WCO Evolution of Customs WCO Initiatives WCO Framework of Standards WCO Data Model v

Design of an economics-based software infrastructure for secure utility computing on superc

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

Recent advances in technology have created a modern computational environment in which high performance commodity superclusters are interconnected by high bandwidth Internet connections, thus establishing a worldwide computational grid with large aggregate

DesignSecureofUtilityanEconomics-BasedComputingonSoftwareSupercomputingInfrastructureClusters

forGregoryA.KoenigandWilliamYurcik

NationalCenterforSupercomputingApplications(NCSA)

UniversityofIllinoisatUrbana-Champaign

{koenig,byurcik}@ncsa.uiuc.edu

Abstract

Recentadvancesintechn

Cisco Secure ACS 4.0 中文简易使用手册

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

Cisco Secure ACS 4[1].0 中文简易使用手册

中文简易使用手册

编著:邱 杨 qiuy.mail@http://www.77cn.com.cn

福建富士通 2007-4-25

Cisco Secure ACS 4[1].0 中文简易使用手册

目录

1.ACS基本配置................................................................................................................................3

1.1设置ACS管理员帐号.........................................................................................................3 1.2 ACS网络设置(添加Tacacs+ 客户端)..........................................................................4 1.3 Tacacs+设置............................

Acquire get attain obtain gain earn achieve secure的用法辨析

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

Acquire get attain obtain gain earn achieve secure

1.acquire v.多指经过努力逐步获得才能、知识、习惯等,也可用于对财物等的获得,该词强调"一经获得就会长期持有"的含义。

Having read the book, she will be able to pass on the acquired knowledge to trainee teachers.

读完此书,她便能将从书中所得传授给实习教师。

It is through learning that the individual acquires many habitual ways of reacting to situations.

正是通过学习,个人才得以获得应付各种情况的习惯做法。

2.get是常用词,指不一定需要主动性和很大的努力能得到的东西,也表示以各种方式获得所需之物。

如:Where did you get the money ?

你从那儿弄到的钱?

3.attain v.指经过不懈的努力获得未曾预料到的结果;也可指达到某一目标。

Jim is halfway to attaining his pilot's

Secure Content Management In Ambient Environments- how about security and meta-data-

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

In order to strengthen the research on security and ambient intelligence, as well as the relationship between the content management and security work at Philips Research and at Twente University, a joint research project is set up. The work will be carrie

Secure Content ManagementIn Ambient Environments

-how about security andmeta-data?-

A PhD researchco-operation

Willem Jonker, Pieter Hartel, Ling FengNovember 1, 2002, version 1.0

IntroductionIn order to strengthen the research on security and ambient intelligence, as well as

Secure Content Management In Ambient Environments- how about security and meta-data-

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

In order to strengthen the research on security and ambient intelligence, as well as the relationship between the content management and security work at Philips Research and at Twente University, a joint research project is set up. The work will be carrie

Secure Content ManagementIn Ambient Environments

-how about security andmeta-data?-

A PhD researchco-operation

Willem Jonker, Pieter Hartel, Ling FengNovember 1, 2002, version 1.0

IntroductionIn order to strengthen the research on security and ambient intelligence, as well as

Children’s capacity to remember a novel problem and to secure its future solution (pages 26–33)

标签:文库时间:2024-05-17
【bwwdw.com - 博文网】

心理学英文文献,关于儿童的认知能力过程及其发展。

DevelopmentalScience14:1(2011),pp26–33DOI:

10.1111/j.1467-7687.2010.00950.x

PAPER

Children’scapacitytorememberanovelproblemandtosecureitsfuturesolution

ThomasSuddendorf,1MarkNielsen1andRebeccavonGehlen2

1.SchoolofPsychology,UniversityofQueensland,Australia

2.FacultyofPsychologyandNeuroscience,UniversityofMaastricht,TheNetherlands

Abstract

Muchofhumans’successrestsonforesight,theabilitytopredictwhatwillhappenorwhatisneededinthefuture.Surprisinglylittleisknownabouthowthisfacultydevelops.Inthreeexperiments(N=17