首页 / 词典 / good

deniable

  • adj.可否认的;可否认的,可否定的,可拒绝的
deniabledeniable

adj

1
capable of being denied or contradicted

数据来源:WordNet

  1. A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender .

    可否认的认证协议能够使得接收者确定给定消息的来源,但是不能向第三方证明发送者的身份。

  2. A Digital Signature Method Deniable by neither Sender nor Receiver So it is not deniable that there are some problems in the contests of the textbook and course offered .

    一种收、发双方均不可否认的数字签名方案所以不能否认体育课程内容、课程设置存在一定问题。

  3. Deniable Authentication Protocol Based on Public Key Algorithm

    基于公开密钥算法的可否认认证协议

  4. A deniable authentication protocol is proposed in this paper .

    提出了一种新的可否认的认证协议。

  5. Then proposed a deniable model based on Blanchet calculus .

    然后基于Blanchet演算,提出一个支持CryptoVerif的可否认性证明模型。

  6. Deniable authentication scheme for secret communication

    用在秘密通信中的可拒绝认证方案

  7. I suppose these changes are deniable ? ie We might convince others they are not true .

    我想这些更动可以驳回吧?

  8. Deniable ring signature scheme is another ring signature except that it can restrict " excessive " anonymity .

    可否认环签名是另外一种防止匿名性滥用的环签名方案。

  9. Deniable Ring Signature Scheme of Sub-linear Size .

    次线性长度的可否认环签名方案。

  10. So it is not deniable that there are some problems in the contests of the textbook and course offered .

    所以不能否认体育课程内容、课程设置存在一定问题。

  11. A deniable proxy-anonymous signature scheme and an identity-based deniable authentication protocol for secret communication are proposed .

    提出一种基于匿名代理的可否认认证方案和一种基于身份的用于秘密信息传输的代理可否认认证协议。

  12. This is the easiest , most deniable and most effective passive aggressive ploy there is .

    这是最容易、最可否认且最有效的被动攻击手段。

  13. To resist the W-KCI Attack , an identity-based deniable authentication protocol from bilinear pairing is proposed .

    为了抵御提出的W-KCI攻击,本文提出一种基于身份的可否认认证协议。

  14. A Chaos-based Scheme for Deniable Authentication

    一个基于混沌理论的可否认认证方案

  15. At the end of the paper , two efficient deniable authentication protocols are presented on the basis of Aumann and Rabin 's scheme .

    文章同时在Aumann和Rabin的可否认认证协议的基础上提出了两个可否认认证协议,两个协议与原方案相比效率得到了较大的改进。

  16. Although all passive aggressive messages are by nature deniable , a good trick for spotting them is when they come with unnecessary politeness .

    尽管所有被动攻击型邮件顾名思义都可被抵赖,但辨识它们的一个很好的方法是它们往往带着不必要的客套。

  17. Based on a chaotic encryption-hash algorithm with parallel property and RSA algorithm with exchange property , we propose a secure and efficient scheme for the deniable authentication .

    利用一种混沌加密散列算法的并行特性和RSA算法的交换特性,设计了一个安全高效的可否认认证方案。

  18. With the effect of cultural critical theory of Frankfurt School , the scholars mainly take a skeptical , disdainful and deniable attitude to the early mass culture in China .

    受法兰克福学派文化批判理论影响,对早期的中国大众文化,学者们多持怀疑、轻蔑、否定态度。

  19. Based on the research , some non-interactive deniable authentication protocols which have different attributes are proposed to apply in the field of negotiation through e-mail and electronic voting .

    本文深入地研究了可否认认证协议及其相关理论的特征和应用,在此基础上,针对电子邮件协商和电子投票等应用领域设计了多个拥有不同属性的非交互式可否认认证协议。

  20. In 2005 , Di Xiao proposed an entire deniable protocol based on chaotic maps , which used chaotic model to a chaotic key exchange scheme and a chaotic hash function .

    DiXiao等人于2005年提出了一种基于混沌映射的可否认认证方案,该方案利用混沌模型分别构造了一个混沌密钥交换协议和公钥加密以及一个混沌Hash函数。

  21. She half-waved at the admirers , a motion at once friendly and plausibly deniable , and continued the descent .

    她向追随者们微微挥手,动作友好但又仿佛是摇手拒绝,然后继续往下走。

  22. The new protocol has solved two more outstanding problems in the wireless network : the active identity protection to the initiator and the peers can not deniable for the interaction between them .

    新的协议解决了无线网络中比较突出的两个问题:对发起者的主动身份保护和不可否认性。

  23. Deniability has received significant attention . Deniability has a lot of applications to construction of deniable authentication protocol , deniable group key agreement and deniable encryption scheme .

    可否认性已经引起了很大的关注,在认证协议、组密钥协议以及加密方案中得到了广泛应用。

  24. This dissertation intensively analyzes the present researches and proposes the notions of W-KCI Security and W-KCI Attack in non-interactive deniable authentication protocols . 2 .

    本文深入分析了现有的研究成果,并针对非交互式可否认认证领域提出了W-KCI安全性和W-KCI攻击的概念。

  25. Apply this model to the proof of Fan et al deniable authentication protocol . ( 3 ) Based on elliptic curve discrete logarithm problem ; present a non-interactive deniable authentication protocol .

    采用此模型,对Fan等人提出的可否认认证协议的可否认性进行了分析和证明。(3)基于椭圆曲线的离散对数困难问题,提出一个非交互式可否认认证协议。

  26. This paper introduces a probability model based on a kind of probabilistic polynomial-time process calculus : Blanchet calculus . Analyze and prove the deniability of deniable authentication protocol using this process calculus .

    本文引入一种基于计算模型的概率进程演算:Blanchet演算,对可否认认证协议中的可否认性进行了分析与证明。

  27. To sum up , the researches can be concluded as follows . 1 . The notions of Weaken Key-Compromise Impersonation ( W-KCI ) Security and W-KCI Attack in non-interactive deniable authentication protocols are proposed .

    归纳起来,本文的工作主要包括以下几个方面:1.提出非交互式可否认认证协议中的弱化的密钥泄露模仿安全性(WeakenKey-CompromiseImpersonation,W-KCI)以及W-KCI攻击两个概念。

  28. Deniable encryption is cryptosystem that allows a user ( a sender and / or a receiver of messages ) to deny the real parameters of encryption algorithms , and to provide fake parameters . But coercive adversary could not know the fraud .

    可否认的加密是一种加密体制,允许用户(消息的发送者或接收者)否认在加密过程中所使用的真实参数,而给出一个假的参数,但是,强迫攻击者不能觉察出这种欺骗。