key signature

美 [ˈkiː sɪɡnətʃər]英 [ˈkiː sɪɡnətʃə(r)]
  • n.调号
key signaturekey signature

noun

music 音调号
the set of marks at the beginning of a printed piece of music to show what key the piece is in

noun

1
the sharps or flats that follow the clef and indicate the key
Synonym: signature

数据来源:WordNet

  1. A tonal system consisting of seven tones in fixed relationship to a tonic , having a characteristic key signature and being since the Renaissance the structural foundation of the bulk of Western music ; tonality .

    调、主音包括七个与主音有固定关系的音色的调音系统,有独特的调号,自文艺复兴以来一直是西方音乐主体的结构基础;调性。

  2. The other is modifying public key signature main mode to protect the initiator 's identity .

    对公钥签名主模式进行改进,以保护发起者的身份信息。

  3. In this paper , an efficient self-certified public key signature scheme was proposed by using bilinear pairings .

    为此使用双线性对,构造了一种高效的自认证公钥签名方案。

  4. An efficient self-certified public key signature from bilinear pairings

    高效的使用双线性对的自认证公钥签名

  5. The third party uses the message , the key signature and the known public key to verify the source as trusted .

    第三方再根据该讯息、金钥签章与已知的公开金钥,认证该讯息具有可信赖的来源。

  6. This is because the key signature contains a hash of the file , and modifying the file renders the hash invalid .

    这是因为,该密钥签名包含该文件的哈希,修改该文件会呈现无效的哈希。

  7. Since most of the known multivariate public key signature schemes are under attacks , an improved signature model is proposed by analyzing the structure of the classical model .

    针对目前已知的大多数多变量公钥签名方案都处于攻击之下的事实,对多变量公钥签名的一般模型进行分析,提出一种改进结构。

  8. The wave motion bears the Key signature imparted by the nature and extent of the source . The Dynamic Action of Coupled Waves in Lossy Nonlinear Medium

    波动具有由震源的性质和范围造成的主要特征。有耗非线性介质中耦合波的动力学行为

  9. The only way to guarantee that the public key signature is from the owner is for the owner to hand you the key on a disk , in person .

    保证公共密钥签名来自所有者的惟一方法是,密钥的所有者亲自把磁盘上的密钥交给您。

  10. In this protocol , the evidence problem based on reliable client is pointed out . Without public key signature algorithm , the evidence problem is solved by symmetric cipher and hash function .

    该协议提出了基于客户端可信的证据保留问题,并在不使用公钥数字签名算法的前提下,利用哈希函数与对称密码算法解决了证据保留问题。

  11. On the basis of a NP ─ completeness problem ( matrix cover problem ), a new type of public key signature scheme is presented . Its velocity is quicker and its realization is easier . and discusses its safety character .

    以NP完全问题MatrixCover问题为基础,建立了一公钥签名体制.该体制速度快,易实现,并对其安全性进行了讨论。

  12. At the same time , the lengths of key and signature were unrelated to the number of group members .

    同时,密钥的长度及签名的长度与群成员的多少无关。

  13. According to the elliptic curve cryptography theory and digital watermarking technique , this paper presents the concepts of secret key and signature watermarking .

    根据椭圆曲线加密理论和数字水印技术,给出密钥和签署水印密钥的概念;

  14. Common proxy signature has a serious defect : once key for signature disclosed , document signed by former key for signature is invalid .

    普通的代理签名算法有一个严重的缺陷:一旦签名密钥泄露,以前用该密钥签名的所有文档都失效。

  15. If the proxy signer wans to use the same proxy key to signature different messages , his private key will be cracked .

    如果代理人两次用同一代理密钥签名,他的私钥就会被破译。

  16. Signature property verifies using the public key in the signature .

    属性是否使用签名中的公钥进行验证。

  17. The Implement of A Pair of Secret Key of Digital Signature Algorithm by Using Java Programming Language

    用JAVA实现DSA数字签名算法的密钥对

  18. In digital signatures , the private key generates the signature , and the corresponding public key validates the signature .

    在数字签名中,私钥将生成签名,而相应的公钥将验证该签名。

  19. The second algorithm is similar to the first . The software we made with VC + + 6.0 uses minimal steps to complete key generation , signature and verification .

    类似签名算法一,我们又提出了签名算法二,并用VC++6.0软件实现了其密钥生成、签名和验证的过程。

  20. In this paper , the characteristics and key problems of signature management are analyzed in detail . Referring to WFMC workflow frame structure , a signature management system realization scheme based on workflow is designed .

    本文对签字管理的特点和要解决的关键问题进行了详细分析,并参照WFMC工作流的框架结构设计了一种基于工作流的签字管理系统实现方案。

  21. The new IBS scheme , not increasing any public key parameter and signature ciphertext overload , will improve the security reduction efficiency by modifying the parameters of Waters identity function which is used to deal with message , so it is more secure and credible .

    新方案在不增加任何公钥参数和签名通信量的条件下,通过修改处理消息的Waters身份处理函数的参数设置使得新算法的安全归约效率得到了较大提高,因而新方案也更为安全可信。

  22. Key Techniques of Handwriting Signature System Based on ActiveX

    基于ActiveX的手写签批系统及其关键技术研究

  23. A brief description of some basic schemes of public key encryption and digital signature is presented .

    简要地介绍了一些基本的公钥加密和数字签名方案;

  24. This protocol uses hash functions 、 common key encryption and digital signature technology , and it is easy to realize it .

    协议使用了Hash函数、对称密钥加密算法以及数字签名技术,实现简单。

  25. The length of public key in the group signature is independent , and the open process is realized by subliminal channel .

    在所构建的群签名中,签名的公钥长度是独立的.打开过程通过阈下通道实现。

  26. The lattice-based public key cryptosystem and digital signature scheme with good safety and low bandwidth have received great attention in recent years .

    基于格论的公钥密码体制和数字签名方案由于具有安全性好、带宽占有少等突出性能,近年来已受到学术界的极大关注。

  27. This paper proposed an efficient ID-based signature scheme without trusted party against the problem of key escrow of ID-based signature system .

    针对现有的基于身份签名系统的密钥托管问题,提出了一种高效的基于身份的无可信中心签名方案。

  28. System management of student result , class management , curriculum management , teaching information management , the private key to produce results signature verification , and other functions .

    系统实现了学生成绩管理、班级管理、课程管理、教师信息管理、公私钥对产生、成绩签名验证等功能。

  29. One important application of public key cryptosystem is digital signature , and signature scheme based on sharing secret is a good method to enhance the security of signature system .

    公钥体制的一个主要应用是数字签名,而基于秘密共享的签名方案是提高数字签名系统安全性的好方法。

  30. In this paper , The principles of Digital Signature is given , Meanwhile the key technology of digital signature : public key cryptography and Hash algorithms is introduced .

    文章阐述了数字签名技术原理,并介绍了数字签名中的关键技术:公钥加密体制和哈希算法。