Its government is a three-party coalition of the most unlikely kind. 其政府是最不稳固的三党联合。
Greece's new Prime Minister Lucas Papademos and his three-party coalition government have won a confidence vote in parliament with a huge majority. 希腊新总理卢卡斯•帕帕德莫斯和他的三党联盟政府赢得议会信任投票的多数支持。
At the time of nuclear storm becoming increasingly fierce, in order to maintain the area safety and stability, China actively promotes the three-party talks to six-party talks. 在美朝核风波愈演愈烈、几近战争临界值之际,中国从维护地区安全出发,积极出面转旋,经三方会谈而达成了六方会谈框架。
With respect to the Korean nuclear issue, China has acted in the overall interests and worked tirelessly in putting together first the three-party talks and then six-party talks, thus keeping tension in the peninsula from escalating and contributing constructively to peace and stability in Northeast asia. 在朝核问题上,中国从大局出发,坚持不懈,积极斡旋,先后促成三方和六方会谈,避免了半岛紧张局势升级,为维护东北亚的和平与稳定发挥了建设性作用。
The Three-Party Service enables a user to establish a three-way conversation, i.e.a simultaneous communication between the served user and two other parties. 三方业务使用户能建立一个三方通话,即在被服务的用户和另两方之间同时进行通信。
Design and Realization of Three-party Based Storage Backup System 基于三方架构的存储备份系统设计与实现
Controllable quantum secret sharing scheme on three-party entangled state 三态纠缠的可控的量子秘密共享协议
The three-party key distribution task ( or, protocol) can be used as an important module for constructing key exchange protocols. 三方密钥分配密码任务可以作为密钥交换协议中的一个重要子模块。
Two-stage approach can found variety of two-party or three-party protocols, which support multi-encryption scheme. 两阶段设计方案可以自动生成各种需求的两方或三方通信协议,并且广泛支持各种加密方法。
In this paper, we analyze the impact of managerial self-interest and the board on capital structure based on three-party agency theory. 在三方代理理论框架下探索了经营者个人利益、董事会对资本结构的影响,通过结构方程模型的建立,揭示了其内在关系。
Three-Party Password Authentication Key Exchange Without Encryption 不需加密的三方口令认证密钥交换协议
In this paper, we propose a new secure three-party key exchange protocol without encryption based on augmented password. 本文应用扩充口令的思想给出了一种新的三方口令认证密钥交换协议,省去了加密的环节;
Running-Mode Analysis of the Three-Party Cryptographic Protocol 三方密码协议运行模式分析法
Introduce the running-mode analysis based on the two-party and the three-party security protocol. Put forward the running-mode analysis of two-party optimistic fair exchange protocols. 介绍两方和三方安全协议的运行模式分析法,设计并提出了两方乐观公平交换协议运行模式分析法;
Aim at the problem that the BAN logic can't effectively analyse three-party cryptographic protocols, several BAN logic rules are supplemented or improved, and the authentication target of BAN logic is enhanced. 针对BAN逻辑无法有效地分析三方密码协议这个问题,增加和修改了BAN逻辑推理规则,强化了BAN逻辑的认证目标;
Thus, the labor-capital relationship, mainly the three-party negotiation among government, employer and union, is institutionalized, the union becomes a "dynamic actor", i.e., mouthpiece of workers 'interests and is able to play its active role. 这样,以政府、资方和工会三方谈判为主的劳资关系就被制度化了,工会成为能动的行动者,即作为工人利益的代言人,它能主动的发挥作用。
The third part analyzes the impact of the law on the Russian political situation after its adoption, noting that the law will play a positive role in promoting a stable political situation and in setting up a two-or three-party system in Russia. 第三部分对政党法通过后对俄罗斯政局的影响进行了分析,指出政党法对促进俄政局稳定和建立两党或三党体制将起积极作用。
But BAN logic and series of BAN-like logic appeared later often have some limitation and largely don't fit to the analysis of three-party cryptographic protocols. 但BAN逻辑以及后来的一系列BAN类逻辑分析方法都具有一定的局限性,而且大都应用于两方密码协议。
The Three-party and authenticated Key Exchange protocol is analyzed with the methods of Formal analysis, which shows that the protocol has no obvious flaw. 用形式化分析的方法分析了密钥中心参与的可验证密钥交换协议,指出该协议不存在明显的安全漏洞。
All existing three-party password authentication key exchange protocols need certain encryption system. 现有三方口令认证密钥交换协议都需要某种加密方案。
Through generation and filtration, this approach can automatic design security protocols, such as three-party key agreement etc. 通过两阶段的生成和过滤,我们的方法可以实现较大规模网络安全协议的自动化设计,例如三方密钥分配协议等。
Penetrating History and Reality: Taiwan Issue and the Three-party Relationship among China, America and Russia 透视历史与现实:台湾问题与中美俄三边关系
The focus of this thesis is on the design and analysis of three-party PAKE and CPK-based AKE protocols. The main goal is to exert the advantages of CPK and make the new protocols to be competitive with the existing protocols in one or more aspects. 本文主要围绕三方PAKE协议和基于CPK的AKE协议的设计与分析展开研究,力求发挥CPK的优势,在某一方面或者几方面比现有的同类协议具有竞争优势。
Among the authenticated key exchange protocols, password-based three-party authenticated key exchange protocol has the property that human-memorable password, easy maintenance, scalability and so on, thus has been widely used in modern communication networks. 在各种认证密钥交换协议中,基于口令的三方认证密钥交换协议具有口令简单易记、系统维护方便、可扩展性强等特点,在现代通信网络中得到广泛应用。
Put forth Authenticated Data Structure Model, which can commendably solve the three-party data authentication problems in unreliable distributed environment. 2000年,Goodrich等学者提出了认证数据结构模型,这一模型能够很好的解决不可信的分布式环境下的三方数据认证问题。
With respect to the number of users attend in the protocol, there are three kinds of key agreement protocols: two-party key agreement protocols, three-party key agreement protocols, group key agreement protocols. 根据参与者数目的不同,密钥协商协议分为两方密钥协商协议、三方密钥协商协议和群密钥协商协议。
We propose a novel three-party PAKE protocol based on elliptic curve cryptosystem, which can resist PCI attack. In our scheme, the computational cost and communication cost for clients are lower than kindred protocols. 本文利用椭圆曲线密码算法,设计一个新的可以抵抗口令泄露攻击的三方PAKE协议。
In a three-party PAKE protocol, two clients each share a password with the trusted server, respectively. 即假设两个用户与同一个可信服务器共享口令,面向这样问题的PAKE协议就是三方PAKE协议。
The second one is a three-party quantum secret sharing scheme with single photons. 第二个方案是基于单光子的三方机密共享方案。