首页 / 词典 / good

合谋

hé móu
  • conspire;plot together
合谋合谋
合谋 [hé móu]
  • [conspire;plot together] 共同谋划(如进行叛逆活动或犯罪活动,或干某一件奸诈阴险的事情)

  • 合谋反对国家

合谋[hé móu]
  1. 有效的解决了密钥托管问题,并且提供了对节点最终的私钥保护,同时还有效的克服了不诚实的D-KGCs节点的合谋获取节点私钥的缺陷,该工作说明所提方案具有实践指导意义。

    It effectively eliminates the key escrow problem and provides protection for the final private key . It also overcomes the disadvantage of the dishonest D-KGCs conspire to get private key . This work means our scheme has practical significance .

  2. 在工业化之前,它没有与暴力合谋。

    Before industrialization , it did not conspire with the violence .

  3. 7个人都来自布里斯托尔,他们承认了合谋纵火。

    Seven men , all from Bristol , admitted conspiracy to commit arson

  4. 她引诱帕科一起合谋来骗取塔妮娅的积蓄。

    She inveigles Paco into a plot to swindle Tania out of her savings .

  5. 他承认曾与人合谋骗取财产。

    He admitted conspiring to obtain property by deception

  6. 她裁定,出版商与苹果(Apple)合谋提高苹果商店里的电子书价格。

    She ruled that the publishers had conspired with Apple to raise book prices in its store .

  7. 但Sun的方案易受到合谋攻击,在此之后的修改方案在安全性、效率等方面不能令人满意。

    But Sun 's scheme suffers from conspiracy attack , and the improvements proposed hereafter are not satisfying .

  8. 针对前驱攻击的主动路径重置,提出基于主动探测的重路由(ActiveDetectionbasedRerouting,ADR)算法,以确定系统中的主动合谋成员,提高匿名通信的安全性。

    To determine the collaborators in active reset predecessor attack , Active Detection based Rerouting algorithm , ADR , is proposed .

  9. 可防止合谋攻击的门限RSA签名体制

    A Threshold RSA Signature Scheme without Conspiracy Attack

  10. Jan等和Gan分别提出了抗合谋攻击的门限签名方案。

    New threshold signature schemes withstanding the conspiracy attack were proposed by Jan and Gan , respectively .

  11. Bertrand双寡头超级博弈中的合谋与竞争研究

    A Study of Coordination and Competition in Bertrand Price Repeated Game

  12. 周三,中国监管机构指控12家日本汽车配件制造商合谋对丰田和福特(Ford)等汽车厂商抬价。

    On Wednesday Chinese regulators accused 12 Japanese car parts manufacturers of colluding to overcharge carmakers including Toyota and Ford .

  13. 当imf与政客们合谋,提出政治上可行的计划时,它就未能扮演自己促进一个国家改革的应有角色。

    When it colludes with politicians to propose politically palatable programmes , the IMF fails in its proper role of reforming a country .

  14. 针对较小的n和t以及较大n和t分别提出两种有效的抗合谋攻击的门限签名方案,当n和t较小时,给出了一种基于分组秘密共享的RSA门限签名算法;

    In this paper , we introduce two methods to withstand conspiracy attacks : when n and t are not very large , we present an efficient threshold RSA signature scheme .

  15. 节点收到的正面反馈证书保存在服务端,通过它建立信任关系图,从而获得NICE系统防合谋的能力。

    Certification of positive feedback peer received is stored in server peer which is used to form the trust graph , so our system obtains the ability of avoid collusion as in NICE .

  16. 美国证交会(SEC)对顾磊杰提起了民事指控,但后者否认有任何不当行为。检察官称他为内幕交易的合谋者。

    Mr Gupta has been charged with civil violations by the Securities and Exchange Commission and denied any wrongdoing . Prosecutors have called him a co-conspirator .

  17. 同时,还证明了所构建IPP码具有相对TA码更为高效的跟踪算法,从而在抗合谋过程中可以节省跟踪非法指纹的时间。

    Meanwhile , it proves that IPP codes have better tracing algorithm than TA codes , so as to reduce the tracing time during the anti-collusion process .

  18. 美国司法部指控汤姆海耶斯(TomHayes)和罗格达林(RogerDarin)合谋操纵日元Libor利率,使之有利于他们的交易头寸。

    The US Department of Justice charged Tom Hayes and Roger Darin with conspiring to manipulate yen Libor rates to benefit their trading positions .

  19. 这些问题的根源在于,ESO下经理人报酬对公司股价的过度依赖,从而助长了经理人的造假行为、且滋生“合谋”行为,以及使公司责任人“虚置”。

    The causes of the problems are that the executives'rewards relies on the stock price too much and fosters the dishonesty and the conspiracy of executives .

  20. 汉莎航空(lufthansa)也在合谋操纵货运班机燃油附加费一案中得到了宽大处理。

    Lufthansa also received leniency for its role in exposing a conspiracy to fix fuel surcharges on cargo flights .

  21. fsa表示,瑞银交易员还“与交易商间经纪商合谋,企图影响”其他银行提交的日元libor数据。

    UBS traders also " colluded with interdealer brokers in co-ordinated attempts to influence " Japanese yen LIBOR submissions made by other banks , the FSA said .

  22. 曾经是瑞银和花旗集团(citigroup)驻东京交易员的海耶斯,还涉嫌与其他银行的员工合谋进行通信欺诈,并违反了反垄断法。

    Mr Hayes , a former Tokyo-based trader at both UBS and Citigroup , was also charged with wire fraud and antitrust violations for allegedly colluding with individuals at other banks .

  23. 公平贸易委员会的一位官员表示,目前尚不清楚上述合谋嫌疑给任天堂带来了多大损失,该公司预计在截至3月31日的财政年度销售2950万台双屏DS游戏机。

    An FTC official said it was unclear how much the suspected collusion might have cost Nintendo , which expects to sell 29.5m of the two-screen DS players in the year ending March 31 .

  24. 使用扩展的串空间理论分析了ARAN路由协议的安全性,发现了该协议存在重放和合谋两种攻击。

    The ARAN protocol is analyzed by the extended theory of strand spaces and two security vulnerabilities are found , that is conspiracy and replay attacks .

  25. 2001年Hsu等人指出Sun的方案依然会受到合谋攻击的威胁,并提出一个改进方案,在此也引入了抵抗合谋攻击的另一解决思路,即引入SA。

    In 2001 Hsu et al . pointed out Sun 's scheme can come under the plot attack the threat , and proposed a improvement scheme , has also introduced the resistance plot attack another solution mentality in this , namely introduces SA .

  26. ◆以Boneh提出的嵌入假设为前提,运用级联码的思想提出了一种抗两用户合谋攻击的指纹设计方法和与其对应的跟踪方法。

    Based on the embedding assumption , design a 2-secure fingerprints using concatenated codes and its corresponding tracing algorithm .

  27. 认为当2uM>uH>uM+uL且uM≥2uL时,触发策略会使发电侧合谋的发生,这种合谋对电力市场的稳定是不利的。

    It is proved by analyzing the Nash equilibrium of this model that generating side can cooperate by trigger strategy when 2uM > uH > uM + uL and uM ≥ 2uL .

  28. 本文针对这个问题提出一种新颖的解决方案,将EBS和多项式广播结合,在没有合谋攻击时使用EBS进行密钥更新,在存在合谋攻击时使用多项式广播恢复系统密钥。

    To address collusion problem , this paper develops a novel method to combine EBS with broadcasting polynomials . EBS works to refresh keys when there is no collusion attack , otherwise broadcasting polynomials are used to re-key the network .

  29. 它有三个权利中心,对公钥证书的信任可达到等级3〔6〕。由于KACs与IDC处于不等地位,所以IDC与KAC合谋的可能性很小。

    This system has three ACs ( Authority Center ) and its trust in public key certificate can get level 3 [ 6 ] Because the status of KACs and IDC are not equal , so there is less possibility that IDC conspires with KACs .

  30. 取消了Shamir门限秘密分享方案在代理密钥生成阶段的应用,所有代理签名人持有共同的代理密钥,既有效地抵御了合谋攻击,又减小了计算复杂性。

    In the proxy share generation stage , due to the revocation of Shamir 's threshold secret sharing scheme , each proxy signer in the proxy group owns the common proxy share , this can not only efficiently withstand the coalition attack , but also reduce the computational complexities .