热门站点| 世界资料网 | 专利资料网 | 世界资料网论坛
收藏本站| 设为首页| 首页

BS DD ENV 14186-2002 高技术陶瓷.陶瓷复合材料.室温下的机械特性.用超声波技术测定陶瓷的弹性

作者:标准资料网 时间:2024-05-03 14:59:07  浏览:9830   来源:标准资料网
下载地址: 点击此处下载
【英文标准名称】:Advancedtechnicalceramics-Ceramiccomposites-Mechanicalpropertiesatroomtemperature,determinationofelasticpropertiesbyanultrasonictechnique
【原文标准名称】:高技术陶瓷.陶瓷复合材料.室温下的机械特性.用超声波技术测定陶瓷的弹性
【标准号】:BSDDENV14186-2002
【标准状态】:作废
【国别】:英国
【发布日期】:2002-11-18
【实施或试行日期】:2002-11-18
【发布单位】:英国标准学会(BSI)
【起草单位】:BSI
【标准类型】:()
【标准水平】:()
【中文主题词】:延伸;复合材料;超声检验;抗拉试验;弹性(流体);陶瓷;对称;高级工业陶瓷;应力;弹性模量;特性;机械性能;抗拉强度;数学计算;定义;定义;超声检验系统;试验
【英文主题词】:
【摘要】:
【中国标准分类号】:Q32
【国际标准分类号】:81_060_30
【页数】:26P;A4
【正文语种】:英语


下载地址: 点击此处下载
基本信息
标准名称:落地车床参数
中标分类: 机械 >> 金属切削机床 >> 车床
替代情况:被JB/T 2523.2-99代替
发布日期:
实施日期:1992-07-01
首发日期:
作废日期:2000-01-01
出版日期:
页数:1页
适用范围

没有内容

前言

没有内容

目录

没有内容

引用标准

没有内容

所属分类: 机械 金属切削机床 车床
【英文标准名称】:Informationtechnology-Securitytechniques-Keymanagement-Mechanismsbasedonweaksecrets
【原文标准名称】:信息技术.安全技术.密钥管理.基于弱机密的管理机制
【标准号】:BSISO/IEC11770-4-2006
【标准状态】:现行
【国别】:英国
【发布日期】:2006-08-31
【实施或试行日期】:2006-08-31
【发布单位】:英国标准学会(GB-BSI)
【起草单位】:BSI
【标准类型】:()
【标准水平】:()
【中文主题词】:通路;算法;校验;代号系统;编码;用密码写的;数据处理;数据保护;数据安全;数据传输;定义;信息交换;信息技术;密码;资料保护;安全工程
【英文主题词】:Access;Algorithms;Authentication;Codesystems;Coding;Cryptographic;Dataprocessing;Dataprotection;Datasecurity;Datatransmission;Definitions;Informationinterchange;Informationtechnology;Passwords;Protectionofinformation;Safetyengineering
【摘要】:ThispartofISO/IEC11770defineskeyestablishmentmechanismsbasedonweaksecrets,i.e.,secretsthatcanbereadilymemorizedbyahuman,andhencesecretsthatwillbechosenfromarelativelysmallsetofpossibilities.Itspecifiescryptographictechniquesspecificallydesignedtoestablishoneormoresecretkeysbasedonaweaksecretderivedfromamemorizedpassword,whilepreventingoff-linebrute-forceattacksassociatedwiththeweaksecret.Morespecifically,thesemechanismsaredesignedtoachieveoneofthefollowingthreegoals.1)Balancedpassword-authenticatedkeyagreement:Establishoneormoresharedsecretkeysbetweentwoentitiesthatshareacommonweaksecret.Inabalancedpassword-authenticatedkeyagreementmechanism,thesharedsecretkeysaretheresultofadataexchangebetweenthetwoentities,thesharedsecretkeysareestablishedifandonlyifthetwoentitieshaveusedthesameweaksecret,andneitherofthetwoentitiescanpredeterminethevaluesofthesharedsecretkeys.2)Augmentedpassword-authenticatedkeyagreement:EstablishoneormoresharedsecretkeysbetweentwoentitiesAandB,whereAhasaweaksecretand6hasverificationdataderivedfromaone-wayfunctionofA'sweaksecret.Inanaugmentedpassword-authenticatedkeyagreementmechanism,thesharedsecretkeysaretheresultofadataexchangebetweenthetwoentities,thesharedsecretkeysareestablishedifandonlyifthetwoentitieshaveusedtheweaksecretandthecorrespondingverificationdata,andneitherofthetwoentitiescanpredeterminethevaluesofthesharedsecretkeys.NOTE-ThistypeofkeyagreementmechanismisunabletoprotectA'sweaksecretbeingdiscoveredby6,butonlyincreasesthecostforanadversarytogetA'sweaksecretfrom6.Thereforeitisnormallyusedbetweenaclient(A)andaserver(6).3)Password-authenticatedkeyretrieval:Establishoneormoresecretkeysforanentity,A,associatedwithanotherentity,6,whereAhasaweaksecretandBhasastrongsecretassociatedwithA'sweaksecret.Inanauthenticatedkeyretrievalmechanism,thesecretkeys,retrievablebyA(notnecessarilyderivableby6),aretheresultofadataexchangebetweenthetwoentities,andthesecretkeysareestablishedifandonlyifthetwoentitieshaveusedtheweaksecretandtheassociatedstrongsecret.However,althoughB'sstrongsecretisassociatedwithA'sweaksecret,thestrongsecretdoesnot(initself)containsufficientinformationtopermiteithertheweaksecretorthesecretkeysestablishedinthemechanismtobedetermined.NOTE-ThistypeofkeyretrievalmechanismisusedinthoseapplicationswhereAdoesnothavesecurestorageforastrongsecret,andrequiresB'sassistancetoretrievethestrongsecretforher.Itisnormallyusedbetweenaclient(A)andaserver(6).ThispartofISO/IEC11770doesnotcoveraspectsofkeymanagementsuchas—lifecyclemanagementofweaksecrets,strongsecretsandestablishedsecretkeys;—mechanismstostore,archive,delete,destroy,etc.weaksecrets,strongsecrets,andestablishedsecretkeys.NOTE-Thekeysgeneratedorretrievedthroughtheuseofweaksecretscannotbemoresecureagainstexhaustionthanthesumoftheweaksecretsthemselves.Withthisproviso,themechanismsspecifiedinthispartofISO/IEC11770arerecommendedforpracticaluseinlow-securityenvironments.
【中国标准分类号】:L80
【国际标准分类号】:35_040
【页数】:40P.;A4
【正文语种】:英语



版权声明:所有资料均为作者提供或网友推荐收集整理而来,仅供爱好者学习和研究使用,版权归原作者所有。
如本站内容有侵犯您的合法权益,请和我们取得联系,我们将立即改正或删除。
京ICP备14017250号-1