字體名 的英文怎麼說

中文拼音 [míng]
字體名 英文
fontname
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : 體構詞成分。
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • 字體 : 1 (同一種文字的各種不同形體) form of a written or printed character; script; typeface2 (書法的...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數的概念及原理,並以bolero為例介紹了數的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. In america, the electronic signature legislation began with utah in 1995, utah digital signatare act is confined to regulate digital signature which is made by using cipher code, then, other states are also engaged in legislative activities to regulate digital signature, but the second state ( newyork ) has adopted a more common way in technology, in other words, the later legislation changed from concentrating on the concrete technolngy of digital signature to more widely regulating the common technology of all kinds of electroncc signature

    在美國,電子簽立法始於1995年的猶他州,該州法案只限於調整使用密碼的數。之後,其他州也開始了數立法活動,但第二個進行此種立法的州(即紐約)採取一種技術上更為一般的方式,換言之,其後的立法從「集中於數的具技術法律轉向廣泛調整各種電子簽的一般技術法律。 」
  3. The digital signature based on elliptic curve crypt system

    基於橢圓曲線密碼制的數
  4. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證方案進行綜合的分析和比較,並結合監獄指紋點管理系統對身份認證方案的具要求,設計了基於指紋識別、數及智能卡技術於一的個人身份認證方案,並將它在監獄指紋點管理系統中予以實現。
  5. "it is quite finished, " he cried at last, and stooping down he wrote his name in long vermilion letters on the left-hand corner of the canvas.

    「全部完工啦,」他最後叫起來,並且俯下身去,在畫布的左角用紅色長形寫下了自己的
  6. Under the broad head of the nazm we may also include the classical forms of poems known by specific names such as masnavi a long narrative poem in rhyming couplets on any theme : romantic, religious, or didactic, marsia an elegy traditionally meant to commemorate the martyrdom of hazrat imam hussain, grandson of prophet mohammad, and his comrades of the karbala fame, or qasida a panegyric written in praise of a king or a nobleman, for all these poems have a single presiding subject, logically developed and concluded

    在nazm的寬廣的頭之下我們也許並且包括詩的古典形式由具知道譬如masnavi一首長的敘事詩在押韻的couplets在任何題材:浪漫,宗教,或教誨, marsia輓歌傳統上意味紀念hazrat imam hussain ,孫子先知mohammad ,和karbala望的他的同志殉教,或qasida panegyric被寫在國王或貴族的稱贊,為了所有這些詩有一個唯一主持的主題,被開發和邏輯上結束。
  7. Names of modules and packages are printed in a sans serif typeface

    模塊和包用無襯線表示。
  8. Digital signatures allow messages to be as authentically sent by the origin user or software

    使初始用戶和軟能夠可靠地發送信息。
  9. Selection of secure elliptic curves, implementation of elgamal encrytion and signature over big prime field ; 2. fpga implementation of point multiplication ; 3. at last put forward two blind signature based on ecc, nyberg - rueppel blind scheme and dsa blind scheme, these two schemes can be used in e - cash svstems

    作者所做的主要工作有: ( 1 )實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數: ( 2 )設計了標量乘的fpga功能模擬; ( 3 )最後提出兩種用橢圓曲線密碼制實現的盲簽方案,基於ecc的nvberg - rueppel盲簽方案和基於ecc的dsa盲簽方案,這兩種方案可以用於電子現金系統獲得匿性。
  10. In addition, applications of secret sharing in signature and multi - party decryption are studied, and secure and efficient crypto - algorithms are proposed

    另外,研究安全秘密共享制在數、多方解密中的應用,設計構造了安全有效的密碼演算法。
  11. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼制的優點及研究現狀;其次研究了橢圓曲線密碼制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數等橢圓曲線密碼制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼制,包括ecdh , eces , ecdsa 。
  12. Also, greek names can be spelled with the greek alphabet and japanese names written in kanji.

    希臘語姓可以用希臘母拼寫,而日語姓可以用日文拼寫。
  13. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數域上的橢圓曲線的elgamal加解密和數。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  14. Using the drop - down list, you can select a single font name

    使用該下拉列表可以選擇單個字體名
  15. A group of related fonts of various sizes, which share the same typeface name and typeface attributes

    一組不同大小的相關的組合,擁有相同字體名稱和屬性。
  16. A null - terminated string that specifies the typeface name of the font

    以null結尾的元串指定字體名稱。
  17. Returns a font object that corresponds to the specified system font name

    返回一個對應于指定系統字體名稱的對象。
  18. The name of the font used to display text

    用於顯示文本的字體名
  19. The drop - down list displays the names of fonts available on the computer you are using

    該下拉列表顯示正在使用的計算機上可用的字體名
  20. It is recommended that you provide multiple font names, in order of preference, that cover the possibilities available to your users

    建議按首選順序提供多個字體名,包括用戶可能使用的任何字體名
分享友人