抵賴 的英文怎麼說

中文拼音 [lài]
抵賴 英文
(用謊言和狡辯否認所犯過失或罪行) deny; disavow; renegue a promise; refuse to admit
  • : 動詞[書面語]1. (拍) strike2. (打擊) beat3. (拋擲) throw
  • : i 動詞1 (依靠) rely on; depend on 2 (逗留不肯離去) hang on in a place; drag out one s stay in...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. Chapter 3, introduces the cryptogram technology which the e - signature stamper system will use

    其中,數字簽名技術尤為重要,它是提供信息完整性、機密性、不可抵賴性的基礎。
  3. The fact brooks no denial.

    事實不可抵賴
  4. Non - repudiation guarantees that no malicious sender can later disavow having created and sent a specific message

    不可抵賴性保證了惡意發送方無法在事後抵賴其創建並發送特定消息的事實。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. "i have nothing to disclose, " rejoined monks.

    「我沒有什麼可吐露的,」蒙克斯繼續抵賴
  7. It security techniques - non - repudiation - general

    It安全技術.抗抵賴.概述
  8. Non - repudiation via authentication and audit

    通過認證和審核,不可抵賴
  9. How to use soap - dsig and ssl for non - repudiation

    如何為實現不可抵賴性而使用soap - dsig和ssl
  10. He brazened it out as long as he could, but finally he had to admit his guilt

    他一直厚著臉皮抵賴,但最後不得不認罪了。
  11. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的數字通信網路中,數字簽名作為數據認證技術中的一項關鍵技術,可以解決否認、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。
  12. "denial to me is vain, " replied mr. brownlow.

    「在我面前抵賴是徒勞的,」布朗勞先生說。
  13. Do n't imagine you can deny that.

    你休想抵賴
  14. The fact can 't be denied.

    事實不可抵賴
  15. You have stolen the royal crown, you cannot deny

    你偷了我的皇冠,你沒法抵賴
  16. With such clear evidence, if you refuse to confess,

    證據確鑿,你想抵賴的話
  17. " denial to me is vain, " replied mr. brownlow

    「在我面前抵賴是徒勞的, 」布朗勞先生說。
  18. Higher security level is required while more and more commerce activities and government affairs are done over lntemet. the authentication of activity paticipates, the confidential ofdat4 the integrity of data and the ability to anti - disavow are the most important ones among all security requirements

    利用開放式網路開展商務和政務活動對網路的安全性提出了更高的要求,最為重要的安全性要求包括:參與方的身份認證,會話的機密性,會話的完整性和抗抵賴性。
  19. How about listen this, your brother, was just like you,

    想不想聽一下,你哥哥,在和你一樣百般抵賴之後,
  20. Pki is a transparent and seamless platform for the network system provided the service of confidentiality, integrity, authentication and non - repudiation, while ca is a necessary and important component in pki, pki ' s modules, functions and its applications are firstly described in this dissertation, with specially emphases on the issuing certificates, issuance mechanisms of revoked certificates, message format and hierarchy of cas as well as the performance of the system

    Pki可以為網路上的各種應用提供機密性、完整性、身份鑒別和不可抵賴性的安全保障,簽證機關是pki系統中的重要組件。本文闡述了pki系統的模型、功能和應用,重點討論了簽證機關的證書發布、層次結構、消息格式、撤銷證書的發布機制等問題,以及它們對系統性能的影響。
分享友人