數字安全 的英文怎麼說

中文拼音 [shǔānquán]
數字安全 英文
data safety
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  1. Secure e - commerce means expanding e - commerce with secure techniques and measures of encryption and digital signature to resist the anticipative risk

    電子商務是指運用加密和簽名等技術與手段來開展電子商務,抵禦預期的風險。
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的隱患的基礎上,歸納出其六大要素,即系統的可靠性、交易者身份的真實性、據電訊的機密性和完整性、據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路體系的建立以及系統保護法規,第四章則介紹了電子提單的認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了簽名的概念及原理,並以bolero為例介紹了簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的據電訊的不可抵賴性。
  3. In data security, a method of sending secret messages. each word or phrase is substituted by a corresponding group of symbols derived from a secret code book

    學中,傳送保密信息的一種方法,一個或一個短語由密碼本中得出的對應的元群代替。
  4. Security e - mail system also can countermark " digital postmark " to justify the accurate time of transfer of the mail

    電子郵件系統還可為郵件加蓋「郵戳」 ,使郵件傳送的準確時間得到公正。
  5. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了認證系統的三種類型,即身份認證、簽名和消息認證,剖析了一些經典的方案,並對標準模式與隨機oracle模式做出比較,並基於隨機oracle模式提出了一個新的身份認證演算法及其相應的簽名變形,兩個演算法均在橢圓曲線上實現。
  6. The digital computer protction ' s reliability, sensitivity and instancy mainly depend on the digital filter and protection algorithm

    微機保護的、可靠、靈敏、快速,關鍵取決于濾波和保護演算法。
  7. Among these, signature technology ensures participator ' s identification against malicious bugging and distorting, and plays an important role in protecting the security of networking communication

    其中簽名技術能夠確認參與者的身份,防止惡意的偽造、竄改,在網路通信方面起到重要的保護作用。
  8. Rajasekhara reddy said while opening a hiv testing camp for elected representatives in the state assembly. andhra pradesh accounts for 1. 5 million of india s 5. 7 million people living with hiv aids

    目前,印度國共有570萬艾滋病患者和感染者,而在得拉邦這一則為150萬人。
  9. Rajasekhara reddy said while opening a hiv testing camp for elected representatives in the state assembly. andhra pradesh accounts for 1. 5 million of india ' s 5. 7 million people living with hiv aids

    目前,印度國共有570萬艾滋病患者和感染者,而在得拉邦這一則為150萬人。
  10. Resemble with the digital watermark methods of the other media such as still image and video, digital audio watermark must account for some problems which consist of perceptual transparency, data bit rate, robustness, security and real - time etc. the robustness of watermark is vital to the practical application, which requires the watermark providing with significant data since it suffered from some intended attacks or unintended revisal

    與靜態圖像、視頻等水印方法類似,音頻水印的研究主要須解決感知透明性、據嵌入率、魯棒性、性以及實時性等問題。水印演算法的魯棒性對于實際應用來說是至關重要的,它要求水印在遭受有意的攻擊或無意的修改後,仍能提供有意義的據,這一性能對版權保護的應用顯得尤為突出。
  11. Computer and network has spreaded all over the society. information security and sciential property right have been risen to a new level. it is a focused problem that how to protect data and software sciential property right in field of informational technology

    現代社會步入信息化高度發達的時代,計算機和網路遍及社會的每一個角落,信息和知識產權不可侵犯也提到了一個新的高度,如何保證據信息的和軟體知識產權成了信息技術領域關心的熱點問題。
  12. One of the reasons that public private key schemes have revolutionized digital security is because the sender and receiver don t have to share a common password

    公鑰/私鑰模式徹底改變了數字安全的原因之一是,發送者和接收者不必再共享一個通用的密碼。
  13. Through strong strength of our company, with the jointed efforts of all the staff, our business is in continuous expansion from the production and sales of television monitoring facilities solely to design and construction of some comprehensive weak current systems, including digital safeguard, hard disk video recording dvr, theft protection and alarm, access door control, guard patrolling, building interphone, lighting and sounding, and the research, production and sales of the related facilities

    公司憑借雄厚的實力,在體員工的共同努力下,我公司經營規模不斷擴大,業務范圍已從單一電視監控設備的生產與銷售發展到包括:防、硬盤錄像dvr 、防盜報警、出入口控制、保巡更、樓宇對講、燈光音響等綜合弱電系統的工程設計、施工及其相關設備的研製、生產與銷售。
  14. In data security, the deduction of confidential data about a particular person by correlating released statistics about groups of individuals

    學中,用相關的已公開發表的個別小組的統計推斷出特定人員的機密據的推導過程。
  15. E - gate is a smart card technology combining iso and usb ( universal serial bus ) versatility with leading - edge security functionality in a plug and play format, providing digital signatures, mutual authentication and encryption required for secure on - line transactions

    E - gate乃結合iso及usb技術的熱插式智能卡平臺,為在線交易提供所需的電子簽、身份確認及據加密等功能。
  16. Interoperating with unmanaged code working with unmanaged code involves going outside the security perimeter for managed code

    討論在microsoft excel中保證的功能,例如密碼保護和證書。
  17. Eia filed a petition to require digital security coding for cordless phones to prevent random dialing that interfered with 911 operations

    Eia (電子工業部)提出申請,要求對無繩電話進行數字安全編碼,以防止隨機撥打造成對" 911 "應急電話的干擾。
  18. It has important potential applications in copyright protection of digital media, secret communication and hidden annotation of host data. facing with this problems, aims of this paper will mainly focus on following aspects : 1. combined with the logistic mapping in non - linearity dynamics system, an image - encrypting algorithm based on modular arithmetic in wavelet transform is designed

    本文在前人工作的基礎上,針對當前水印和圖象加密的發展狀況,完成了以下工作: 1 、從多媒體的角度,分析了多媒體信息的特點,深入研究和分析了圖象加密技術。
  19. The hole was discovered by riley hassell of us security company eeye digital security. in his advisory , hassell hints that there may be further problems with the upnp service

    該缺陷是由美國eeye數字安全公司的rileyhassell發現的。在他的報告中,他暗示「通用即插即用」可能還有更多的問題。
  20. Digital products copyright protection, information content security and security communication make information hiding that is a new science and art of information security field. as an effective technique used for convert communication and copyright protection, information hiding has drawn a lot of attention over the past few years in the field of information security

    媒體的版權保護、信息內容監控、數字安全通信等問題促使信息發展新的概念,具有偽裝特點的信息隱藏應運而生,並成為隱蔽通信和媒體保護的有效手段,迅速成為國際上的研究熱點。
分享友人