數字認證 的英文怎麼說

中文拼音 [shǔrènzhèng]
數字認證 英文
digital certificates
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、據電訊的機密性和完整性、據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了簽名的概念及原理,並以bolero為例介紹了簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論據電訊制度產生的必然性;第八章通過對各國立法對電子據的法律效力的規定,論述了對電子交易至關重要的據電訊的不可抵賴性。
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝據、網上鄰居名列表等據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  3. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了系統的三種類型,即身份簽名和消息,剖析了一些經典的方案,並對標準安全模式與隨機oracle模式做出比較,並基於隨機oracle模式提出了一個新的身份演算法及其相應的簽名變形,兩個演算法均在橢圓曲線上實現。
  4. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份方案進行綜合的分析和比較,並結合監獄指紋點名管理系統對身份方案的具體要求,設計了基於指紋識別、簽名及智能卡技術於一體的個人身份方案,並將它在監獄指紋點名管理系統中予以實現。
  5. The third part studies the actual questions of our e - government, and thinks there are 5 aspects of problem in the area : the people ' s ideas is the key to the problem, which is the largest resistance to build the e - government ; the old administrative system ca n ' t adapt the e - government ; it ' s serious to the " digital gap " question ; the information professional is scarce in the government ; the related laws and rules, especially the open information systems are imperfect, in face of the five problems, i bring forward the six countermeasures : the government should strengthen to educate the government employee on the related knowledge ; strongly push on reinventing government ; the " e - government " should be strugglingly developed ; resolve the " digital gap " question ; establish and perfect the correlative laws and rules ; try hard to settle the question of net safety

    在論文的第三部分,我著重對我國電子政府目前的問題進行了提煉、分析,為存在著五大方面,分別是:關鍵是人的思想觀念跟不上,成為電子政府建設的最大阻力;原有的行政體制不適應電子政府的發展; 「學鴻溝( digitalgap ) 」問題嚴重;信息人才短缺;相關法律法規不完善、信息公開的制度保不足。針對這五個方面,我提出了六點解決對策,分別是:大力加強對公務員的培訓和教育;強力推進政府再造:電子政務要大力發展;解決鴻溝問題,加大「兩軟一硬」投入;建立健全相關的法律、法規;努力解決好網路安全問題。
  6. It was the first trial to employ the newly equipped migration data acquisition and analysis system for the scanning entomological radar and, a twin light - trap developed in china for, systematic long - term observations of migration of the beet armyworm spodoptera exigua, beet webworm loxostege sticticalis and cotton bollworm helicoverpa armigera in northern china the study provided direct evidence for the migration of 5 ". exigua in china, many parameters of migratory behaviour of the three species of insects, a better understanding of the relationship between migratory behaviour and wind or temperature field. the results enriched the theory of migration and provided new scientific knowledge for pest management in china

    本研究初步闡明了我國華北地區空中昆蟲群落結構,首次使用我國自行研製的掃描昆蟲雷達的據採集及分析系統,及價廉、高效的姊妹燈誘蟲法對華北地區甜菜夜蛾spodopteraexigua 、草地螟loxostegesticticalis和棉鈴蟲helicoverpaarmigera的遷飛進行了長期系統地觀測,得到了甜菜夜蛾在我國北方遷飛的直接據,三種害蟲遷飛行為的若干參識了昆蟲遷飛行為與風溫場的關系,豐富了昆蟲遷飛理論,為我國害蟲的治理提供了科學依據。
  7. The system was designed by dynamic asp ( active server page ), secure socket layer, digital signature and certification technologies

    系統應用了動態asp技術和據庫技術、安全套接協議、簽名和身份技術。
  8. With the reference of digital signature theroy, presenting a practical authentication algorithm based on fragile watermarking. the algorithm has applied patent right

    借鑒簽名的思想,提出一種基於脆弱水印的實用演算法。該演算法已經提出專利申請。
  9. An image content authentication system based on iris feature watermarking

    一種基於虹膜水印的圖像內容系統
  10. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的通信網路中,簽名作為技術中的一項關鍵技術,可以解決否、偽造、篡改及冒充問題,用來保信息傳輸過程中的完整性,提供信息發送者的身份和不可抵賴性。
  11. 7 ) in fsca, all operations of managers are recorded in system log, and digital watermark technology is used to ensure authoritativeness, accountability, integrity of the log

    7 )採用水印日誌技術。 fsca系統嚴格記錄管理員的操作日誌,並且日誌採用水印技術保其權威性、不可否性和完整性。
  12. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素域上的橢圓曲線的elgamal加解密和簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份方案。
  13. The java secure socket extension jsse enables secure internet communications with ssl tls. it provides an application framework - a java version of the ssl and tls protocols - complete with the full range of functionality including data encryption, server authentication, message integrity, and more

    Java安全套接擴展( jsse )利用ssl / tls可以進行安全的internet通信,它提供了一個具有完整功能的應用程序框架一個java版本的ssl和tls協議,這些功能包括據加密、服務器、消息完整性,等等。
  14. Our company has obtained the “ high - quality products recommended certificate ” by the america international quality certificate commission, “ anti - explosive conformity certificate ” issued by the national anti - explosive authoritative organ, “ anti - explosive electric apparatus installation and amending qualification certificate ” issued by the national anti - explosive electric products quality supervision and inspecting center, is china oil and natural gas first - order network supplier, zhejiang a - class following contract and enhancing on reputation enterprise and zhejiang industrial and commercial digital authentication enterprise, national anti - explosion electrical standard council commission unit, the iso9001 : 2000 quality system identification enterprise

    本公司獲得美國國際品質委員會「高質量產品推薦書」 ,國家防爆權威機構頒發的「防爆合格」 ,國家防爆電氣產品質量檢驗中心頒發的「防爆電氣設備安裝、修理資格書」 ,是中石油、中石化一級網路供應商,浙江省a級守合同重信用單位,浙江工商數字認證企業,全國防爆電氣標委會委員單位, iso9001 : 2000質量體系企業。
  15. Digital authentication scheme based on proxy - signcryption

    基於代理簽名的數字認證方案
  16. By the role number of role authorization table, certification server can use different security - class identification technologies according to diverse users dynamically, and decides responding authorization with the identification results

    通過角色授權表中的角色服務器能夠對不同用戶動態地採用不同安全級別的技術,並能根據結果做出授權判斷。
  17. It is expected that it can be some helpful to the development of digital authentication

    期望對推動數字認證的發展有所啟示。
  18. The digital authentication system is its concrete realization, its function is producing the standard digital certificate. its goal is to manage the key and the certificate

    數字認證系統是其具體的實現,其功能為產生符合標準的書,它的目標是管理密鑰和書。
  19. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    對適于安全電子郵件的演算法從hash 、簽名到加密、進行了比較分析;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的簽名、加密和解密部分作進一步的分析,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶書和通信簿管理體系,建立了ldap服務器客戶端數字認證模型,並進行了實現。
  20. Mapping table of user and role is established through their relevance, and authorizing table of role and table is obtained in terms of map relevance among role, database, database table. by the role ' s flag number, certification server dynamically applies different secure identification technique to give identification to users, and gives authorization decision according to result of identification. the method realizes authorization through program, and is not dependent on concrete database

    根據用戶與角色的映射關聯來獲得用戶和角色的映射表,根據角色、據庫和據庫表映射關聯來獲得角色和據庫表的授權表,通過角色的標識服務器動態採用不同安全級別的技術對用戶進行,並能根據結果作出授權判斷,這種方法使用應用程序來實現授權而不需依賴于具體據庫。
分享友人