用密碼 的英文怎麼說

中文拼音 [yòng]
用密碼 英文
in cipher
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. In america, the electronic signature legislation began with utah in 1995, utah digital signatare act is confined to regulate digital signature which is made by using cipher code, then, other states are also engaged in legislative activities to regulate digital signature, but the second state ( newyork ) has adopted a more common way in technology, in other words, the later legislation changed from concentrating on the concrete technolngy of digital signature to more widely regulating the common technology of all kinds of electroncc signature

    在美國,電子簽名立法始於1995年的猶他州,該州法案只限於調整使用密碼的數字簽名。之後,其他州也開始了數字簽名立法活動,但第二個進行此種立法的州(即紐約)採取一種技術上更為一般的方式,換言之,其後的立法從「集中於數字簽名的具體技術法律轉向廣泛調整各種電子簽名的一般技術法律。 」
  2. Tell jamieson this is to be confidential and in code.

    對傑美生說這是機的,用密碼拍發。
  3. Implementation of trusted computing in commercial cryptogram based on hardware

    基於硬體系統的商用密碼可信計算實現方法
  4. As a best practice, enforce password rules at the data level in the membership provider. the

    一種最佳做法是在成員資格提供程序中的數據級別強制使用密碼規則。
  5. Later in this article, it is common for developers to use cryptography, but misapply it in ways that destroy the security of the system, or to use encryption that is too weak and can easily be broken

    ) ,開發人員都普遍使用密碼技術,卻以破壞系統安全的方式濫它;或者使技術,但這些加技術又太薄弱,很容易被破壞。
  6. In tcg systems roots of trust are components that must be trusted because misbehavior might not be detected

    信任鏈則是信任傳遞的機制。常常採用密碼技術。
  7. When you got money, get online password of the reoccupy after affirming pays, ability is paid truly in those days, do not belong to you

    等到你收到了貨,上網確認后再用密碼付款,那時才能真正付出去了,就不屬於你的了。
  8. Having first decrypted the certificate with password " pgfd4bb925dgvbd2439587y ". it then inserts the cleartext and the signature in table

    使證書「 aberglundcert07 」對@ sensitivedata中的文本進行簽名,但先使用密碼「 pgfd4bb925dgvbd2439587y 」對該證書進行解
  9. This dissertation implements an access vpn cryptographical system and illustrates an application example. futhermore, there are more research work need to be done, include incorporating with ipsec protocol and firewall technology

    本文在對各項技術討論和改進的基礎上,採kerberos協議、 socks協議和國內專用密碼演算法,實現了一個遠程訪問vpn系統,並給出了該系統的實際應
  10. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn系統的實現,我們採socks協議做為vpn實現協議,使kerberos協議來進行身份認證,使國內專用密碼演算法來進行數據的加解
  11. Article 23 the acts that divulge the secret of commercial password techniques, unlawfully attack the commercial passwords or conduct the activities impairing the security and interest of the state with commercial passwords and constitute a crime in serious cases shall be legally investigated into the criminal responsibility

    第二十三條泄露商用密碼技術秘、非法攻擊商用密碼或者利用密碼從事危害國家的安全和利益的活動,情節嚴重,構成犯罪的,依法追究刑事責任。
  12. The acts referred to in previous paragraph that do not constitute a crime shall have the commercial password products confiscated by the state password administration institution jointly with the organs of state security and secrecy according to different situation ; the acts impairing the security of the state shall be legally punished with an administrative detention by the organ of state security ; the state personnel involved shall be concurrently subject to administrative penalty

    有前款所列行為尚不構成犯罪的,由國家管理機構根據不同情況分別會同國家安全機關或者保部門沒收其使的商用密碼產品,對有危害國家安全行為的,由國家安全機關依法處以行政拘留;屬于國家工作人員的,並依法給予行政處分。
  13. Average credit card is not criptical, if you want to appear draw money to show, the code that establish ability is useful, want be that travel to see you, of action travel set possibly with the phone commonly, you can consult other the staff member of the bank

    一般信卡是不用密碼的,假如你想透支取現,設的才有,要看看你是那個行的,招行的一般電話就可能設,其它你可以咨詢一下銀行的工作人員。
  14. With the e - portal, clients may access their password protected e & m engineering facilities database in emstf maintained venues, anywhere, anytime. they can also send us an email anytime requesting a quote for specific services, reporting faults or asking questions

    有了電子網站,客戶可利用密碼,隨時隨地進入營運基金服務場地的機電工程設施數據庫、發送電郵要求我們就某服務報價、報告故障或提出查詢。
  15. In order to improve the expression level of e2 gene in p. pastoris, 24 low - usage codons for p. pastoris were substitued by directed mutagnesis based on pcr

    這表明對e2基因上低利用密碼子的改造是成功的,豬瘟病毒ez基因遺傳變異及體外表達研究為進一步大規模生產打下了基礎。
  16. How to protect you web content by password

    如何用密碼保護你的網站
  17. Page for connections made from the server a to the distributor

    連接到該分發服務器所用密碼
  18. He sent a message in code

    用密碼發送了一份訊息。
  19. The message, it ' s in code

    那條情報,是用密碼寫的
  20. Returns a pseudo - random key from a password, salt and iteration count

    用密碼、 salt值和迭代次數返回偽隨機鑰。
分享友人