用法簽 的英文怎麼說

中文拼音 [yòngqiān]
用法簽 英文
signature
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • 用法 : use; usage
  1. The recommended approach for accessing resources outside the database under an impersonation context is to use certificates and signatures as apposed to the

    在模擬上下文內訪問數據庫以外資源的建議方是使證書和名替代
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立對密碼技術的進出口及使的控制,第六章介紹了數字名的概念及原理,並以bolero為例介紹了數字名的技術方式,對有關律問題作了論述;第七章首先論述了電子提單對有效性的律需求,然後結合國內和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立對電子證據的律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  3. In america, the electronic signature legislation began with utah in 1995, utah digital signatare act is confined to regulate digital signature which is made by using cipher code, then, other states are also engaged in legislative activities to regulate digital signature, but the second state ( newyork ) has adopted a more common way in technology, in other words, the later legislation changed from concentrating on the concrete technolngy of digital signature to more widely regulating the common technology of all kinds of electroncc signature

    在美國,電子名立始於1995年的猶他州,該州案只限於調整使密碼的數字名。之後,其他州也開始了數字名立活動,但第二個進行此種立的州(即紐約)採取一種技術上更為一般的方式,換言之,其後的立從「集中於數字名的具體技術律轉向廣泛調整各種電子名的一般技術律。 」
  4. They drew lots to decide who should begin

    他們的方來決定誰先開始。
  5. In the rest of this article, we will walk through the xml digital signature specification and the usage of several different bouncy castle key generators, encoding engines, digital signature singers, and a digest engine

    在本文的其餘部分,我們將簡略地論述xml數字名規范以及幾個不同bouncy castle密鑰生成器、編碼引擎、數字名引擎和摘要引擎的
  6. The resident that leases mutual building is to be torn open the use person of change building, enjoy following right : ( 1 ) have the right that signs the contract that tear open change lawfully ; ( 2 ) have the right that receives finding a place for lawfully ; ( 3 ) because tear open change, have and remove, the requirement tears open change person to pay move the right of accessorial cost ; ( 4 ) have the transition in the regulation period inside, have the right that asks the person that tear open change pays to find a place for allowance is expended temporarily

    租住共有房屋的住戶是被拆遷房屋的使人,享有下列權利: ( 1 )有依訂拆遷合同的權利; ( 2 )有依得到安置的權利; ( 3 )有因拆遷而搬遷的,有要求拆遷人支付搬家補助費的權利; ( 4 )有在規定的過渡期內,有要求拆遷人支付臨時安置補助費的權利。
  7. You can find out how to get all the avatars with matching signatures coming along

    在這兒你除了可找到如何取得秘密戶頭像,還有名語讓你配成一套。
  8. At last, the implementation of a wlan authentication system based on the 802. 1x, in which eap - tls certification protocol and the ellipse key algorithm are used, is given. the authentication system includes applicant system in client, authentication system and servers using radius. in the implementation, the ecc signature algorithm is used to create certification, and the ecmqv is used in key negotiation stage

    最後文章結合eap - tls認證協議以及橢圓曲線密鑰演算實現了802 . 1x無線局域網認證系統,包括了客戶端申請者系統、認證者系統以及radius認證服務器系統,在實現過程中採ecc名演算來生成證書,密鑰協商階段採ecmqv密鑰協商協議。
  9. Button allows you to access a complete ups p. o. d., including full delivery name, an image of the recipient s signature image, and address information, which is not available when using any other method

    ups收追蹤, pod按鈕可讓您存取其他方取得的完整upspod ,包括派送全名與地址資訊。
  10. Minimum wage standard, it is to show laborer is in inside legal working hours or the working hours that the labor contract that signs lawfully agrees below the premise that provided normal work, the lowermost work reward that unit of choose and employ persons should pay lawfully

    最低工資標準,是指勞動者在定工作時間或依訂的勞動合同約定的工作時間內提供了正常勞動的前提下,人單位依應支付的最低勞動報酬。
  11. According to article 155 of the basic law, the hksar government may conclude visa abolition agreements with foreign regions. now you do not need a visa when going to many countries on a hksar passport

    根據《基本》第1 5 5條,香港特區政府可以與其他地區制訂互免證協議!現在持特區護照前往很多國家都不證的!
  12. The ejb advocate shows how to design method signatures to minimize the " chattiness " between layers and get the most out of your ejbs

    Ejb倡導者說明了如何設計方名來最小化層之間的"隔閡" ,並最大程度的利您的ejb 。
  13. If uses xml signature, this header should embody the message defined of xml signature, which includes signature methods, using key and signature value

    如果使xml名,此標頭可以包含由xml名定義的信息,其中包括消息的名方、使的密鑰以及得出的名值。
  14. The purposes of the certificate are considered valid if the certificate has no key usage or if the key usage supports digital signature or nonrepudiation

    如果證書沒有密鑰或如果密鑰支持數字名或認可,則認為該證書的途有效。
  15. Article 27 the power supply party and utilization party shall, on the basis of the principles of equality, voluntary participation and reaching unanimity through consultation, sign the power supply and utilization contract to stipulate the rights and obligations of both parties in line with the regulation of power supply and utilization drawn up by the state council

    第二十七條電力供應與使雙方應當根據平等自願、協商一致的原則,按照國務院制定的電力供應與使訂供電合同,確定雙方的權利和義務。
  16. The name of the drug, its specifications, the producing unit, approval number, product batch number, principal ingredients, diseases for which it is indicated, manner of use, side - effects and points to note must be clearly set out on the label or in the instruction booklet

    或說明書上必須註明藥品的品名、規格、生產企業、批準文號、產品批號、主要成份、適應癥、量、禁忌、不良反應和注意事項。
  17. Signing occurs by using a public key algorithm, usually the rsa algorithm, which is a special type of cryptography consisting of two different but mathematically related keys : a private key for signing code and a public key for verifying the signed code

    公鑰演算(通常是rsa演算)來進行名,公鑰演算是一種特殊類型的密碼術,它包含兩個不同的但在數學方面又是相關的密鑰:一個私鑰(署代碼)和一個公鑰(於驗證經過名的代碼) 。
  18. Changing the wsdl would cause all of the applications that rely on a specific method signature to break and a lot of support lines to ring

    改變wsdl將會導致所有依賴于特定方名的應程序被破壞,而且許多支持行產生問題。
  19. Is used only in custom modifiers of method signatures to indicate that the field it marks is volatile

    於方名的自定義修飾符以指示它標記的欄位是易失的。
  20. The code examples in this tutorial will not compile or run on jvms prior to 5. 0, and many of the code examples use generics, enhanced - for, or other new language features from jdk 5. 0

    (對于那些不熟悉泛型的戶,您只要在第一次閱讀本教程時忽略類中尖括號內的所有東西和方名即可。
分享友人