通用密碼機 的英文怎麼說

中文拼音 [tōngyòng]
通用密碼機 英文
general purpose cipher set
  • : 通量詞(用於動作)
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : machineengine
  • 通用 : be in common use; be current; apply or be used universally
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證構,第五章介紹了信息加技術以及各國立法對技術的進出口及使的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. Fluid - inclusion is only mark of fossil ore - forming fluid and is the key that can understand the mechanism of ore - forming processes. by means of fluid - inclusions methods, we can acquire some important information of physics and chemistry in ore - forming processes, retrace the locus of ore - forming processes and clarify the mechanism of ore - forming processes

    流體包裹體是成礦流體留下的唯一痕跡和解開成礦流體以及成礦作理的過流體包裹體研究,可以獲得成礦作過程中許多重要的物理化學參數,重塑成礦作演化的軌跡,闡明成礦作理。
  3. " although the simplest model for a cn affecting gene actiity is where the ariant is a deletion of a gene or part of a gene, we found examples where actiity is affected from a distance, " commented barbara stranger, first author and post - doctoral fellow at the wellcome trust sanger institute. " this may occur when the cn reduces the effectieness of a region that works to switch the genes on or off

    變異拷貝數制能過改變特定基因的「劑量」 (即復制后的拷貝數量) ,藉助于裂解某個包含后續可翻譯成蛋白質的基因的活性片斷或藉助于降解控制基因活性即類似開/關及在我們基因組中的調整開關的基因組中具有調控作的基因片斷來影響基因活性。
  4. [ background ] the conserved, universal code defines the primary amino acid sequences of all proteins of all organisms

    [背景]保守、的遺傳決定了所有有體中所有蛋白質的氨基酸序列。
  5. Phishing : a type of technology - based social engineering ploy in which computers users are directed, usually via e - mail, to a web site that purports to be that of a bank, loan company, credit card company, e - commerce merchant, governmental agency, or other site that requires users to enter confidential information, such as account passwords, account numbers, social security numbers, and other personal data that is collected and used for identity theft

    網路釣魚:基於社會工程學的技術,過電子郵件,據稱是銀行,貸款公司,信卡公司,電子商務商,政府代理的網站,或其他要求戶輸入信息的站點,諸如帳戶、帳戶號、社會保險號的信息被收集並於身份偷竊。
  6. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群信系統加制的研究,首先介紹了數字集群信系統的安全保制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其鑰的選和管理,特別介紹了端到端加;然後介紹了幾種常的加演算法,過分析其優劣,提出了端到端加的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群信系統加方案的設計,其具體過程為將經過數字信號送入加器里,和以idea加演算法為基礎設計的流發生器( ksg )產生的序列進行加解運算,並且研究了此加過程的同步問題。
  7. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調制的數字語音保信系統的方案,利邏輯映射產生混沌調制序列,以該序列作為對數字語音進行加處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的道使不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使文完全隨化。
  8. Quantum communication is a rising interdisciplinary field which combines classical communication and quantum mechanics. quantum key distribution protocol makes use of single photon of quanta - randomicity to achieve unconditioned security key distribution, especially which is the realism significance of research way in quantum information at present

    量子術是經典信和量子物理相結合的一門新興交叉科學。量子鑰分配( qkd )協議利單光子固有的量子隨性實現具有無條件安全性的鑰分配,是目前量子信息領域中特別具有現實意義的研究方向。
  9. Typically, host service certificates are not passphrase protected

    常,主/服務證書都不使進行保護。
  10. Then we introduce pulse position modulation ( ppm ) using pn code and analysis its multi - access performance, system capacity and power spectrum density. on the basis of those analyses, we study the pulse shape and the anti - jamming ability of the system. at last, multiple access with pseudochaotic time hopping is introduce

    本文首先闡述了uwb脈沖信系統的基本原理,重點介紹了偽隨跳時的ppm (脈沖位置調制)調制,分析了他的多址性能、系統容量和功率譜度,在此基礎上研究了改進性能的發射信號形狀和系統抗干擾能力,最後介紹了偽混沌跳時的多址方式。
  11. Later it came to include activities more precisely termed " web commerce " - - the purchase of goods and services over the world wide web via secure servers ( note https, a special server protocol which encrypts confidential ordering data for customer protection ) with e - shopping carts and with electronic pay services, like credit card payment authorizations

    后來電子商務包括的活動更加精確地被命名為"網商務" - -物品購買和服務在萬維網過安全服務器(一個特別的協議, https ,為保護顧客而編成的,它有著很的數據)這個服務器還有電子購物手推車和電子支付的服務,就好像信卡被授權支付一樣
  12. Linux has been more and more widely used today, but the secure degree of linux is low, so in this paper, we produce a linux - compatible secure operating system, named slinux. its design object is in accordance with the requirements of the fourth level, i. e. structured protection level, of gb17859. for this purpose, we introduce such mechanism, as identification & authentication, mac, least privilege manage, trusted path, password management. object reuse, covert and channel analysis. furthermore, we have some innovation, introduce the mechanism of network security and audit

    本論文的研究目的是對linux進行安全增強,設計一個新的安全操作系統,即slinux安全操作系統,其設計目標是滿足gb17859第四級《結構化保護級》的需求,為此我們在原有linux操作系統的基礎上引入了標識與鑒別制, mac制,最小特權管理制,可信制,處理制,客體重制以及隱道分析制,同時還進行了創新,引入了網路安全保護制和審計制。
  13. Three common methods being adopted by banks in hong kong are digital certificate, security token - based one - time password and sms - based one - time password

    現時本港銀行最常的方法有三種:電子證書由保安顯示器發出只一次的,以及過手簡訊發出只一次的
  14. The three common types of two - factor authentication being adopted by banks in hong kong are digital certificate, sms - based one - time password and security token - based one - time password

    本港銀行最常採的雙重認證方法有三種:電子證書過手簡訊發出只一次的,以及由保安顯示器發出只一次的
  15. A short message service - based one - time password generated by the bank and sent to a customers mobile phone for additional identity authentication for example, to confirm a high - risk transaction

    過手簡訊發出只一次的銀行向客戶的手提電話發出只可使一次的簡訊,作為額外核證之,以便確認高風險交易等。
  16. For the positive real function image encoded by double random - phase, the first random - phase mask placed in the blank can not serve as the key when the decrypted image is detected by intensity detector in the decrypting process

    摘要正的實函數圖像過雙隨相位編以後,在解過程中,光強探測器接收解圖像時,位於空域的第1塊相位掩模不起匙作
  17. Ip security protocol ( ipsec ) provides identity authentication and high strength data encryption for traffic at the ip layer to protect the integrality and confidentiality of the packets. ipsec ensure the security of ip layer and upper layer protocol, such as tcp, udp and so on

    Ip安全( ipsec )協議使強的認證和加演算法來保護ip信的完整性和性,為ip及上層協議(如tcp和udp )提供安全保證。
  18. The account that silver agreement a network signs before you can take this person id to mix now arrives open an account to deal with net silver to cancel when ground site, website of remount collection construction bank is registered afresh enlightened, if want to use, turn the function pays on zhang remittance or net, take account of this person id, deposit, mobile phone to arrive even open an account to nod conduction net silver to sign when earth mat about, after the autograph is made an appointment with the setting logins to trade inside 7 days it is ok that the password downloads certificate

    你現在可以帶上本人身份證和之前簽約網銀的賬戶到開戶當地網點辦理網銀注銷,再登錄建行網站重新注冊開,假如要使轉賬匯款或網上支付功能,還要帶上本人身份證、儲蓄賬戶、手到開戶當地網點辦理網銀簽約,簽約后7日內登錄設置交易並下載證書就可以了。
  19. The thesis introduces the principle and development of applied ciyptography, encr, ption and digital signature. it also introduces the thought and technology of the object - oriented methodology. with the development of the object - oriented technology and distribution application, object - oriented communication has become popular

    本文論述了應學以及數據加和數字簽名( digitalsignature )的原理及發展;同時介紹了面向對象方法學的思想和技術,指出隨著面向對象技術和分散式應技術的發展,面向對象的制正變得越來越流行,安全對象的提出為此種制提供了必要的安全保證。
  20. As an incentive to taxpayers to register for a password and experience the advantages of filing tax return online, users who complete and submit the tele tax registration form to the ird before april 15 will be eligible to enter a lucky draw to win a panasonic gd88 handset with a built - in camera

    為鼓勵市民登記及使網上報稅服務,凡於即日至4月15日期間,填妥電話稅務登記表格及交回稅務局,均可參加抽獎,有會贏得內置相功能的潮流手panasonic gd88 。
分享友人