隱密性 的英文怎麼說

中文拼音 [yǐnxìng]
隱密性 英文
encryption
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 隱密 : privacy
  1. In section one, by using fice scheme and time - gcm, a model of trace gases and oh airglow affected by gravity wave is set up, then the propagation of nonlinear gravity wave and the effect on trace gases and oh airglow are analyzed. the result shows gravity wave excited by tropospause forcing can propagate stably to the mesosphere through the stratosphere so that energy and momentum can be transferred from one region to another. in this process, gravity wave undergoes growth, overturning, convection and breaking

    在第一部分的工作中,利用全歐拉格式和全球熱層-電離層-中間層-電動力學環流耦合模式( time - gcm ) ,對重力波的非線傳播及其在傳播過程中對中高層大氣中氧族和氫族成分和與之切相關的oh氣輝輻射的影響進行了數值模擬,結果表明,從對流層向上傳播的重力波經歷了產生、發展、飽和、對流產生直至破碎的非線演化,大氣的非等溫結構加速了重力波在中層頂區的破碎,重力波的非線傳播是小尺度對流和湍流產生的一個重要的源。
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠、交易者身份的真實、數據電訊的機和完整、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴
  3. Staphylinidae is one of the largest family in coleoptera, they occupy a wide variety of habitats and have a wide range of food - habits. they are essentially carnivorous ( insect feeder ), but some groups have become evolved as mycophagous, coprophagous, coprophagous, carpophagous, pollinophagous and so on. some species have adapted to a parasitism of mammals

    翅蟲是一類廣泛分佈於農田、森林和山區的鞘翅目昆蟲,它們生境多樣,有的為肉食種類,是捕食農林害蟲的重要天敵,也有藥用種類和衛生害蟲,還有取食動植物有機殘體、促進自然界物質循環、保持生態平衡的種類,與人類的關系切,是一類不可忽視的自然資源。
  4. It postulates privacy, open and honest communication.

    它要求具有隱密性的,開放而誠實的交際。
  5. Due to the high level of secrecy of the saudi arabian justice system, trials are invariably held behind closed doors

    由於沙國司法體系極高的隱密性,審判總是不對外公開的。
  6. Mapping this policy, xml encryption facilitates the concealment of payment information in the sales department and its disclosure in the accounts department

    )通過映射這個策略, xml加提高了銷售部門支付信息的隱密性,也幫助了會計部門對此信息的解
  7. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒非常好的參數,因而選擇色度dc系數作為水印信息載體,同時,採用可變的步長選擇部分系數,保證了水印的;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯得到提高;此外,為了提高水印信息的安全,在嵌入水印信息時,根據用戶輸入的id號和碼,利用本文構造的混沌系統產生的混沌序列對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽隨機序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。
  8. In such way, securegis confirms the authenticity of service information and ensures the privacy of the private grid service in a certain extent

    這樣,從一定程度上確保了注冊服務信息的真實,而且也確保了私有網格服務和機網格服務的
  9. Any information or materials or idea you transmit to or post on golden sum web will be regarded as non - confidential and non - proprietary and treated in accordance with privacy guideline

    任何由您傳送或發表于本網站上的資料、文件及想法,將被視為不具保且非專屬財產並依私權聲明之相關原則處理。
  10. Consequently, it is strongly recommended that freedom in communication be put into the civil right protection system and be paralleled with secrecy in communication

    認為通訊秘具有特定、秘、價值和合法的特徵,是私權的下位概念,法律對私權的保護同樣適用對通訊秘的保護。
  11. As a matter of local company law the company must maintain a registered office address within bvi and must also appoint a bvi resident as registered agent

    在英屬處女島登記設立的境外公司,享有高度的隱密性,公司股東名冊完全不對外公開。
  12. The results suggest : good invisibility can be achieved, and the hiding capacity of information is large

    實驗結果表明,該寫演算法具有較好的,以及較大的藏容量。
  13. Even where it is not deliberately institutionalized as esoteric, it remains “ secret ” by virtue of its unintelligibility to the general populace

    即令沒有刻意的制度化使之具」隱密性,也會因常人難以理解而成為「秘」 。
  14. This is a contradiction to save a gradually longer key in a limit room. we proposed a solution to combine the elliptic curve cryptosystem and digital - image - hiding, the advantage of ecc ’ s shorter key at the same security level will solve the problem in some extent, at the same time make the transfer of document secure and also cryptic

    通過對現有商務文檔安全傳輸策略的研究和對比后,本文提出將橢圓曲線碼體制與圖像藏結合,利用ecc在相同安全強度下鑰長度短的特點在一定程度上解決這一矛盾,同時達到安全的結合,能在一定程度上解決第三方的攻擊。
  15. In the first chapter in this dissertation, the possibility and certainty of traditional letter of credit electronicsization have been discussed. in the second chapter, first of all simply introduced the model that electronic letter of credit preceeds. then according to this model, put forward the probably existing safe trouble : the systematic reliability ; secrecy and completeness of data telecommunications ; the social status authenticity of business person and the nature that business action cannot be denied ; the legal effectiveness of the data telecommunications as evidence

    本文第一章論述了傳統信用證電子化的可能與必然;第二章首先簡單介紹了現在國際上電子信用證運做的模式,然後根據此運做模式提出可能存在的安全患;系統的可靠;數據電訊的機和完整;交易者身份的真實及交易行為的不可抵賴;數據電訊作為證據的合法有效
  16. Insulation, noise, air tightness : no system - wide metal materials, the complete elimination of the dripping cold bridges hidden dangers

    保溫、隔音、氣:全系統無金屬材料,徹底杜絕了滴水冷橋等患。
  17. The “ tunnel thru the air ” is mysterious and contains a valuable secret, clothed in veiled language. ” these are mr

    《空中隧道》是神秘的,它帶有一個重要的秘,掩蓋在的語言中。
  18. This bamboo not only brings tranquility to the austin center but also offers privacy by blocking our neighbors view

    這些竹子不但為奧斯汀小中心帶來寧靜安詳的氣氛,同時也阻隔了鄰居的視線,提供絕佳的隱密性
  19. The keys are used for encryption and decrypting of messages to ensure privacy and confidentiality in transmissions across the internet

    這兩個鑰用來對消息進行加和解,以確保在因特網上傳輸時的隱密性和機
  20. We deeply studied the requirement of the security email and the procedure of the transportation of emails over the network, and give out during the period that we worked on this subject, we first studied the status of the current internet email system and the requirement of security email in detail, then studied every period that the emails exist on the internet, the threats facing them, and the imaginable applications of the security email in real life. we have read many materials those relate to the security of information transporting on the internet, and we have refer to many network information security modules and experiences of the other email service providers. based on all of these, we give out a whole solution from the client side to the server side, we not only provide the confidential service for the email users, but also provide the signature, anti - deny and anti - impose security services

    在課題開發的過程中,我們首先深入詳細地調研了整個郵件系統的現狀以及對郵件安全的需求,然後從網路信息安全的角度,對郵件傳輸的各個環節、每個環節所面臨的安全患、以及安全郵件在現實生活中可能的應用進行了深入的研究,我們先後查閱了與網路信息安全郵件相關的大量文獻,參考了許多現有的網路信息安全模型,並且參照了現有其它郵件服務提供商的web安全郵件的一些安全做法,分析了它們系統的優缺點;在此基礎上,結合中國的實際情況,我們提出了web安全郵件系統的從客戶端到服務器端完整的解決方案,方案中不僅為用戶提供了郵件保服務,還提供了郵件簽名,防抵賴,防篡改等安全業務,滿足了人們對郵件安全的迫切需要。
分享友人