電子密碼本 的英文怎麼說

中文拼音 [diànziběn]
電子密碼本 英文
ecb electronic code book
  • : Ⅰ名詞1 (有電荷存在和電荷變化的現象) electricity 2 (電報) telegram; cable Ⅱ動詞1 (觸電) give...
  • : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  • 電子 : [物理學] [電學] electron
  1. Already please join members to inscroll after being inserted the e - mail and password by the right, if you whether new customer please is it continue button register to press, you is it fill in basic materials of you join the members of this hall to need only

    已經加入會員請由右邊填入郵件及后登入,如果您是新客戶請您按繼續鈕注冊,您只需填寫您的基資料即可加入館會員
  2. Stamper and signature is very important in the affair of tradition work in government and enterprise. this article according to the characteristic of traditional signature and stamper, combinic the demands of signature and seal in e - government - affair work information system, inosculates the technology of middleware and e - government - affair security, makes use of object oriented and component technology, integrates correlation knowledge of compositive cryptogram, pki, seal digital image, activex etc, studies and achieves digital e - signature - seal middleware based on web which is used in internet / intranet environment

    印章和簽名在傳統的政府辦公和企業事務處理中起著十分重要的作用。文根據傳統簽名、蓋章的特點,結合政務辦公信息系統中的蓋章簽名需求,把政務安全技術和中間件技術相融合,利用面向對象和組件技術,集成學、 pki 、印章數字圖像、 activex控制項等相關知識,研究並實現了一個應用於internet intranet環境中的基於web的簽章中間件。
  3. The electronic codebook

    電子密碼本
  4. The department will not be liable for any divulgence of those passwords or pin or loss or damage arising from the e - holder s failure to comply with the above conditions or the conditions for the use of any digital certificates in connection with any electronic applications made in the e - accounts

    署不會對因該等或個人辨識( pin )的披露,或帳戶持有人未能遵守上述各項條件或使用數證書的使用條件以辦理申請,而引起的任何損失或損害承擔責任。
  5. Article 22 a personnel of a releasing authority shall log in the release system by his or her own electronic key, user name and password and in strict accordance with the online operation rules

    第二十二條發證機構工作人員應嚴格遵守網上操作規程,使用人的鑰匙及用戶名和登錄發證系統。
  6. In advances in cryptology - crypto 91, lncs 547, springer - verlag, brighton, uk, april 1991, pp. 72 - 77. 8 sadeghiyan b, pieprzyk j. on the necessary and sufficient conditions for the construction of super pseudorandom permutations

    Camellia是歐洲大計劃nessie的最終獲勝者,並且是日政府選定的用於政務的演算法,它採用的整體結構是feistel結構。
  7. I hereby confirm that i have received the private key relating to the certificate details above

    人確認已接收?有關以上詳?證書之私人匙。
  8. In sending the saved copy to his her client, the auditor should not encrypt the supplementary form with the e - form core program. this is because the e - form core program uses the ird s public key in performing the encryption. without the necessary key, the auditor or the auditor s client cannot decrypt the encrypted copy

    核數師提交報稅表附表儲存給其客戶時,無須以表格應用程式把報稅表附表加,因為該表格應用程式是使用稅務局的公開匙加的,如果沒有所須的解匙,核數師或其客戶將無法把已加的報稅表附表解
  9. The bank will also issue a personal identification number ( pin ) to the cardholder for the purpose of obtaining cash advances from the designated atm networks andor, subject to the bank s approval, performing transactions by electronic means at designated atms or point of sale terminals. the use of the atm facilities is subject to the bank s terms and conditions governing the use of atm cards, a copy of which is available upon request

    銀行亦授予持卡人一私人,供其于指定之自動櫃員機網路作現金貸款,及或經銀行同意后,持卡人可安排以其信用卡于指定之自動櫃員機或一般銷售點終端機進行交易,而應用此等自動櫃員機服務將受到銀行之自動櫃員機卡使用規則約束,此條款可於隨時向銀行索閱。
  10. The bank will also issue a personal identification number ( pin ) to the cardholder for the purpose of obtaining cash advances from the designated atm networks andor, subject to the bank s approval, performing transactions by electronic means at designated atms or point of sale terminals. the use of the atm facilities is subject to the bank s terms and conditions governing the use of atm cards, a copy of which is available upon request. at no time and under no circumstances shall the personal identification number be disclosed to any other person

    銀行亦授予持卡人一私人,供其于指定之自動櫃員機網路作現金貸款,及或經銀行同意后,持卡人可安排以其shine卡于指定之自動櫃員機或一般銷售點終端機進行交易,而應用此等自動櫃員機服務將受到銀行之自動櫃員機卡使用規則約束,此條款可於隨時向銀行索閱。
  11. If you are not careful to forget to land the secret code, please send the e - mail for this station of janitors

    如果您不慎忘記了登陸,請發郵件給站管理員。
  12. In this paper, three kinds of logic languages used in analyzing cryptographic protocols are primarily introduced, and studied in their advantages and weakness. combing the advantages, a new formal logic language is put forward to analyze electronic commerce protocols

    文中,作者主要介紹了用於分析協議的三種邏輯語言,研究了它們的優缺點,然後結合其優點,提出了一種新的用於分析商務協議的形式化邏輯語言。
  13. Three common methods being adopted by banks in hong kong are digital certificate, security token - based one - time password and sms - based one - time password

    現時港銀行最常用的方法有三種:證書由保安顯示器發出只用一次的,以及通過手機簡訊發出只用一次的
  14. The three common types of two - factor authentication being adopted by banks in hong kong are digital certificate, sms - based one - time password and security token - based one - time password

    港銀行最常採用的雙重認證方法有三種:證書通過手機簡訊發出只用一次的,以及由保安顯示器發出只用一次的
  15. You have to apply for the e - tax password again if you wish to use our electronic services

    屆時,你須要重新申請稅務易通行,才能使用局的服務。
  16. Two - factor authentication is a security measure that requires two forms of authentication to access a system. for e - cert on smart id card, the two forms are ( i ) smart id card ( something you have ) ; and ( ii ) e - cert password ( something you know )

    在雙重認證下,用戶須通過雙重認證才可進入系統。智能身份證的( i )證件身(用戶擁有者)及( ii )證書(用戶知悉者) ,滿足了雙重認證的規定。
  17. Your order has been successfully processed. login pin for tpo will be sent to your designated email address within 5 working days

    局已接納閣下之訂購,網上托? ?習之登入將於五個工作天內透過郵件發放予閣下。
  18. This article will discuss the application research of the cryptology algorithm in the model of the secure electronic transaction based on the analysis of the model of the secure electronic transaction

    文在分析了安全交易模型的基礎上,討論了演算法在安全交易模型中的應用問題。
  19. This paper presents one e - commerce security model which is based on modern cryptography, protocols and internet open trade protocol model. this paper also presents a pki - based security model of intranet to proffer effective security mechanisms including authentication, supervisal, confidentiality, access control, and non - repudiation network service

    文深入探討了b2b商務中的安全平臺構架,研究了在internet上,利用現代學技術和學協議,在先進的開放式商務模型基礎上實現安全的商務活動的可行性和實現的某些細節。
  20. Selection of secure elliptic curve, implementation of ecc and its use in e - cash system. the work the author has done is : 1

    文中,作者主要介紹了橢圓曲線體制,安全橢圓曲線的選取,橢圓曲線體制的實現及其在現金體制中的應用。
分享友人