電子密碼機 的英文怎麼說
中文拼音 [diànzimìmǎjī]
電子密碼機
英文
electronic cipher machine- 電 : Ⅰ名詞1 (有電荷存在和電荷變化的現象) electricity 2 (電報) telegram; cable Ⅱ動詞1 (觸電) give...
- 子 : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 機 : machineengine
- 電子 : [物理學] [電學] electron
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。He inserted his smart card in the payer slot of his " portamento ", as the palm - sized debit credit machine was called, and punched in his pin to agree to have the amount of the bill debited from his card and credited to the supermarket s card in the payee slot
他把聰明卡插入他自己的輕便錢箱手掌大小的電子收支機的付款槽,輸入個人密碼,表示同意自他的聰明卡扣除帳單所示款額,並把款項支入已插在收款槽里超級市場的聰明卡。Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management
該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。Like direct printing from digital cameras, long format printing for banners, e - mail printing and secure printing
如從數碼相機直接列印,橫幅列印,電子郵件列印和機密列印等。Article 22 a personnel of a releasing authority shall log in the release system by his or her own electronic key, user name and password and in strict accordance with the online operation rules
第二十二條發證機構工作人員應嚴格遵守網上操作規程,使用本人的電子鑰匙及用戶名和密碼登錄發證系統。With the e - portal, clients may access their password protected e & m engineering facilities database in emstf maintained venues, anywhere, anytime. they can also send us an email anytime requesting a quote for specific services, reporting faults or asking questions
有了電子網站,客戶可利用密碼,隨時隨地進入營運基金服務場地的機電工程設施數據庫、發送電郵要求我們就某服務報價、報告故障或提出查詢。Phishing : a type of technology - based social engineering ploy in which computers users are directed, usually via e - mail, to a web site that purports to be that of a bank, loan company, credit card company, e - commerce merchant, governmental agency, or other site that requires users to enter confidential information, such as account passwords, account numbers, social security numbers, and other personal data that is collected and used for identity theft
網路釣魚:基於社會工程學的技術,通常通過電子郵件,據稱是銀行,貸款公司,信用卡公司,電子商務商,政府代理的網站,或其他要求用戶輸入機密信息的站點,諸如帳戶密碼、帳戶號、社會保險號的機密信息被收集並用於身份偷竊。First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system
論文首先簡單介紹了秘密密鑰密碼體制、公開密鑰密碼體制、 hash函數以及基於x . 509的公鑰證書等基礎密碼學理論;其次,論文描述了幾種典型的證書體系和鑒別機制;最後給出了一個電子政務證書管理系統的具體實現例子。The bank will also issue a personal identification number ( pin ) to the cardholder for the purpose of obtaining cash advances from the designated atm networks andor, subject to the bank s approval, performing transactions by electronic means at designated atms or point of sale terminals. the use of the atm facilities is subject to the bank s terms and conditions governing the use of atm cards, a copy of which is available upon request
本銀行亦授予持卡人一私人密碼,供其于指定之自動櫃員機網路作現金貸款,及或經本銀行同意后,持卡人可安排以其信用卡于指定之自動櫃員機或一般銷售點終端機進行電子交易,而應用此等自動櫃員機服務將受到本銀行之自動櫃員機卡使用規則約束,此條款可於隨時向本銀行索閱。The bank will also issue a personal identification number ( pin ) to the cardholder for the purpose of obtaining cash advances from the designated atm networks andor, subject to the bank s approval, performing transactions by electronic means at designated atms or point of sale terminals. the use of the atm facilities is subject to the bank s terms and conditions governing the use of atm cards, a copy of which is available upon request. at no time and under no circumstances shall the personal identification number be disclosed to any other person
本銀行亦授予持卡人一私人密碼,供其于指定之自動櫃員機網路作現金貸款,及或經本銀行同意后,持卡人可安排以其shine卡于指定之自動櫃員機或一般銷售點終端機進行電子交易,而應用此等自動櫃員機服務將受到本銀行之自動櫃員機卡使用規則約束,此條款可於隨時向本銀行索閱。Later it came to include activities more precisely termed " web commerce " - - the purchase of goods and services over the world wide web via secure servers ( note https, a special server protocol which encrypts confidential ordering data for customer protection ) with e - shopping carts and with electronic pay services, like credit card payment authorizations
后來電子商務包括的活動更加精確地被命名為"網商務" - -物品購買和服務在萬維網通過安全服務器(一個特別的協議, https ,為保護顧客而編成的密碼機,它有著很機密的數據)這個服務器還有電子購物手推車和電子支付的服務,就好像信用卡被授權支付一樣Three common methods being adopted by banks in hong kong are digital certificate, security token - based one - time password and sms - based one - time password
現時本港銀行最常用的方法有三種:電子證書由保安顯示器發出只用一次的密碼,以及通過手機簡訊發出只用一次的密碼。The three common types of two - factor authentication being adopted by banks in hong kong are digital certificate, sms - based one - time password and security token - based one - time password
本港銀行最常採用的雙重認證方法有三種:電子證書通過手機簡訊發出只用一次的密碼,以及由保安顯示器發出只用一次的密碼。Jpeg2000 based on wavelet transform is a new image compress standard of many excellent characters. iamge compress algorithmic can run more efficiently on dsp. the success of techinique research, including entire digital camera product and the key technique, and the industrialization of digital camera industry can give our own knowledge property right in digital camera technique, and then enhance the function of digital camera, upgrade its ability to compete
國內數碼相機相關技術的研發起步較晚,其主要原因是數碼相機涉及到眾多尖端的傳感器技術、微電子技術、精密光學技術、微機械控制技術、數字信號處理器技術和電腦多媒體技術,而且跟這些技術相關聯的光學、集成電路、微機械控制的加工工藝更是國內的薄弱環節,從而制約了國內數碼相機產業的形成和發展。You need this root key to validate a mobile e - cert certificate issued by of hongkong post mobile e - cert root ca
你須使用這公開密碼匙核對由香港郵政流動電子核證核證機關發出的證書。The design of a electronic trick lock based on single chip device
一種基於單片機的電子密碼鎖的設計Ic has deciphered the department and gathered one batch and engaged in researching and developing and researching and developing it elite for many years with the soft project in microelectric technique, build up to core of ic all kinds of, order code, etc. have at fingertips, can revise according to the customer, thus the one that realized to original machine function was augmented deleted
Ic解密部聚集了一批從事微電子技術研發和軟體工程研發多年的it界精英,對各類ic的核心架構指令代碼等了如指掌,可將晶元內代碼完整導出,某些代碼甚至可以依據客戶要求進行修改,從而實現對原機功能的增補刪減。Taking steps to ensure that copies of id cards transmitted are received only by the intended recipients by using for example, encryption, confidential mail boxes, access passwords or dedicated fax machines for receiving confidential material, etc
採取步驟以確保傳送出去的身份證副本只由擬接收者收取,例如使用加密法、機密電子郵箱、查閱密碼或用指定的傳真機收取機密資料等措施。The research in software radio is not more than ten years, but has made a great many fruits, but it is too little to set up an integrated theory system, and software radio includes many areas such as modern communication system ( which includes modem source / channel encoding and decoding, equalization, encrypt and decrypt and so on ), wideband antenna theory, digital signal process, microelectronics, computer and so on. this thesis mainly does research for modem in modem communication
軟體無線電經過不到10年的研究,盡管取得了很多成果,但是對于建立一套完整的理論體系來說,還遠遠不夠,況且軟體無線電涉及的領域多、面廣、發展快,如現代通信理論(含調制解調、信源通道編解碼、均衡、加密解密等) 、寬帶天線理論、數字信號處理、微電子、計算機等。We have enacted the electronic transactions ordinance which follows the united nations commission on international trade law model law on e - commerce. the eto accords digital signatures and electronic records the same legal status as that of their paper - based counterparts. we have also developed a local public key infrastructure with the establishment of certification authority to support the conduct of secure electronic transactions
參考聯合國國際貿易法例委員會的電子商貿法例範本后,我們制定電子交易條例,令數碼簽署和電子紀錄跟書面簽署和文件紀錄享有同等的法律地位我們又建立本地的公開密碼匙基建設施,設立核證機關以確保電子交易在穩妥可靠的環境下進行。分享友人