電子密碼機 的英文怎麼說

中文拼音 [diànzi]
電子密碼機 英文
electronic cipher machine
  • : Ⅰ名詞1 (有電荷存在和電荷變化的現象) electricity 2 (電報) telegram; cable Ⅱ動詞1 (觸電) give...
  • : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : machineengine
  • 電子 : [物理學] [電學] electron
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據訊的性和完整性、數據訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了提單的安全認證構,第五章介紹了信息加技術以及各國立法對技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據訊制度產生的必然性;第八章通過對各國立法對證據的法律效力的規定,論述了對交易至關重要的數據訊的不可抵賴性。
  2. He inserted his smart card in the payer slot of his " portamento ", as the palm - sized debit credit machine was called, and punched in his pin to agree to have the amount of the bill debited from his card and credited to the supermarket s card in the payee slot

    他把聰明卡插入他自己的輕便錢箱手掌大小的收支的付款槽,輸入個人,表示同意自他的聰明卡扣除帳單所示款額,並把款項支入已插在收款槽里超級市場的聰明卡。
  3. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對郵件服務系統中存在的安全隱患,基於對目前國內外郵件安全技術的分析研究,立足於現有軍事計算網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、管理的應用需求等進行了詳細的分析和設計。
  4. Like direct printing from digital cameras, long format printing for banners, e - mail printing and secure printing

    如從數直接列印,橫幅列印,郵件列印和列印等。
  5. Article 22 a personnel of a releasing authority shall log in the release system by his or her own electronic key, user name and password and in strict accordance with the online operation rules

    第二十二條發證構工作人員應嚴格遵守網上操作規程,使用本人的鑰匙及用戶名和登錄發證系統。
  6. With the e - portal, clients may access their password protected e & m engineering facilities database in emstf maintained venues, anywhere, anytime. they can also send us an email anytime requesting a quote for specific services, reporting faults or asking questions

    有了網站,客戶可利用,隨時隨地進入營運基金服務場地的工程設施數據庫、發送郵要求我們就某服務報價、報告故障或提出查詢。
  7. Phishing : a type of technology - based social engineering ploy in which computers users are directed, usually via e - mail, to a web site that purports to be that of a bank, loan company, credit card company, e - commerce merchant, governmental agency, or other site that requires users to enter confidential information, such as account passwords, account numbers, social security numbers, and other personal data that is collected and used for identity theft

    網路釣魚:基於社會工程學的技術,通常通過郵件,據稱是銀行,貸款公司,信用卡公司,商務商,政府代理的網站,或其他要求用戶輸入信息的站點,諸如帳戶、帳戶號、社會保險號的信息被收集並用於身份偷竊。
  8. First , we introduce some basic cryptography theories such as secret - key cryptography , public - key cryptography and hash algorithm. second , we give the concepts of x. 509 certificate, crl ( certificate revocation list ) and certification path, and following this, we give some examples of certificate and authentication architectures. finally, we present an example of implementation of the certificate and key management system and some application cases of this system

    論文首先簡單介紹了秘體制、公開體制、 hash函數以及基於x . 509的公鑰證書等基礎學理論;其次,論文描述了幾種典型的證書體系和鑒別制;最後給出了一個政務證書管理系統的具體實現例
  9. The bank will also issue a personal identification number ( pin ) to the cardholder for the purpose of obtaining cash advances from the designated atm networks andor, subject to the bank s approval, performing transactions by electronic means at designated atms or point of sale terminals. the use of the atm facilities is subject to the bank s terms and conditions governing the use of atm cards, a copy of which is available upon request

    本銀行亦授予持卡人一私人,供其于指定之自動櫃員網路作現金貸款,及或經本銀行同意后,持卡人可安排以其信用卡于指定之自動櫃員或一般銷售點終端進行交易,而應用此等自動櫃員服務將受到本銀行之自動櫃員卡使用規則約束,此條款可於隨時向本銀行索閱。
  10. The bank will also issue a personal identification number ( pin ) to the cardholder for the purpose of obtaining cash advances from the designated atm networks andor, subject to the bank s approval, performing transactions by electronic means at designated atms or point of sale terminals. the use of the atm facilities is subject to the bank s terms and conditions governing the use of atm cards, a copy of which is available upon request. at no time and under no circumstances shall the personal identification number be disclosed to any other person

    本銀行亦授予持卡人一私人,供其于指定之自動櫃員網路作現金貸款,及或經本銀行同意后,持卡人可安排以其shine卡于指定之自動櫃員或一般銷售點終端進行交易,而應用此等自動櫃員服務將受到本銀行之自動櫃員卡使用規則約束,此條款可於隨時向本銀行索閱。
  11. Later it came to include activities more precisely termed " web commerce " - - the purchase of goods and services over the world wide web via secure servers ( note https, a special server protocol which encrypts confidential ordering data for customer protection ) with e - shopping carts and with electronic pay services, like credit card payment authorizations

    后來商務包括的活動更加精確地被命名為"網商務" - -物品購買和服務在萬維網通過安全服務器(一個特別的協議, https ,為保護顧客而編成的,它有著很的數據)這個服務器還有購物手推車和支付的服務,就好像信用卡被授權支付一樣
  12. Three common methods being adopted by banks in hong kong are digital certificate, security token - based one - time password and sms - based one - time password

    現時本港銀行最常用的方法有三種:證書由保安顯示器發出只用一次的,以及通過手簡訊發出只用一次的
  13. The three common types of two - factor authentication being adopted by banks in hong kong are digital certificate, sms - based one - time password and security token - based one - time password

    本港銀行最常採用的雙重認證方法有三種:證書通過手簡訊發出只用一次的,以及由保安顯示器發出只用一次的
  14. Jpeg2000 based on wavelet transform is a new image compress standard of many excellent characters. iamge compress algorithmic can run more efficiently on dsp. the success of techinique research, including entire digital camera product and the key technique, and the industrialization of digital camera industry can give our own knowledge property right in digital camera technique, and then enhance the function of digital camera, upgrade its ability to compete

    國內數相關技術的研發起步較晚,其主要原因是數涉及到眾多尖端的傳感器技術、微技術、精光學技術、微械控制技術、數字信號處理器技術和腦多媒體技術,而且跟這些技術相關聯的光學、集成路、微械控制的加工工藝更是國內的薄弱環節,從而制約了國內數產業的形成和發展。
  15. You need this root key to validate a mobile e - cert certificate issued by of hongkong post mobile e - cert root ca

    你須使用這公開匙核對由香港郵政流動核證核證關發出的證書。
  16. The design of a electronic trick lock based on single chip device

    一種基於單片鎖的設計
  17. Ic has deciphered the department and gathered one batch and engaged in researching and developing and researching and developing it elite for many years with the soft project in microelectric technique, build up to core of ic all kinds of, order code, etc. have at fingertips, can revise according to the customer, thus the one that realized to original machine function was augmented deleted

    Ic解部聚集了一批從事微技術研發和軟體工程研發多年的it界精英,對各類ic的核心架構指令代等了如指掌,可將晶元內代完整導出,某些代甚至可以依據客戶要求進行修改,從而實現對原功能的增補刪減。
  18. Taking steps to ensure that copies of id cards transmitted are received only by the intended recipients by using for example, encryption, confidential mail boxes, access passwords or dedicated fax machines for receiving confidential material, etc

    採取步驟以確保傳送出去的身份證副本只由擬接收者收取,例如使用加法、郵箱、查閱或用指定的傳真收取資料等措施。
  19. The research in software radio is not more than ten years, but has made a great many fruits, but it is too little to set up an integrated theory system, and software radio includes many areas such as modern communication system ( which includes modem source / channel encoding and decoding, equalization, encrypt and decrypt and so on ), wideband antenna theory, digital signal process, microelectronics, computer and so on. this thesis mainly does research for modem in modem communication

    軟體無線經過不到10年的研究,盡管取得了很多成果,但是對于建立一套完整的理論體系來說,還遠遠不夠,況且軟體無線涉及的領域多、面廣、發展快,如現代通信理論(含調制解調、信源通道編解、均衡、加等) 、寬帶天線理論、數字信號處理、微、計算等。
  20. We have enacted the electronic transactions ordinance which follows the united nations commission on international trade law model law on e - commerce. the eto accords digital signatures and electronic records the same legal status as that of their paper - based counterparts. we have also developed a local public key infrastructure with the establishment of certification authority to support the conduct of secure electronic transactions

    參考聯合國國際貿易法例委員會的商貿法例範本后,我們制定交易條例,令數簽署和紀錄跟書面簽署和文件紀錄享有同等的法律地位我們又建立本地的公開匙基建設施,設立核證關以確保交易在穩妥可靠的環境下進行。
分享友人