非安全代碼 的英文怎麼說

中文拼音 [fēiānquándài]
非安全代碼 英文
unsafe code
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. Doing this requires a type - unsafe operation, particularly with structures, which could result in unverifiable code

    這樣做會導致類型的操作(對于結構尤其如此) ,因而會產生無法驗證的
  2. Office solutions that use managed code extensions add a custom security restriction of not accepting all code or zone - based evidence types, which means that microsoft office word 2003, microsoft office excel 2003, and microsoft office outlook 2003 will not run any assemblies that are on the local machine, the network, or the internet until the assembly is given permission granted trust in your security policy

    使用託管擴展的office解決方案中新增了一個自定義限制,它不接受基於「所有」或「區域」的證據類型,這意味著除相應的程序集在您的策略中被授予了權限(授予信任) ,否則microsoft office word 2003 、 microsoft office excel 2003和microsoft office outlook 2003將不運行本地計算機、網路或internet上的任何程序集。
  3. Occurs only when verifiable managed code interacts with unmanaged code or with unsafe managed code

    只在可驗證託管託管託管交互時才會引發。
  4. In earlier versions of the. net framework, an access violation in unmanaged code or unsafe managed code is represented by a

    Net framework較早版本中,託管託管中的訪問沖突用託管中的
  5. Research on the elliptic curve over finite field f2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. indicate that making operation on the elliptic curve is very complicated

    對適于建立密體制的有限域f2m上的一類橢圓曲線進行了研究,分析了橢圓曲線密體制的性和常見的攻擊方法,因為橢圓曲線密體制的性只與橢圓曲線本身有關,所以選擇合適的橢圓曲線常重要,指出橢圓曲線的計算是復雜的,分析研究了利用有限域f2m上的橢圓曲線建立密體制的相關問題,利用經過仿射換后的橢圓曲線可以建立公鑰密體制,將其上的運算進行映射變換后易於設計演算法和便於實現。
  6. In the rare case of unmanaged code that is completely safe for all possible circumstances, a method with the

    託管對所有可能的情況都完的情況下(這種情況極少見) ,通過使具有
  7. Applications that receive less than full trust by the runtime code access security system are not allowed to call shared managed libraries unless the library writer specifically allows them to through the use of the

    不允許接收到低於完信任級別(該信任級別是運行庫訪問系統授予的)的應用程序調用共享託管庫,除庫編寫器通過使用
  8. Because this means going outside the security perimeter for managed code, due caution is required. if your code is security - neutral, both your code and any code that calls it must have unmanaged code permission

    如果您的是不受性影響的,那麼您的以及調用它的任何都必須具有託管權限(指定了
  9. Thus, even if the unmanaged code api is functionally safe after necessary demands for partially trusted callers, managed code must also check parameter validity exhaustively to ensure that no unintended calls are possible from malicious code using the managed code wrapper layer

    這樣,即使託管api對部分受信任的調用方來說在功能上是的(在應用必需的請求之後) ,託管也必須徹底檢查參數有效性,以確保惡意不能使用託管包裝層執行預期的調用。
  10. When code is type safe, the runtime s security enforcement mechanism ensures that it does not access native code unless it has permission to do so

    是類型時,運行庫的性強制機制確保不會訪問本機,除它有訪問本機的權限。
  11. One technique combines security demands ; the other suppresses demands for permission to call into unmanaged code

    一種方法合併要求;而另一種方法取消對調用託管時所需權限的要求。
  12. Executing, asserting permissions, calling into unmanaged code, skipping verification, and other security - related rights

    執行、斷言權限、調用到託管中、跳過驗證以及其他與有關的權限。
  13. So far, the elliptic curve cryptosystem ( ecc ) provides the highest strength - per - bit of any cryptosystem known. in addition to its high security, ecc also has many other merits, such as less computation overheads, shorter key size, considerable bandwidth savings, and so on

    同其它對稱加密體制相比,橢圓曲線密系統除了性高外,還具有計算負載小,密鑰尺寸短,佔用帶寬少等優點,因此,橢圓曲線密系統被認為是下一最通用的公鑰密系統。
分享友人