非安全代碼 的英文怎麼說
中文拼音 [fēiānquándàimǎ]
非安全代碼
英文
unsafe code- 非 : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 代 : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
-
Doing this requires a type - unsafe operation, particularly with structures, which could result in unverifiable code
這樣做會導致非類型安全的操作(對于結構尤其如此) ,因而會產生無法驗證的代碼。Office solutions that use managed code extensions add a custom security restriction of not accepting all code or zone - based evidence types, which means that microsoft office word 2003, microsoft office excel 2003, and microsoft office outlook 2003 will not run any assemblies that are on the local machine, the network, or the internet until the assembly is given permission granted trust in your security policy
使用託管代碼擴展的office解決方案中新增了一個自定義安全限制,它不接受基於「所有代碼」或「區域」的證據類型,這意味著除非相應的程序集在您的安全策略中被授予了權限(授予信任) ,否則microsoft office word 2003 、 microsoft office excel 2003和microsoft office outlook 2003將不運行本地計算機、網路或internet上的任何程序集。Occurs only when verifiable managed code interacts with unmanaged code or with unsafe managed code
只在可驗證託管代碼與非託管代碼或非安全託管代碼交互時才會引發。In earlier versions of the. net framework, an access violation in unmanaged code or unsafe managed code is represented by a
Net framework較早版本中,非託管代碼或非安全託管代碼中的訪問沖突用託管代碼中的Research on the elliptic curve over finite field f2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. indicate that making operation on the elliptic curve is very complicated
對適于建立密碼體制的有限域f2m上的一類橢圓曲線進行了研究,分析了橢圓曲線密碼體制的安全性和常見的攻擊方法,因為橢圓曲線密碼體制的安全性只與橢圓曲線本身有關,所以選擇合適的橢圓曲線非常重要,指出橢圓曲線的計算是復雜的,分析研究了利用有限域f2m上的橢圓曲線建立密碼體制的相關問題,利用經過仿射代換后的橢圓曲線可以建立公鑰密碼體制,將其上的運算進行映射變換后易於設計演算法和便於實現。In the rare case of unmanaged code that is completely safe for all possible circumstances, a method with the
在非託管代碼對所有可能的情況都完全安全的情況下(這種情況極少見) ,通過使具有Applications that receive less than full trust by the runtime code access security system are not allowed to call shared managed libraries unless the library writer specifically allows them to through the use of the
不允許接收到低於完全信任級別(該信任級別是運行庫代碼訪問安全系統授予的)的應用程序調用共享託管庫,除非庫編寫器通過使用Because this means going outside the security perimeter for managed code, due caution is required. if your code is security - neutral, both your code and any code that calls it must have unmanaged code permission
如果您的代碼是不受安全性影響的,那麼您的代碼以及調用它的任何代碼都必須具有非託管代碼權限(指定了Thus, even if the unmanaged code api is functionally safe after necessary demands for partially trusted callers, managed code must also check parameter validity exhaustively to ensure that no unintended calls are possible from malicious code using the managed code wrapper layer
這樣,即使非託管代碼api對部分受信任的調用方來說在功能上是安全的(在應用必需的請求之後) ,託管代碼也必須徹底檢查參數有效性,以確保惡意代碼不能使用託管代碼包裝層執行非預期的調用。When code is type safe, the runtime s security enforcement mechanism ensures that it does not access native code unless it has permission to do so
當代碼是類型安全時,運行庫的安全性強制機制確保代碼不會訪問本機代碼,除非它有訪問本機代碼的權限。One technique combines security demands ; the other suppresses demands for permission to call into unmanaged code
一種方法合併安全要求;而另一種方法取消對調用非託管代碼時所需權限的要求。Executing, asserting permissions, calling into unmanaged code, skipping verification, and other security - related rights
執行、斷言權限、調用到非託管代碼中、跳過驗證以及其他與安全有關的權限。So far, the elliptic curve cryptosystem ( ecc ) provides the highest strength - per - bit of any cryptosystem known. in addition to its high security, ecc also has many other merits, such as less computation overheads, shorter key size, considerable bandwidth savings, and so on
同其它非對稱加密體制相比,橢圓曲線密碼系統除了安全性高外,還具有計算負載小,密鑰尺寸短,佔用帶寬少等優點,因此,橢圓曲線密碼系統被認為是下一代最通用的公鑰密碼系統。分享友人