secrecy system 中文意思是什麼

secrecy system 解釋
保密體制
  • secrecy : n. 1. 秘密(狀態);隱蔽(狀態);守秘密。2. 保密;保密能力。
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. The plan can generate lots of ss codes, so that it can solve the contradiction between limited bandwidth and infinitude requirements of increasing customers in present communication system and it has ability of secrecy too

    並能夠產生大量的擴頻碼地址,可較好的解決現行通信系統中有限帶寬與日趨增加的無限用戶需求之間的矛盾。
  3. Due to the high level of secrecy of the saudi arabian justice system, trials are invariably held behind closed doors

    由於沙國司法體系極高的隱密性,審判總是不對外公開的。
  4. What ' s more, it has its new features and disadvantages, such as unorganized network information, mixed information contents, shortage of standard search, indirect relation between consultation librarians and users, bad quality control system, the deficiency of network consultation secrecy and expensive search fares

    另外,網路信息的非組織性,信息內容的魚龍混雜,缺乏查詢的標準方法;參考咨詢館員和用戶的間接性,缺乏嚴格的質量控制體系;網路咨詢保密性差、檢索費用高等也都是其所表現出的新特點、新問題。
  5. The author has been working on videoconference system research for about 1 and a half years, during which time has undertaken the planning and construction work of the remote education h. 323 videoconference system for the online education academy of sichuan university, the construction work of the encrypted videoconference system for the secrecy bureau of chengdu government, and the development work of the videoconference system for beijing shixun inc, and also some research works in java programming and jmf areas

    作者從事視頻會議系統的研究工作近一年半的時間,其間參加過四川大學網路教育學院的用於遠程教育的h . 323視頻會議系統的規劃和建設、成都市市委機要局的保密視頻會議的建設和北京視訊公司的視頻會議系統的開發,以及相關的java程序設計和jmf的研究。
  6. Consequently, it is strongly recommended that freedom in communication be put into the civil right protection system and be paralleled with secrecy in communication

    認為通訊秘密具有特定性、秘密性、價值性和合法性的特徵,是隱私權的下位概念,法律對隱私權的保護同樣適用對通訊秘密的保護。
  7. The features of cos are : powerful functions, robustness, high running speed, less limitation to the hardware, complete versions, high security and secrecy, high expansibility, and high maintenance. operations of the system are user friendly so that it does not need to have the professional staff to maintain

    其特點是功能完整強大,操作簡單,強壯穩定,不需要專業系統維護員,運行速度快,對硬體要求低,版本齊全,安全保密性強,具有高度可擴展性和高度可維護性,能夠滿足各種經營模式的企業需求。
  8. When constructing countrywide production & management decision support system of tobacco industry, there are security questions in data integrity, secrecy, irreversibility, and identity authentication authorization

    在構建全國煙草行業卷煙生產經營決策信息系統(簡稱國家煙草一號工程)中,存在數據完整性、機密性、不可否認性及身份認證授權等安全問題。
  9. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  10. A unique string of characters input by an authorized user in order to gain access to a system or to protected information in the system. passwords are usually not displayed on terminal screen upon input, in order to preserve their secrecy

    被授權的用戶為取得對系統或系統中被保護的信息的存取權而輸入給系統的專門的字元串。為使口令字保密,輸入時口令字一般不在終端屏幕上顯示出來。
  11. This paper described the design and realization of a command and communication system database in the environment of vfp. it briefly introduced the mostly function, the system frame, the constitute & the information flow ; it introduced the key techniques used in the database design, such as user interface designing technique, application system toolbar designing technique, multi - media technique, data exchange technique, security and maintaining secrecy technique, etc. moreover it do more analysis, research & prospect for these technique & the developing way of the system

    本篇描述了vfp環境下某指揮通信系統數據庫的設計和實現;簡要介紹了該數據庫系統的主要功能、體系結構、組成和信息流程;介紹了數據庫設計中的用戶界面設計技術、應用系統工具欄設計技術、多媒體技術、數據交換技術、安全保密措施等技術,並對這些技術以及系統的發展方向進行了進一步的分析、研究和展望。
  12. ( 3 ) in order to be suitable for the secrecy of control system, convenient for debugging the control system and make the control system be applied to capacitance, inductance and phase - shifting controlled ozonier, the control system of the ozonier power is based on cpld / fpga chip is presented. ( 4 ) the paper analyzes the shortage of routine inductor designing methods which are used to design intermediate frequency, high voltage resonance reactor, puts forth an iterative method to prevent the problem

    ( 3 )為解決大功率諧振電抗器的設計困難一直是大功率諧振電源的難點,本文在電抗器常用的ap設計法的基礎上,提出了一種迭代設計方法,這種方法同時考慮氣隙長度范圍和氣隙磁通邊緣效應因數,根據所需電感值來求解滿足要求的鐵芯規格和線圈匝數,不必對電感器的匝數進行修正。
  13. In this paper, the encrypted intensity and digital verify capacity of secrecy transfers system has promoted a lot compared to wep. comparing to tkip, the speed is faster and also the agility is better

    本文數據保密傳輸系統的加密強度和數據校驗能力相比wep來說有了很大提高,同tkip比,它的速度要快于tkip ,且它靈活性要優于tkip 。
  14. At the mean time, the building of the system is the fastest and the best convenience. the scdma making use of radio connection technology of scdma have advantage of high radio frequency ratio, good secrecy and long distance of transport under lower transmitter frequency

    Scdma無線接入通信系統採用同步碼分多址( scdma )無線接入技術,具有無線頻譜利用率高、通信保密性好和低發射功率下較遠的通信距離等技術優勢,是一種優秀的無線接入通信技術。
  15. Assigning serial different address code to different subscribers, useful signal is taken out of the same time slot and frequence, and is transmitted with one share channel. at received end, system makes use of completed address code from sending end to do correlative check and take out useful subscriber signal. the other address code signals are treated as broadband disturbing signal which is removed. in radio environment of existing variable disturbtion and muti - way declining, expand frequence signal ’ s broadband characteristics can improve system performance obviously. cdma mobile telecommunication system has some better characteristics, such as anti - disturbing 、 anti - way declining 、 secrecy 、 capacity 、 utilizing rate of frequence resource and so on, than other mobile telecommunication system

    Cdma ( codedivisionmultipleaccess )移動通信系統的技術基礎是基於擴頻技術的碼分多址,通過給不同的用戶分配各自特定的地址碼序列,將處于相同時隙和頻率的用戶信號分離開來,採用共享通道方式傳輸信息。在接收端,系統利用與發送端完全一致的本地地址碼對接收信號進行相關檢測,提取需要的用戶信號,而將其他使用不同碼型的信號視為寬帶干擾而從中剔除掉。
  16. Elliptic curve cryptosystems on reconfigurable hardware information security technology is a compositive subject, which includes information theory, computer science, cryptography and other aspects fields. it aims to research the protection method of information, which are transferring in the computer system and communication network. also it is responsible to the security, secrecy, verity and integrity of the information

    信息安全技術是一門綜合的學科,它涉及信息論、計算機科學和密碼學等多方面知識,它的主要任務是研究計算機系統和通信網路內信息的保護方法以實現系統內信息的安全、保密、真實和完整。
  17. The security issue of keys in conventional cryptosystem mainly concerns with secrecy and anti - crackdown of the key material, while in public key system this issue mainly means the correctly banding between the public key and the owners identity

    傳統的對稱密鑰系統的密鑰安全主要指密鑰的保密性和不被破解;公鑰密碼系統的密鑰安全主要是指公開密鑰和身份綁定的正確性。
  18. Finally, chaotic digital sequences were applied to secrecy comrnunication among ic card system. the system model was designed and a simulation analysis for the secrecy coininunication with computer was also given

    最後,從安全通信的角度考慮,提出將混沌數字序列應用於讀卡器系統的數據保密通信中去,並設計了實現模型,進行了計算機保密通信模擬模擬。
  19. Cryptic watermarking means secret information can be hidden in public data as watermark, so observer and monitor system can not be conscious of existence of secret information, then we can realize cryptic communication and secrecy storage

    隱蔽水印是指將秘密信息作水印隱藏在公開的非機密的數據,使觀察者和監測系統無法察覺秘密信息的存在,從而實現隱蔽通信和保密儲存。
分享友人