security paper 中文意思是什麼

security paper 解釋
證券紙,保險紙
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • paper : n 1 紙;裱墻紙。2 報紙,報。3 收據;債券;證券;票據;匯票;鈔票(=paper money)。4 〈pl 〉身份...
  1. But after carefully carding, the current paper found that : these researches are often localized in some provinces, such as hunan province and shanghai, or in some domain, e. g. the companies listed in shanghai security exchange, hence can not demonstrate the total functioning status of supervision boards of listed companies in china ; the methods employed by the studies are dull, and overly depend on subject matter, thus the persuasion is limited ; working details of supervision boards are ignored to some extent, therefore they can not study the functioning of supervision boards measure for measure

    但經過對這些研究的仔細梳理,本文發現,這些研究往往局限於某一地域,如湖南省、上海市,或某一領域,如在上海證券交易所上市的公司,因而不能說明中國上市公司監事會整體的效能狀況;這些研究的採用的方法比較單調,且主觀性較強,因而其說服力有限;這些研究對于監事會工作的細節關注不夠,因而不能有針對性的觀察監事會工作的效果。
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  3. The paper has concentrated on the marketing issues of the security broking business in altogether six chapters

    本文針對證券經紀業務市場營銷現狀及對策共分六章進行探討。
  4. This article consists of five parts as following : mortgage of uncompleted building was originated from the common law and the law of hong kong, so the paper probes into its meaning - the transformation of the specific property right ; when the debtor fails to perform his duty, the creditor can obtain the title determinately ; the debtor enjoys the right of redeeming the collateral security through fulfilling his debt, the creditor has the obligation of returning the property at the same time. secondly, the author summaries its essential feature on the practice of the real estate mortgage hi the mainland of china - the target of the mortgage is a kind of expective interest ; the mortgage is a kind of guarantee which is settled through making over the interests in expectancy ; the risk of the mortgaged uncompleted building should be borne by the realty company instead of the mortgagor ; the phase of the mortgage ; mortgage is realized in a particular way. thirdly, on the basis of analyzing the legal nexus that is involved, the paper points out that the legal ne xus of the mortgage is just between the mortgagor and the mortgagee

    樓花按揭作為一種擔保方式起源於英美法上的mortgage ,所以本文第一部分首先探討了mortgage在英美法上的含義:特定財產權利的轉移;在債務人不履行債務時,債權人可以確定地取得所有權;債務人享有通過履行債務而贖回擔保物的權利,同時債權人負有交還財產的義務。其次,就我國的樓花按揭實踐總結了其基本特徵:樓花按揭涉及兩個合同三方當事人;樓花按揭的標的是一種期待性利益;樓花按揭是通過轉讓物業權益而設定的一種擔保方式;預售樓花滅失的風險應有開發商承擔;樓花按揭的階段性;樓花按揭實現方式的特殊性。最後,分析了樓花按揭所牽涉的各個法律關系,認為真正的樓花按揭法律關系只是購房人與銀行之間的按揭貸款關系,按揭當事人只有購房人(按揭人)與銀行。
  5. In the post cold war and globalization times, more and more impact emerged in the welfare states and the old security system environment was changed ? in the process of the west european states finding new solutions for the conjuncture, the third way was presented. the paper studies the security system of british, france and germen

    后冷戰和全球化時代,福利國家受到更大的沖擊,其外部條件、內部需求、合法性與公平性方面都發生了變化,西歐各國政府苦於找不到有效的解決方案而陷入更嚴峻的危機狀態中,新的現實呼籲新的思想,第三條道路應運而生。
  6. The first part is introduction, presenting this paper ' s structure, research background and so on ; the second part introduces some issues relating closely to risk, the tangency point between indifference utility curve and efficient frontier is the optimal portfolio ; the third part explores risk evaluation, this part begins with some risk factors affecting security ' s price and return, then analyzes the methods evaluating degree of risk, finally, introduces a more popular method of risk evaluation - - var ; the forth part expounds risk management, this part studies some risk control strategies correspond to specific risk mentioned above ; the last part put forward some advice contrapose issues existed in risk management in china

    第一部分為緒論,介紹本文的相關背景;第二部分是與風險相關的幾個問題,等效用曲線與有效邊界的切點是投資者選擇的最佳投資組合;第三部分是風險衡量,該部分首先分析了證券與股票所面臨的風險,然後對債券和股票分別介紹,最後介紹了目前比較流行的風險衡量方法? ? var方法;第四部分為企業風險管理,這里針對上文所述的風險提出相應的風險控制策略;第五部分針對目前我國風險管理中存在的問題提出了幾點建議。
  7. In this paper, the security of the wtls is analysed. now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack

    橢圓曲線法和ripemd ? 160是兩種目前較新的加密演算法,且不易被破解,本文初步分析和研究了這兩種方法。
  8. A while ago, an ad hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least 90 bits for symmetric algorithms used in commercial security

    不久前,計算機科學家和密碼學家專門小組發表了一篇論文,建議用於商業安全的對稱演算法至少要用90位的鑰匙。
  9. Immune evolutionary algorithms are optimal algorithms in essence, therefore, they can be used in some fields, such as cybernation, pattern recognition, optimal design, meshing learning, network security, etc. there are also some examples of these attempts described in this paper

    免疫進化計算在本質上講是一種優化演算法,所以它們可以應用於一些諸如自動控制、故障診斷、模式分類、圖象識別、優化設計、機器學習和網路安全性等廣泛領域,本文在這方面也做了一些初步的嘗試。
  10. Security paper. part 1 : debenture paper. credential paper

    安全防偽紙第1部分:證券證件用紙
  11. This paper analyzes the fire danger factors for torching system and vent pipe, and addresses the key design matters of deployment, height, discharging capacity and automatic monitoring device of torch as well as the discharging gas concentration, installation position and security device of the vent pipe

    文章分析了火炬系統和放空管的火災危險因素,並從火炬的布置、高度、排放能力、自動監控裝置以及放空管的氣體排放濃度、安裝位置、安全裝置等方面,重點論述了火炬系統和放空管的消防安全設計要點。
  12. The paper hammers at the study of sse " s extranet security establishment measures

    本文就是致力於航交所extranet安全建設方法的研究。
  13. As a new financing instrument, since convertible bond came to the capital market of china, becase of its speclation and investment, it was accepted by government and companies and investors convertible bond may play an important role in broadening enterprises ' financing channels, enrich the variety of investing instruments and make our security market prosperous. csrc has issued the interrelated rules for public firms issue the convertible bonds. until the end of 2001, it has 55 firms plan to issue the the convertible bonds. but by end of 2002 only 5 firms issued the convertible bonds because of investor ' worry. but in 2003, the management strengthens the security market such as some public firms just to " fold money ", the convertible bonds become the most invest tools for the public firms refinance. only if the behavior of issuing convertible bonds is normalized our security market can tend towards a mature way, social capital can be optimized, and the public firms can also develop in an ample area. this paper base on the character of the convertible bonds

    國務院證券委員會在1997年3月25日頒發了《可轉換公司債券暫行管理辦法》 ,又於2001年4月26日頒發了《上市公司發行可轉換公司債券實施辦法》關于可轉換債券的規定和條例,對上市公司發行可轉換公司債券的要求條件比配股、增發更為寬松,截止到2001年4月,有200多家上市公司夠發行可轉換債券資格,到2001年底有55家公司計劃發行可轉換債券,但受到一些上市公司通過配股、增發等「圈錢」的影響,投資者對上市公司通過發行可轉換債券再融資是不得不持審慎態度, 2002年全年僅5家公司實施了可轉換債券,共籌集資金41 . 5億元人民幣,從總體發行情況看,發行規模越來越小,利率越來越高,投資者認可程度越來越低,發行和交易狀況每況愈下。
  14. In the progress of formulate the module, many advanced technologies and methods, such as nat and vpn, are adopted. the impletion of module covers three kinds firewall module. this paper has special value on the research above electronic business security framework

    在設計過程中,運用了nat 、 vpn等先進的技術和方法,採用常用的三種防火墻模式(軟體防火墻、硬體防火墻和軟硬體相結合的方式) ,對模型中的主要模塊具體實現,最終建立一個結構合理、功能完善、經濟適用的防火墻系統。
  15. The paper discussed the following four points : the security of java, the implemention of mvc pattern and the principle and implemention of the send and incept of e - mail based on java ; the principles and implemention of smtp, pop3 and imap, and the characteristic of the e - mail server sendmail, qmail and postfix ; the principles and implemention of symmetrical encryption and unsymmetrical encryption technology, and the advantages and disadvantages of them ; the characteristic of rubbish e - mail, and the principles and implemention of anti - rubbish e - mail technology

    本文研究的主要內容包括: java技術安全性, java對mvc模式的實現,以及java技術解決電子郵件發送和接收問題的原理和實現方法;電子郵件相關協議smtp , pop3和imap的原理和實現方法,以及電子郵件服務器sendmail 、 qmail和postfix的特點;對稱加密與非對稱加密技術的原理和實現方法,以及兩者的優點和缺點;典型垃圾郵件的特徵,以及反垃圾郵件技術的原理和實現方法。
  16. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。
  17. Because both of ctod and j - integral can be used to evaluate structure security, there must be a relationship between them, this paper probes the relationship between ctod and j - integral along with their critical value c and jic on the basis of the fruits from the original

    由於ctod和j積分都可以作為結構安全評定的參數,它們之間必然存在著一定的聯系,本文在前人研究成果的基礎上,對ctod和j積分及其特徵值_ c和j _ ( c )的關系進行了探索。
  18. Proof of termination of marriage ( foreign divorce decree or death certificate, or philippines annulment or death certificate on nso security paper ) ( if applicable )

    結束婚姻狀況憑證即外國簽發的離婚令或死亡證書,或由菲律賓簽發的、印在nso安全紙上的解除婚約或死亡證書(如適用)
  19. Printed on security paper, the new card includes the holder s recent photograph and an expiry date ( for applicants whose disability is not permanent )

    新登記證將採用防仿特徵印製,載有持證人近照及證件有效日期(適用於非永久殘疾的持證人) ,更為可靠及更易識別。
  20. Birth certificate a certified birth certificate from the national statistics office ( nso ) printed on nso security paper. this is required for all applicants

    出生證明所有申請人均需要由國家統計署( nso )簽發的、印在nso安全紙上的出生證明。
分享友人