域認證 的英文怎麼說

中文拼音 [rènzhèng]
域認證 英文
da domain authentication
  • : 名詞(在一定疆界內的地方; 疆域) land within certain boundaries; territory; region
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • 認證 : [法律] attestation; authentication; identification認證費 certification fee; 認證條款 testimonium ...
  1. Certifier recognizes that his good faith efforts may not shield him from liability if in fact the work certified is not in the public domain

    知到,若該受之著作事實上並非歸屬公共領時,其善意之努力無法使其免責。
  2. It has reached standard and passed iso9002 authentication, and got eligibility certificate of sullage let in tai lake drainage area by the chief bureau of state environment protection

    同時取得了國家環保總局關于太湖流排污單位達標排放驗收合格。通過了iso9002國際質量體系
  3. 3. analyzing the character of the authentication algorithm in the compression field and designing a secure authentication algorithm in the jpeg compression field

    針對網際網路上圖像傳播的需要,分析了壓縮演算法所應有的特徵,並設計了在jpeg壓縮中的安全演算法。
  4. Presenting a new concept of authentication chain. 2. introducing a asymmetry key into authentication algorithm, especailly in the loss compression field algorithm, to enhance more security

    提出將用非對稱密鑰演算法應用於演算法特別是有損壓縮演算法之中,因此極大提高了所設計演算法的安全性。
  5. This technology will be widely used in case - solving, public security and identity authentification

    該技術在刑事案件偵破、安全保衛、身份等領具有較大的實用價值。
  6. As a rapidly evol - ving technology, fingerprint verification has been widely used in the field of criminal identification, and obviously it has the potential to be widely adopted in a very broad range of civilian applications such as banking security

    作為一種飛速發展的技術,指紋識別已經在刑偵領大顯身手,在銀行身份等民用領,這項技術也具有廣闊的應用空間。
  7. Crb assessment teams should have sufficient knowledge of the applicable legal requirements that are relevant for the location and environmental aspects of the organization so as to identify significant omissions from their client ' s identified legal requirements

    機構的審核組應具備充足的、與組織所處區和環境因素狀況相關的適用法律要求的充分知識,以便發現從他們客戶已識別出的在法律法規要求識別中發現那些的重大遺漏。
  8. Its foundation is based on the huge potential market of electric products in china. its goal is to quickly respond to the technical needs and improvement on schneider electric products from chinese market, to expand the existing market to low end market in china step by step, and to provide homologation service to the joint ventures for component and material localization

    作為施耐德電氣公司在中國設立的唯一一個研發中心,它的成立基於電氣產品在中國的巨大潛在市場,目的在於就中國市場對施耐德電氣產品的技術需求及改進作出最迅速的反應,逐步把已有市場領擴大到中國低端產品的市場以及合資廠產品的元件和材料國產化需求進行實驗工作。
  9. With the development of computer and network, and the rise of email, identity authentication has already haven new applied domains. for example, in the application of network and database, different users possess different warranties, and computers have no human beings " identification ability. hence, identity authentication becomes an insurmountable, but must be solved problem

    隨著計算機和網路的發展、電子郵件的興起,身份又有了新的應用領,例如,在網路和數據庫等計算機應用中,不同用戶擁有不同的權力,而計算機又不具備人的辨識能力,更何況它常常不能直面用戶,所以身份就成為一個難以解決但又必需解決的問題。
  10. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大素數上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份方案。
  11. Their size parameters, the largest probability of a successful impersonation attack and the largest probability of a successful substitution attack are computed ; chapter three use sympletic geometry to construct authentication codes with arbitration, some parameters and the largest probability of successful attack are also computed ; chapter four is about lattices generated by transitive sets of subalgebras under finite chevalley groups

    並計算了相關參數及成功偽造和成功替換的最大概率;第三章在辛幾何的基礎上構造了具有仲裁的碼,亦計算了相關參數及各種攻擊成功的最大概率;第四章討論了有限上chevalley群作用下的子代數軌道生成的格。
  12. In recent years, as the rapidly development of informatic technologies and the bloom of internet, a large number of transactions appeared in the internet. fingerprint verification technology, as the most efficient, reliable, and low - cost authentication technology, has been more and more widely used in banking, stock exchange and e - business fields besides traditional police applications

    近年來,隨著信息技術和網路技術的飛速發展以及大量internet事務與交易的出現,指紋自動識別這種最快速、開銷最低並且效果良好的技術除了在傳統的刑事偵緝領之外,在銀行、股市和電子商務等行業作為身份鑒別得到更廣泛的應用。
  13. Inway education is the sole agent training organization in canton of ctl, ilt, cips, which are the most authority occupational certification of the world in the field of procurement, supplying train and logistics

    英衛教育是美國注冊物流師( ctl ) 、英國皇家物流與運輸職業資質( ilt ) 、英國皇家采購與供應經理( cips )等采購、供應鏈管理、物流領全球三大權威職業廣東唯一授權培訓機構。
  14. Application intermediary serves the orgnaization of business to ought to sign up for sent material to have when offerring application : ( 1 ) requisition ; ( corporate organization proves 2 ) ; ( the resume of 3 ) legal representative, main staff member and concerned proof, place of orgnaization constitution, office and office facilities prove ; ( 4 ) has legal effectiveness with what foreign institution of higher learing or other education orgnaization sign directly study abroad at one ' s own expenses cooperative intent book or agreement ( medium, foreign language this ), and the foreign autograph of attestation of the diplomatic and consular missions outside be stationed in via our country makes an appointment with square corporate organization proof ; ( 5 ) asset proof or accountant office issued check endowment report ; ( area of the working plan that 6 ) drafts to begin intermediary to serve, administration and feasibility report

    申辦中介服務業務的機構在提出申請時應當報送的材料有: ( 1 )申請書; ( 2 )法人資格實; ( 3 )法定代表人、主要工作人員的簡歷和有關實,機構章程、辦公場所及辦公設施實; ( 4 )與國外高等院校或其他教育機構直接簽署的有法律效力的自費留學合作意向書或協議(中、外文本) ,以及經我國駐外使領館的國外簽約方的法人資格實; ( 5 )資產實或會計師事務所出具的驗資報告; ( 6 )擬開展中介服務的工作計劃、行政區及可行性報告。
  15. Digital certificates for mobile wireless and high transaction volume financial systems : part 2 : domain certificate syntax

    移動或無線和高交易量金融系統用數字書.第2部分:域認證語法
  16. Cross - domain authentication alliance protocol based on lattice

    基於格的跨域認證聯盟協議
  17. User identification and message authentication are two important aspects of network security. an interactive /. cro knowledge proofs based user identification and also a cross - domain message authentication scheme are proposed in the paper

    本文還設計了一個跨的信息系統,給出了協同產品開發中的跨信息模型,並提出了相應的跨域認證方案。
  18. A lattice - based authentication protocol model for multi - domain was proposed

    提出了一種基於格的多信任域認證協議模型。
  19. Secondly, the extension to smtp authentication - - - - multidomain auth - - - - is studied : the proposal for its implementation and for the transformation of auth information supplied by the email client

    接著是對產品中smtp的擴展的討論:多域認證及相關信息格式的變化。
  20. In this scheme, the protocol template and the temporary certificate ticket were adopted to avoid the repeat design of authentication protocols and simplify the trust models of cross - realm authentication

    方案通過協議模板和臨時書票據設計,避免了單點登錄的協議重復設計,並簡化了跨域認證的信任模型。
分享友人