With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data
隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機
密信息(例如軍事機
密信息、商業機
密信息、個人隱私
信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的
信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加
密措施
It it also important to note that german code breakers could read a significant part of the coded messages transmitted by the allies
值得注意的是德國的情報人員同樣可以破譯盟軍相當數量的加
密信息。
The consultant acknowledges that, in the course of its operations, plan china has developed, gathered and generated extensive data, information, procedures, processes, methods and systems of a confidential and proprietary nature including, without limitation, information or evaluations regarding grant applications and distributions, contact persons and customers, plan china programs, research data, planning data, development data, experience data, business processes, methods, know - how and other confidential information, knowledge and data used or useful in conducting the operations of plan china and its associated companies and foundations ( together, “ confidential information ” )
乙方承認,對接觸到的甲方的機
密及公司
信息和數據等工作內容均應保守秘
密,其中包括甲方的贈款申請及分配、所涉及的人員及客戶、甲方工作計劃、研究資料、規劃資料、發展狀況、經驗資料、工作程序、方法、訣竅以及與甲方相關的其他公司和基金組織的機
密(亦稱「機
密信息」 ) 。
Party b acknowledges that, in the course of its operations, party a has developed, gathered and generated extensive data, information, procedures, processes, methods and systems of a confidential and proprietary nature including, without limitation, information or evaluations regarding grant applications and distributions, contact persons and customers, party a programs, research data, planning data, development data, experience data, business processes, methods, know - how and other confidential information, knowledge and data used or useful in conducting the operations of party a and its associated companies and foundations ( together, “ confidential information ” )
乙方承認,對接觸到的甲方的機
密及公司
信息和數據等工作內容均應保守秘
密,其中包括甲方的贈款申請及分配、所涉及的人員及客戶、甲方工作計劃、研究資料、規劃資料、發展狀況、經驗資料、工作程序、方法、訣竅以及與甲方相關的其他公司和基金組織的機
密(亦稱「機
密信息」 ) 。
Agency spokesman paul gimigliano said an officer had been fired for having unauthorized contacts with the media and disclosing classified information to reporters, including details about intelligence operations
該局發言人保羅?季米格里安諾說,一名工作人員? ?因未經授權而與媒體聯系並將包括情報工作的具體細節在內的機
密信息泄露給記者? ?已被解僱。
The design thoughts of the cdsp is seen through the development process. the user ' s requirements are met by the implementation of the information encryption, concealing and secure transmission.
在開發過程中,充分運用了
信息保
密安全平臺的設計思想,從
信息保
密、
信息隱藏和
信息安全傳輸等幾個方面實現了用戶的需求,具有較高的實用價值。
A 3d - dct - based information hiding algorithm for color images
的秘
密信息隱藏技術
Party b acknowledges that all confidential information is the sole property of party a, that strict protection of the confidential information is necessary to the successful continuation of the operations of party a and its associated companies and foundations, and that unauthorized use or disclosure of the confidential information would irreparably harm party a and its associated companies and foundations
乙方承認,所有機
密信息都是甲方的獨有財產,嚴格保守機
密是甲方和與其有關的公司和基金組織成功運作的保證,未經授權使用或泄露機
密會對甲方及其有關公司和基金組織造成無可挽回的傷害。
The consultant acknowledges that all confidential information is the sole property of plan china, that strict protection of the confidential information is necessary to the successful continuation of the operations of plan china and its associated companies and foundations, and that unauthorized use or disclosure of the confidential information would irreparably harm plan china and its associated companies and foundations
乙方承認,所有機
密信息都是甲方的獨有財產,嚴格保守機
密是甲方和與其有關的公司和基金組織成功運作的保證,未經授權使用或泄露機
密會對甲方及其有關公司和基金組織造成無可挽回的傷害。
Easy messages break on the first walk through the search space
簡單的加
密信息在一個小的搜索空間里也能很容易得到破解。
Any information which is by nature confidential ( for example, because its disclosure would be of significant competitive advantage to a competitor or because its disclosure would have a significantly adverse effect upon a person supplying the information or upon a person from whom the supplier acquired the information ), or which is provided on a confidential basis by parties to an investigation shall, upon good cause shown, be treated a such by the authorities
任何原屬機
密性質的
信息(例如,由於
信息的披露會給予一競爭者巨大的競爭優勢,或由於
信息的披露會給
信息披露者或給向
信息獲得者提供
信息的人士帶來嚴重不利影響) ,或由調查參加方在保
密基礎上提供的
信息,主管機關應在對方說明正當原因后,按機
密信息處理。
Talks between the united states and the european union on sharing confidential airline pa enger information have broken down
美國和歐盟之間關于分享民航乘客機
密信息的談判破產了。
Talks between the united states and the european union on sharing confidential airline passenger information have broken down
美國和歐盟之間關于分享民航乘客機密信息的談判破產了。