數字簽名 的英文怎麼說

中文拼音 [shǔqiānmíng]
數字簽名 英文
ds digital signature
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  • 簽名 : sign one's name; autograph
  1. Secure e - commerce means expanding e - commerce with secure techniques and measures of encryption and digital signature to resist the anticipative risk

    安全電子商務是指運用加密和數字簽名等安全技術與手段來開展電子商務,抵禦預期的風險。
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、據電訊的機密性和完整性、據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的據電訊的不可抵賴性。
  3. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行,來代替書寫或印章,確認者的身份、據來源和完整性,防止據被竊取、篡改和破壞,從而達到保護據的目的。
  4. Chip cards with digital signature application function according to sigg and sigv - part 4 : basic security services

    根據信號g和信號v有數字簽名應用功能的存儲晶元.第4
  5. Chip cards with digital signature application function according to sigg and sigv - part 2 : personalisation processes

    根據信號g和信號v的具有數字簽名應用功能的晶元
  6. Chip cards with digital signature application function according to sigg and sigv - part 3 : commands for personalisation

    使用信號g和信號v的具有數字簽名功能的存儲晶元.第3
  7. In america, the electronic signature legislation began with utah in 1995, utah digital signatare act is confined to regulate digital signature which is made by using cipher code, then, other states are also engaged in legislative activities to regulate digital signature, but the second state ( newyork ) has adopted a more common way in technology, in other words, the later legislation changed from concentrating on the concrete technolngy of digital signature to more widely regulating the common technology of all kinds of electroncc signature

    在美國,電子立法始於1995年的猶他州,該州法案只限於調整使用密碼的數字簽名。之後,其他州也開始了數字簽名立法活動,但第二個進行此種立法的州(即紐約)採取一種技術上更為一般的方式,換言之,其後的立法從「集中於數字簽名的具體技術法律轉向廣泛調整各種電子的一般技術法律。 」
  8. The digital signature based on elliptic curve crypt system

    基於橢圓曲線密碼體制的數字簽名
  9. Chapter 3, introduces the cryptogram technology which the e - signature stamper system will use

    其中,數字簽名技術尤為重要,它是提供信息完整性、機密性、不可抵賴性的基礎。
  10. Digital signatures rely on public key cryptography

    數字簽名依賴于公共密鑰加密學。
  11. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了認證系統的三種類型,即身份認證、數字簽名和消息認證,剖析了一些經典的方案,並對標準安全模式與隨機oracle模式做出比較,並基於隨機oracle模式提出了一個新的身份認證演算法及其相應的數字簽名變形,兩個演算法均在橢圓曲線上實現。
  12. Digital signature based on elliptic curve

    橢圓曲線數字簽名在電子政務中的應用
  13. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證方案進行綜合的分析和比較,並結合監獄指紋點管理系統對身份認證方案的具體要求,設計了基於指紋識別、數字簽名及智能卡技術於一體的個人身份認證方案,並將它在監獄指紋點管理系統中予以實現。
  14. Among these, signature technology ensures participator ' s identification against malicious bugging and distorting, and plays an important role in protecting the security of networking communication

    其中數字簽名技術能夠確認參與者的身份,防止惡意的偽造、竄改,在網路通信安全方面起到重要的保護作用。
  15. A sequential multi - signature digital scheme based on rsa

    的有序多重數字簽名方案
  16. A set of signers can digitally sign a message

    一組者可以為郵件進行數字簽名
  17. Using virtual servers, digital signatures on all os components, and a large number of read - only pieces in the os, strongbox is highly resistant to security breaches

    通過使用虛擬服務器、所有os組件上的數字簽名以及os中大量的只讀部分, strongbox可以非常有力地防禦安全攻擊。
  18. The system was designed by dynamic asp ( active server page ), secure socket layer, digital signature and certification technologies

    系統應用了動態asp技術和據庫技術、安全套接協議、數字簽名和身份認證技術。
  19. Digital signatures allow messages to be as authentically sent by the origin user or software

    數字簽名使初始用戶和軟體能夠可靠地發送信息。
  20. With the reference of digital signature theroy, presenting a practical authentication algorithm based on fragile watermarking. the algorithm has applied patent right

    借鑒數字簽名的思想,提出一種基於脆弱水印的實用認證演算法。該演算法已經提出專利申請。
分享友人