機密 的英文怎麼說

中文拼音 []
機密 英文
1. (重要而秘密的) secret; classified; confidential; privacy 2. (機密的事)secret:泄漏機密divulge secret; leakage of (a state or party) secret; 嚴守國家機密 strictly guard state secrets
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  1. Free access to secret information should be avoided.

    機密資料的隨意接觸應該避免。
  2. Represents the secret key for the symmetric algorithm

    表示對稱演算法的機密鑰。
  3. Mr. allen betrayed a top secret, and had to face the music.

    艾倫先生泄露一項最高機密,因而必須接受責罰。
  4. At chrysler, bad morale and security leaks were showing up on the balance sheets.

    在克萊斯勒公司,士氣低落和機密的泄漏逐漸地反映到收支帳目上來了。
  5. Guy bought national secrets on the black market

    他拿國家機密來做黑市交易
  6. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證構,第五章介紹了信息加技術以及各國立法對碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  7. Take the classified documents and burn the others

    機密文件全部帶走,剩下的燒掉
  8. Members of the us congress are also refusing to comment on the contents of the classified document

    美國國會的成員也同樣拒絕解釋機密文件的內容。
  9. " i ' m not gonna comment on the document ' cause it ' s a classified document, but every intelligence analyst i speak to confirms that.

    我不會對文件進行解釋,因為這是機密文件,但每一為與我通話的情報研究員都可以證實(這件事) 。
  10. The veteran13 spy was arrested sunday evening just after leaving a package of classified documents for his russian handlers at a designated14 " dead drop15 " in suburban virginia

    周日晚,在弗吉尼亞郊外的一個指定的情報藏匿地點,在為俄國接頭人藏好一包機密文件后,這個資深特工就被逮捕了。
  11. The veteran13 spy was arrested sunday evening just after leaving a package of classified documents for his russian handlers at a designated14 “ dead drop15 ” in suburban virginia

    周日晚,在弗吉尼亞郊外的一個指定的情報藏匿地點,在為俄國接頭人藏好一包機密文件后,這個資深特工就被逮捕了。
  12. Talks between lawyer and client are privileged.

    律師與當事人的談話是機密的。
  13. Classified information was given to them in their capacities as commanders in chief

    機密資料發給具有總司令身分地位的他們。
  14. Tell jamieson this is to be confidential and in code.

    對傑美生說這是機密的,用碼拍發。
  15. We must n't allow such a person access to confidential matters of the state.

    不能讓這樣的人與聞國家機密
  16. Cryptogram programming of confidential information is an effective tool for ensuring information security

    機密信息的碼化是保證信息安全的一種有效手段。
  17. Chapter 3, introduces the cryptogram technology which the e - signature stamper system will use

    其中,數字簽名技術尤為重要,它是提供信息完整性、機密性、不可抵賴性的基礎。
  18. Enigma, adapted from british author robert harris ' s best - selling novel, tells the tale of bletchley park, britain ' s top - secret code - breaking unit set up to smash the famous enigma cypher used by the german u - boats

    《謎》一片的劇本是以英國作家羅伯特?哈里斯的同名暢銷小說改編而成的,小說講述的是英國設立高機密碼破解小隊破解德國u型潛艇使用的「謎碼的故事。
  19. These fact - filled summaries provide revealing mind control information from both landmark books and declassified government mind control documents

    這些充滿事實依據的摘要提供了關于精神控制信息的說明,包括里程標式的圖書以及非機密的政府精神控制文件。
  20. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加措施
分享友人