秘密性 的英文怎麼說

中文拼音 [xìng]
秘密性 英文
confidentiality
  • : 秘Ⅰ形容詞(秘密的) secret; mysterious Ⅱ動詞(保守秘密) keep sth secret; hold sth back Ⅲ名詞(使...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 秘密 : secret; clandestine; confidential
  1. 25. 4 september 1996 : 145 - 8. 1997. the strategy of abjection : a review of

    猥褻的策略運用:讀《一位同戀者的手記》 。
  2. Firstly, base on the hohl ' s limited black box approach, we propose a supplementary mechanism which puts a registry module on tcp for registering the input events to prevent black box tests in order to really protect confidentiality of mobile agent

    秘密性保護是在hohl的時限黑箱保護方案基礎上給出一種補充保護措施:通過在tcp上放置一個rm ,完成對輸入事件的注冊保護,防止了對黑箱的測試,真正實現移動agent的秘密性保護。
  3. ( 3 ) the embedded watermark can be extracted only by using a secret key

    ( 3 )採用鑰以加強水印的秘密性
  4. About theorem, the paper introduces the syntax of ideal, also the first time uses concept of honest ideal to define secrecy goal of protocol and utilizes honest ideal logic to specify secrecy property. at the same time, this paper corrects one not so perfect lemma proving in a literature written by f " abrega, herzog and guttman

    在理論上,本文引入了理想的語義,並首次使用了理想的概念對安全協議的秘密性進行嚴格的定義,同時使用理想的命題邏輯公式表示安全協議的秘密性;另外,本文修正了f ' abrega 、 herzog和guttman三人文獻中的一個引理的證明,原有的證明是不完善的。
  5. I got a perfect score on the secret test in the sat

    秘密性向測驗我考了滿分
  6. Jp : but do you find the whole secrecy issue, the need for secrecy, a bit ridiculous

    但是你知道完全的秘密性,發行必要少量的滑稽?
  7. The important consisting condition of trade secret includes secret nature, valuable nature and managing nature

    商業的構成要件包括秘密性、價值和管理
  8. Through encrypting and decrypting information, the system guarantees the secret and dependability of the information

    通過對傳輸信息的加與解,保證了信息的秘密性和可靠
  9. The second part researches the confidentiality and anonymity of mobile agent from their internal structure

    本文的第二部分從秘密性和匿名兩個方面研究從移動agent內部實現其安全保護問題。
  10. The president said hayden will enforce the secrecy and accountability that are critical to u. s. national security

    布希總統說,海登會確保情報工作的秘密性和責任,這兩點對美國的國家安全至關重要。
  11. Without using overt work as a cover, it would be very difficult for us to undertake covert work ; overt work guarantees the success of covert work

    沒有公開工作的掩護,工作是很難建立的,有了公開工作的掩護,才更保護了我們工作的秘密性
  12. The sender of an internet communication can not necessarily be presumed to be who he says he is, nor can the sender always be sure of the recipient s true identity

    另一把叫「私人鑰匙」 ( privatekey ) ,這把鑰匙只能由其持有人知道,並且必須保持秘密性
  13. Ssl is the abbreviation of secure socket layer, which can implement secret transportation. the netscape corporation put forward the ssl protocol whose edition is 3. 0 now

    Ssl是securesocketlayer (安全套接層協議)的縮寫,可以在internet上提供秘密性傳輸。
  14. In addition, in order to implement the protection inside the mobile agent, five security requirements of defense : availability, integrity, confidentiality, accountability and anonymity, must be attained. among the five security requirements, confidentiality and anonymity are two important ones, and do not have an all - around solution. this paper focuses on the mobile agent security from macrostructure and microstructure

    另外,為從移動agent內部實現對其安全保護,移動agent安全方案必須實現五個安全目標:可用保護,完整保護,秘密性保護,可記帳保護和匿名保護,其中秘密性和匿名是其兩個非常重要的安全指標,且目前還沒有較好的解決技術。
  15. Consequently, it is strongly recommended that freedom in communication be put into the civil right protection system and be paralleled with secrecy in communication

    認為通訊具有特定秘密性、價值和合法的特徵,是隱私權的下位概念,法律對隱私權的保護同樣適用對通訊的保護。
  16. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加系統,該系統將對稱加演算法3des與非對稱加演算法rsa相結合對數據加,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別、完整及不可否認
  17. Firstly, it defines the trade secret according to " unfair competition law " as follows : trade secret is novel and practical technology information and operating information which is forbidden to public and can bring profit to the right owner, and is armed with secrecy measures. secondly, it explains the characteristics of trade secret as confidential, novel, practical, valuable

    筆者認為商業的構成要件由新穎、實用、價值秘密性組成,法律保護符合商業構成要件的技術信息和經營信息,並進一步指出商業法律保護范圍目前從國際國內看均在擴大,已經抽象到最根本的形式? ?信息。
  18. A machine checkable logic of knowledge for specifying security properties of electronic commerce protocols. in proc. 13th ieee annual symposium on logic in computer science lics98 workshop on formal methods and security protocols, indianapolis, indiana, june 21 - 24, 1998, http : citeseer. ist. psu. edu clarke98machine. html

    為了驗證更多的質,我們的公理集中加入了一些新的特,如動態,使我們可以推導協議的每個執行步所得到的知識還有秘密性,我們在公理中加入那些處理智能體間共享的公理
  19. Confidentiality is the fundamental nature of trade secrets ; novelty and taking measures to keep confidential are the inherent requirements of confidentiality and value is the inevitable expression of confidentiality

    其中,秘密性是商業最本質的屬,新穎和採取保措施是保的內在要求,價值則是秘密性的必然體現。
  20. Secrecy is the presupposition of the trade secret to proper and reasonable measures. values can make its holders to keep the competitive priority for marsting the trade secret

    秘密性是商業維系其經濟價值和法律保護的前提條件,秘密性還要求其持有人應當採取了適當的、合理的保措施。
分享友人