篡改者 的英文怎麼說

中文拼音 [cuàngǎizhě]
篡改者 英文
interpolator
  • : 動詞(奪取, 多指篡位) usurp; seize
  • : Ⅰ動詞1 (改變) change; transform 2 (修改) revise; alter; modify 3 (改正) rectify; correct 4 ...
  • : Ⅰ助詞1 (用在形容詞或動詞後面 或帶有形容詞或動詞的詞組後面 表示有此屬性或做此動作的人或事物) 2 ...
  • 篡改 : (用作偽的手段改動或曲解) distort; misrepresent; tamper with; falsify
  1. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名的身份、數據來源和完整性,防止數據被竊取、和破壞,從而達到保護數據的目的。
  2. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的數字通信網路中,數字簽名作為數據認證技術中的一項關鍵技術,可以解決否認、偽造、及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送的身份認證和不可抵賴性。
  3. Article 42 when an audit institution discovers that an auditee, in violation of the provisions of this law, transfers, conceals, falsifies or destroys accounting documents, account books, accounting statements or other material relating to budgetary revenues and expenditures or financial revenues and expenditures, the audit institution shall have the power to stop such acts

    第四十二條審計機關發現被審計單位違反本法規定,轉移、隱匿、、毀棄會計憑證、會計帳簿、會計報表以及其他與財政收支或財務收支有關的資料的,有權予以制止。
  4. Article 34 when audit institutions conduct audit, the auditees shall not transfer, conceal, falsify or destroy their accounting documents, account books, accounting statements or other information relating to their budgetary revenues and expenditures or financial revenues and expenditures, and shall not transfer or conceal the assets that are in their possession but obtained in violation of the regulations of the state

    第三十四條審計機關進行審計時,被審計單位不得轉移、隱匿、、毀棄會計憑證、會計帳簿、會計報表以及其他與財政收支或財務收支有關的資料,不得轉移、隱匿所持有的違反國家規定取得的資產。
  5. Article 28 if a person, in violation of the provisions of this law, tampers with or fabricates statistical data and thus gains titles of honour, material rewards or promotion, the institution that made such decision or the institution at a higher level, or a supervisory institution shall have the titles of honour annulled, the material rewards recovered and the promotion canceled

    第二十八條違反本法規定,統計資料、編造虛假數據,騙取榮譽稱號、物質獎勵或晉升職務的,由做出有關決定的機關或其上級機關、監察機關取消其榮譽稱號、追繳物質獎勵和撤銷晉升的職務。
  6. In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection

    數字水印是一種新的數字媒體保護技術,它是將特定的信息(如版權信息、秘密消息等)嵌入到圖象、語音、視頻等各種數字媒體中,以達到版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且有特定的恢復方法,此信息對非法接收應該是不可見的,本文主要對數字水印的一般框架,靜止圖象dct系數的理論容量,圖象水印的嵌入和檢測,數字媒體防以及數字水印的攻擊等問題進行了研究,提出了兩個新的水印算演算法。
  7. Article 26 leading members of local authorities, departments or units who alter statistical data without authorization, or fabricate statistical data, or compel or prompt statistics institutions or statisticians to tamper with or fabricate statistical data shall be given administrative sanctions according to law and criticized in a circulated notice by the statistics institutions of the people ' s governments at or above the county level

    第二十六條地方、部門、單位的領導人自行修統計資料、編造虛假數據或強令、授意統計機構、統計人員統計資料或編造虛假數據的,依法給予行政處分,並由縣級以上人民政府統計機構予以通報批評。
  8. Html tag tampering can include a hyperlink, submit button, or any other form tag

    Html標記可能包含超鏈接、提交按鈕或其他表單標記。
  9. Currently, security protocol is a hot research field in network security and has a very important effect for guarantee the network security. but, if the information has been displaced or modified by virus and trojan horse before encryption in that the transmitted information is invalid although the protocol is secure

    安全協議是當前網路安全領域的研究熱點,在保障網路安全方面起著重要的作用,但是如果信息在加密前被病毒、木馬程序替換或了,這樣雖然協議本身是安全的但是傳輸的信息已經失效。
  10. The experiments show that this means can find the juggling effectively and the sequence added the watermark is same with the primal sequence, which can let the attacker pay less attention to them

    實驗表明,此方法可以有效地發現對序列的惡意,經添加水印后的序列與原始序列有一定的相似性,不易引起篡改者的注意。
  11. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    本文的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計日誌方法,它可以支持目前常見系統的日誌文件,確保系統被入侵攻擊前的日誌文件記錄不被、刪除,使得入侵在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各類系統不同日誌文件組成日誌文件庫,為獲取和分析日誌文件的記錄提供支持; 3 )對各類日誌文件的記錄採用關聯分析,更有效的提取潛在的計算機犯罪線索。
  12. These digital media including images, characters, audio and video digitalized works are easy to store, design, transmit and duplicate, and accelerate communication and transmission of knowledge and information. while it offered convenience to some illegal persons who can distort, attack and pirate the achievement maliciously at the same time

    這些數字化的圖形、文字以及音頻、視頻作品的易存儲加工、易傳輸復制的優點加快了知識與信息的交流與傳播,但同時也為一些非法提供了惡意、攻擊、盜用他人勞動成果的便利條件。
  13. And all words in every set can be classified into two types. then according to the different types of the words, the words in every set are embedded into two watermark groups in a specific watermark embedding way, and their contents are associated with embedded watermarks. so during watermarking detection, the action that the attacker deliberately distorts or modifies the watermarking feature by extracting watermarks consciously or not can be found easily, and the text integrity detection performance can also be enhanced

    按此思路,對全文2字元以上的單詞將它們分為3個集合(即3層)並將之作為水印嵌入對象,而每層的所有單詞又區分為2類,對每層的單詞按一種水印嵌入方式嵌入2組(次)水印,而對單詞嵌入水印信息的時候根據其類別的不同以不同方法嵌入,使水印的嵌入與單詞內容相關,以利於水印檢測時能夠發現某些情況下攻擊有意或無意地保留水印而對文本內容進行刻意直接修水印特徵的行為,以增強文本完整性檢測的性能。
  14. The 7th heir has one of following action, forfeit right of inheritance : ( one ) kill intentionally by heir ; ( 2 ) of to contend for bequest killing and other successor ; ( 3 ) abandon by heir, perhaps mistreat section of favor be accedinged serious ; ( 4 ) forge, distort or will of destroy by melting or burning, the clue is serious

    第七條繼續人有下列行為之一的,喪失繼續權: (一)故意殺害被繼續人的; (二)為爭奪遺產而殺害其他繼續人的; (三)遺棄被繼續人的,或虐待被繼續人情節嚴重的; (四)偽造、銷毀遺囑,情節嚴重的。
  15. Integer solution of government networks security aiming at hidden trouble of network security is studied thoroughly in this paper, such as host computer of government network may be attacked by illegal in break, sensitivity data may be revealed or modified, information of intranet to internet may be wiretapped or tampered, etc. firstly, the security of government network, consisting of security analysis of risk, requirement, strategy and target of government are analyzed

    本文針對電子政務系統網路中的主機可能會受到非法入侵的攻擊,網路中的敏感數據有可能泄露或被修,從內部網向公網傳送的信息可能被他人竊聽或、系統工作效率可能受到嚴重影響等安全隱患,對電子政務系統網路安全整體解決方案進行了深入研究。
  16. A security issue has been identified that could allow an attacker to tamper with the file transfer location on your computer when using the microsoft windows ftp file transfer protocol client

    現已確認存在一個安全問題,在使用microsoft windows ftp文件傳輸協議客戶端時,攻擊可能會利用此問題計算機上的文件傳輸位置。
  17. Some alter or replace system files. these need careful handling and are best left to experts or automated tools

    一些木馬替換系統文件。這樣的需要仔細的處理,最好是給專家或利用工具解決。
  18. In key management, the interception and modification of exchanged keys by an attacker

    在密鑰管理中,攻擊截取並交換密鑰的做法。
分享友人