簽性 的英文怎麼說

中文拼音 [qiānxìng]
簽性 英文
chemotaxis
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  1. 3it also requires countries to clear all territory of antipersonnel mines with in 10 years off when they joined the treaty

    這個組織還要求成員在了條約后10年清除在領土內的殺傷地雷。
  2. The undeniable signature scheme based on bilinear pairing

    基於雙線對的不可否認
  3. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠、交易者身份的真實、數據電訊的機密和完整、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字名的概念及原理,並以bolero為例介紹了數字名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴
  4. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    數字名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行名,來代替書寫名或印章,確認名者的身份、數據來源和完整,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。
  5. Drycleanability of leather garments - specification for drycleanability and for appropriate care labels

    皮革服裝耐乾洗.第1部分:耐乾洗和正確保養標規范
  6. The preparation technique study of modified casein adhesive

    酪蛋白標膠的研製
  7. Chapter 3, introduces the cryptogram technology which the e - signature stamper system will use

    其中,數字名技術尤為重要,它是提供信息完整、機密、不可抵賴的基礎。
  8. Other commentators, inspired by james frazer ' s theories, have additionally labeled mithras a mystery religion with a life - death - rebirth deity, comparable to isis, the resurrected jesus or the persephone / demeter cult of the eleusinian mysteries

    其他評論,受啟發于詹姆士的理論,加之又把密特拉教套上神秘宗教的標,是生命?死亡?再生的神,可與伊希斯,耶穌的復活或者古代希臘神秘的帕爾修斯/得墨忒耳的祭禮相比較。
  9. Epigenetic marks are so named because they can dramatically affect the health and characteristics of an organism ? some are even passed from parent to child ? yet they do not alter the underlying dna sequence

    它們被稱為外遺傳標,是因為它們不會改變其下方dna的序列,但對生物體的健康及特徵卻有戲劇的影響,有些甚至能從父母傳給子女。
  10. Bamboo art can be roughly classified as bamboo fretwork, woven bamboo items, bamboo skewer craft, glued bamboo items, bamboo carvings and spatial installations. representatives of these types are exhibited in each display area while this area provides a more general introduction to the traditional bamboo hollowing, weaving and carving crafts. the tools used and the processing of the raw materials is also explained here

    竹工藝大致可分為鑿制竹器竹編器物竹工藝膠合竹器竹雕工藝及空間裝置等,除了各展區有成品展出外,本區對較傳統的鑿制竹編竹雕等做個概念的說明,順便將工具使用與生料處理加以介紹。
  11. Commerciality individual housing borrows money ( mortgage loan namely ) compare loan of housing accumulation fund to want to the demand bearing of borrower comfortable a lot of, have the effective and resident status, natural person that has capacity of completely civil action to want to satisfy following condition to be able to apply for only : the profession that has stability, income and repay ability ; the capital fund that the bank is approbated serves as guaranty or impawn ; the unit of put on sale that buys housing with place signed the contract that buy a house or book of the intent that buy a house

    商業個人住房貸款(即按揭貸款)對借款人的要求相比住房公積金貸款要寬松許多,具有有效居留身份、有完全民事行為能力的自然人只要滿足下列條件即可申請:有穩定的職業、收入和償還能力;有銀行認可的資產作為抵押或質押;與所購住房的發售單位訂了購房合同或購房意向書。
  12. It uses xml encryption, xml signature and ssl technology to design and implement the solution of transmission of tender and evaluation documents separately which are based on the different security requirement. the solutions guarantees the secrecy, incontestability, integrity and identity authentication in the transmission of the bidding documents

    在標書傳遞子系統中根據不同的安全需求,使用xml加密、 xml名和ssl技術分別為投標書和評標書設計並實現了安全傳遞的方案,確保了標書傳遞中的保密、完整、長期不可否認、時間有效和用戶身份正確
  13. A foreign party who contributes industrial property or proprietary technology shall deliver documentation relating to thereto, including photocopies of the letters patent or trademark registration certificates, statements of validity, technical feature and practical value thereof, the basis for calculating the price, and the agreement signed with the chinese partner on the value thereof, as annexes attached to the joint venture contract

    外國合營者以工業產權或者專有技術作為出資,應當提交該工業產權或者專有技術的有關資料、包括專利證書或者注冊商標證書的復製件、有效狀況及其技術特、實用價值、作價的計算根據、與中國合營者訂的作價協議等有關文件,作為合營合同的附件。
  14. Statisticians used this test in 1970 to check the randomness of the draft lottery.

    統計學家1970年曾經運用這種檢驗方法核查徵兵抽的隨機
  15. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的標識鑒別機制增加了新的用戶安全屬,即安全標和審計掩碼,以增加對安全操作系統下強制存取訪問控制和審計機制的支持。
  16. Xml is about data crossing platforms and turns to be one of the most popular formats for exchanging informatioa because xml is based on characters and separates contents through tags, so called semi - structural, it is born minable and transplantable

    Xml是跨平臺的數據,是當前最被看好的信息交換格式之一。由於xml具有以字元為基礎,以標為信息元劃分的半結構化的特點,天生便具有非常強的可挖掘與可移植
  17. It satisfies the fundamental secure properties of the electronic cash system with multiple banks, and besides, the realization process of the scheme is easier than e - cash protocol based on the blind group signature

    該方案除滿足多銀行電子現金方案的基本的安全質外,實現過程也比利用群盲名構造的電子現金協議簡單。
  18. In right of the early professional mutualism in the sino - qatar trade domain, and since both countries reached the trade agreement, the investment protection agreement and the dual taxation avoid agreement the economic trade relationship between the two sides developed more rapidly

    憑借著中卡兩國在商貿領域早已形成的行業互補,自兩國訂貿易協定、投資保護協定和避免雙重征稅協定以來,雙方經貿關系有了較快發展。
  19. Mylar - coated labels : personalize your dispenser to include any assortment of liquids, in any order, simply apply these self - adhesive, water - proof labels

    附配多樣標:親自分配,定製。裡面包含許多液體的分類。簡單地貼上這些自帶粘,水不能透入的標
  20. The performance detection and analysis of the tags are realized. the reader is integrated with the functions of microwave transmitter, receiver, data collector, digital signal processing ( dsp ), spectrum analyzer, field strength meter, and encoding

    該閱讀器集微波發射機、接收機、數據採集、數字信號處理、頻譜分析、場強測試及解碼等功能於一體,實現了對電子標簽性能的檢測與量化分析。
分享友人