系統鑰 的英文怎麼說

中文拼音 [tǒngyào]
系統鑰 英文
system key
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • : 鑰名詞(鑰匙) key
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. Contract with yanjing ( guilin ) beer co. involving fermentation tank, bbt and tank area ; turnkey project of 100, 000t brewhouse for zhejiang xiandu beer factory ; contract with chengde sihai brewery involving all fermentation tank and bbt ; order from a transnational company involving fermentation tank ; other large quantities of contract from a world famous beer company and juice company. the total contract value exceeds rmb1, 000, 000, 000

    由樂惠寧波公司負責總承包的燕京福建啤酒有限公司60m3冷麥汁的糖化匙工程項目,經過約80天的施工近日一次投料試車成功,各項指標全部合格,目前已經進入全面試生產階段。同樣由樂惠公司承接的36個不銹鋼發酵罐和8個清酒罐早於6月底開始交付燕京啤酒投入使用,以滿足燕京啤酒供不應求的市場需求。
  2. Cary put his key card into the security system slot

    凱瑞將他的匙卡插入保全
  3. Offering the card issuing key educing service in ic card key management system

    在ic卡密管理中,提供發卡密導出服務
  4. In sna products, a key used to encipher operational keys that are to is used at a node

    網路體結構( sna )產品中,對將要在某個網點上使用的操作鍵標進行加密的一種鍵(也稱鍵標,也就是密) 。
  5. Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on

    研究了公加密中的橢圓曲線加密理論,詳細闡述了有限域上橢圓曲線的結構及其基本運算; 3
  6. Given the sensitive nature of the information in the keystore, even placing it on a shared network accessible file system is inadvisable

    考慮到密存儲庫中信息的敏感性,即使將它放在可通過網路訪問的共享文件中,也是不妥當的。
  7. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密被盜取的威脅;使用基於角色的pmi實現中的訪問控制,保證了策略傳輸的機密性,完整性。
  8. The application of computer key in the interlock system of preventing mishandling

    電腦匙在微機防誤閉鎖中的應用
  9. Its scope of business covers fields such as pleasure garden, agriculture, golf and waterscape engineering and it has the ability to provide its customers with one - stop integrated solution for irrigation and waterscape system and turn - key project

    主要從事灌溉與水景設備的生產、銷售、工程承包以及灌溉水景的設計、技術咨詢和培訓,業務范圍涉及園林、農業、高爾夫、水景工程等領域,能為用戶提供灌溉與水景一站式整體解決方案及交匙工程。
  10. This protocol is verified by applying the expanded ban logic, and its reparability is proved as well in the same chapter, and a hierarchical key distribution system model is given out and the corresponding expanded protocol, which we call authentication based hierarchical reparable key distribution protocol, is proposed as well

    研究了層次化密分配模型以及基於鑒證的可修復密分配協議在這種模型下的擴展。軍隊、政府、企業內部都是典型的層次化組織結構,我們提出的基於鑒證的層次化可修復密分配協議非常適宜這些的應用。
  11. This article describes how to configure openssh for host - based and public key - based authentication for the aix, linux, solaris, and hp - ux operating systems

    本文描述如何為aix 、 linux 、 solaris和hp - ux操作上基於主機和基於公的認證配置openssh 。
  12. Koal key management system is the core of the ic card application system security. its effectiveness has a direct impact on the whole system s security

    格爾密管理是ic卡應用的安全核心,密管理的安全性將直接影響到整個的安全。
  13. In this paper, members serving system, popular web developing technology and pki ( public key infrastructure ) are introduced firstly. then, after analyzing the system in detail the author makes the conclusion that using mvc architecture based on jsp technology to build members serving system is a good method. furthermore, the method of system analysis and design using uml with rational rose tools is introduced

    文中將首先介紹期貨交易所會員服務,當今流行的電子商務平臺的開發技術,及pki公開密基礎設施技術,之後從期貨交易所會員服務的功能需求出發,經過詳盡的分析確定以jsp技術為基礎的mvc框架結構,並結合使用rationalrose工具描述了如何利用uml語言進行分析與設計。
  14. Policy server is not a part of the model of cidf. the policy server refers to kerberos system. it realizes concentrate authentication and key management

    策略服務器的設計參照了kerberos,它實現了一種集中式的認證和安全的密分發。
  15. An electronic key system, personal electronic safe, private bath and a separate shower, refrigerator / mini - bar, hairdryer and shaving adapter, international direct dial ( idd ), access to satellite television channels such as cnbc asia, cinemax, espn, discovery and disney. private balcony that commands a magnificent view of the golfing green, the tropical garden or the swimming pool

    電子,個人電子保險箱,四人於是和分離式淋浴,冰箱/迷你吧,吹風機和剃須刀,國際長途直撥電話,衛星電視頻道,私人高爾夫球場景陽臺,主題公園或者游泳池
  16. The key management server of key management subsystem assumes the core function of key management. it offers the retraction and filing etc. the server cipher machine ensures the safety generation and safety issuing of the keys

    管理子中的密管理服務器承擔了密管理的核心功能,同時提供了撤消、歸檔等功能,服務器密碼機保證了用戶密的安全產生和安全分發。
  17. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基密,分別運用公開密進行交換,使通話各方各自產生完全相同的主密,巧妙地解決了密分配和加密解密同步的問題,並利用單向散列函數的性質,基於相同的演算法產生用於加密解密的一次一密會話密
  18. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  19. Article 22 a personnel of a releasing authority shall log in the release system by his or her own electronic key, user name and password and in strict accordance with the online operation rules

    第二十二條發證機構工作人員應嚴格遵守網上操作規程,使用本人的電子匙及用戶名和密碼登錄發證
  20. The business scope are all types of raw materials for light textile industry, chemical dyestuff, and accessories for textile machines. it is matched in the market with services like finance, post telecommunication, storage transportation and security care. as a open market, the orgnization and the relative dep of the government offer favorite services and policy, with a complete security system for a better business enviroment and economy development

    整個市場將實施全面的智能化管理,將可視對講機無線防盜報警周界防越安全三表遠傳計量園區監控停車場管理系統鑰匙管理物業綜合信息管理等有機結合起來,打造一個高度智能良好服務絕對平安的現代化紡織專業市場。
分享友人