非秘密性 的英文怎麼說

中文拼音 [fēixìng]
非秘密性 英文
non-confidentiality
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : 秘Ⅰ形容詞(秘密的) secret; mysterious Ⅱ動詞(保守秘密) keep sth secret; hold sth back Ⅲ名詞(使...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 秘密 : secret; clandestine; confidential
  1. Kissinger ' s very personal and conspiratorial approach to diplomacy, combine with nixon ' s mcluhanesque electronic style, of using television for his dramatic coup de th tre announcements, provided a sort of surrealist vision of twentieth - century diplomacy

    基辛格常喜歡搞私人外交,加上尼克鬆的麥克盧恩式的電子作風,在電視上宣告戲劇的驚人之舉,提供了一幅20世紀外交的超現實主義的圖景。
  2. In the recognition of the crime which is established or not, the author probe emphatically the position and effect of " cause huge damage " in this crime. through analyzing " the doctrine of the sign of consunmation " and " the doctrine of the sign of institution, " the author bring forth two legislation design patterns of this crime : the first one is to adhere to the viewpoint that " cause huge damage " is the constitive requisites of this crime, that only intention and " cause huge damage " together can constitute this crime. the second one is to adhere to the viewpoint that both negligence and indirect intention can constitute this crime only under the circumstance of " cause huge damage ", but direct intention act, which has not caused huge damage, can also constitute the preparation for this crime, crime attempt and discontinuation for this crime ; analyse and compare the related charges of crime

    在罪與罪的認定中,重點探討了「造成重大損失」在本罪中的地位和作用,對數領犯和結果犯的含義進行了探討,對「既遂標志說」和「成立標志說」進行了對比分析,提出了本罪的立法設計方式:過失和間接故意只有造成重大損失的才構成本罪,而直接故意實施侵犯商業的行為是典型的行為犯,雖未造成重大損失,但其他方面的情節、後果等惡劣的可以構成本罪的預備、未遂、中止形態,只有這樣才能符合該罪的立法意圖:全面、有力地打擊侵犯商業行為,而且做到不同質區別對待
  3. In addition, in order to implement the protection inside the mobile agent, five security requirements of defense : availability, integrity, confidentiality, accountability and anonymity, must be attained. among the five security requirements, confidentiality and anonymity are two important ones, and do not have an all - around solution. this paper focuses on the mobile agent security from macrostructure and microstructure

    另外,為從移動agent內部實現對其安全保護,移動agent安全方案必須實現五個安全目標:可用保護,完整保護,保護,可記帳保護和匿名保護,其中和匿名是其兩個常重要的安全指標,且目前還沒有較好的解決技術。
  4. Independent is to keep some distance between countrymen associations and governments. constructive means that countrymen associations are asked to have constructive organs and systems of their own. public and legal are to make bounds between countrymen associations and secret or gangland organizations

    政治使農民協會與政黨或政治團體相區別;公益使農民協會與企業組織相區別;自主使農民協會與政府保持一定距離;組織化要求建立農民協會的組織機構和組織體系;公開和合法把農民協會與社團或黑社會組織劃清了界限。
  5. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加系統,該系統將對稱加演算法3des與對稱加演算法rsa相結合對數據加,用公鑰演算法rsa和單向散列函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加、數字簽名、身份認證等功能,保證了發送方所發送信息的、鑒別、完整及不可否認
  6. The good : the puzzles are varied and challenging ; the game sticks closely to the book and film but adds new content of its own to pad out the adventure ; relatively lengthy storyline with secrets and unlockables to find

    優點:迷題種類多樣且具挑戰;游戲和原著、電影常接近,但是增添了自己的一些東西來加長冒險的流程;相對較長的故事情節中有各種和可額外開啟的內容供玩家探索。
  7. The so - called stimulating properties of coffee were thought by many during these ancient times to give a sort of religious ecstasy, and the drink earned a very mystical sort of reputation, shrouded in secrecy and associated with priests and doctors

    咖啡所謂刺激的特在古代期間已被很多譽為到類似宗教狂喜,並且被譽為是一類常神的名聲,覆蓋並且同神父和醫生交往。
  8. The former means the concerned party has legal reason and means to gain access to the trade secrets of others but has the obligation to keep these secrets confidential. once he violates the obligations by disclosing, utilizing or allowing others to utilize the trade secrets to his knowledge, his act will constitute trade secret torts ; while in the latter case, the concerned party acquires or gains access to others " trade secrets by means of disclosure by non - right - holder, emphasizing the illicit aspect of actor

    前者意味著相對人對他人的商業雖是合法獲知,但卻負有一定的保義務,一旦其違背了這種義務,披露、使用或允許他人使用其所掌握的商業,就會構成對他人商業權的侵犯,而在後一種情況下,相對人對他人的商業是以權利人披露的方式獲知或掌握的,強調的是行為人行為的不正當
分享友人