自上世纪30年代初以来,瑞士银行一直为他们的银行保密系统和账户编号制度而自豪。
Since the early 1930s, Swiss banks had prided themselves on their system of banking secrecy and numbered accounts.
几乎所有的电话保密系统都使用回波抵消技术来实现全双工通信。
The echo cancellation technique is now widely used to implement the full-duplex communication in almost all telephone privacy systems.
瑞士著名的银行保密系统长期以来一直被那些要隐藏资产的人利用。
Switzerland's legendary bank secrecy has long been exploited by those with assets to hide.
一般而言,目前存在两种混沌密码形式:一种是模拟化的混沌保密系统;
Generally speaking, there are two kinds of chaotic cipher: one is the analog chaotic secure communications;
本文基于单向函数针对信息保密系统提出了一种双重认证的存取控制方案。
Based on a one-way function, this paper proposed an authentication-doubled access control scheme for information protection system.
本文基于复合问题针对信息保密系统提出了一种双重认证的存取控制方案。
Based on compound problem, this paper proposed an authentication-doubled access control scheme for information protection system.
这些结果推广了保密系统的通信理论,对密码体制的设计和理解提供了帮助。
These results develop communication theory of secrecy system and help to design and understanding of cryptosystem.
本文描述了密码保密系统的基本构成及实施密码保密过程中必须作出的选择。
This paper describes the basic building blocks of a cryptographic security system and the choice which must be made during the implementation of cryptographic security.
本文详细地分析了乘除算法,并讨论了该算法在RSA公钥保密系统中的应用。
Analysis of MD algorithm and its application to RSA public-key cryptosystems are given in detail.
研究表明,这种码字可以很方便地实现由密令、密位或密标组成的多层保密系统。
It is shown that a multiple encryption system consisting of encrypted instructions, encrypted locations and encrypted labels can be implemented by such a code without difficulty.
作为保护信息资源机密性和完整性的重要手段,访问控制在保密系统、商业系统中占据了重要地位。
As a way to defend information's confidentiality and integrity, access control takes a quite important role in military system and commercial system.
文章针对学科试题库安全与保密问题,提出了适用于学科试题库的安全保密系统,并证明了该系统的安全性。
This article analyzed problems of security and defense in subject test lib and then put forward a security and defense system of subject test lib, and proved security of this system.
我只是要说,通常情况下对安全系统的运作方式保密并不会提高安全,事实恰恰相反。
I'm just saying that in general, secrecy about how your security system works does not improve security, but rather usually the reverse.
X-37B由波音公司太空和情报系统部门经过严格保密条件在亨廷顿海滩建造完成。
The X-37B was built in tight secrecy by Boeing Co.'s Space and Intelligence Systems unit in Huntington Beach.
例如,美国或欧洲的医疗系统必须(在法律上)使某些医疗数据保密。
For example, a medical system in the U.S. or Europe must (by law) keep certain medical data private.
受试者的数据是匿名的,但是可以通过一个保密电子信息系统跟其家庭成员获得联系。
Patient data are anonymous, but the families can be contacted through a secure electronic-messaging system.
幸运的是,能够确保邮件从一台无处不在的计算机到另一台以及到存储在网络系统上的保密私人信息的加密技术已经存在。
Fortunately, cryptographic techniques already exist to secure messages from one ubiquitous computer to another and to safeguard private information stored in networked systems.
受国家知识产权局委托,负责国家知识产权局系统的安全保卫、保密和防火工作;
to be responsible for the safety and security, secretes guarding and fire protection of the State Intellectual Property Right Office under its entrustment;
我们还涉及到如何限制“Pre -Windows 2000 CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the Pre-Windows 2000 Compatibility access security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre-Windows 2000CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the “Pre-Windows 2000 Compatibility Access” security group as well as marking non-system-base as confidential.
通过这样,可以确保主题上的数据保密性,不过必须在中央预约系统上实现某种逻辑来加密消息。
In this way, data confidentiality can be ensured on the topic, even if some logic must be implemented to encrypt messages on the central reservation system.
这则笔记的目标不是系统地批评现有的保密法律,也不打算提出可行的替代解决制度。
This Note's goal is not to critique existing secrecy law systematically, nor to propose a feasible replacement system.
在很多类unix系统上,命令行值和环境可以被其他用户看到,所以不是在进程间保密地发送数据的好办法。
On many UNIX-like systems, the command-line values and environment variable values can be viewed by other users, so they aren't a good way to privately send data between processes.
他们还制定了一套三层保密的数据编码系统。
They have also developed a three-tier security fence to encode the data, which may come as welcome news to U.
对非保密的计算机信息系统来说,其攻击成功率达88%,被查出的仅占5%。
For non confidential computer information system, the attack success rate of 88%, was found only accounted for 5%.
CIA三部曲是广泛使用的信息保证(Information Assurance,IA)模型,此模型将保密性、完整性和可用性定义为所有信息系统的基础安全特征。
The CIA triad is a widely used information assurance (ia) model that identifies confidentiality, integrity, and availability as the fundamental security characteristics of all information systems.
如果客户希望就相关就业机会联系保密求职者,他们将通过我们的系统向求职者发送电子邮件。
If the customer desires to contact the confidential job seeker regarding an employment opportunity, they will send an email to the job seeker through our system.
通过多重保密措施处理,确保系统安全可靠地运行,提高了装备的持续战斗性能。
Measures for multiple security have been taken to ensure that the system can run safely and reliably, thus improving the equipment performance of continuous fighting.
通过多重保密措施处理,确保系统安全可靠地运行,提高了装备的持续战斗性能。
Measures for multiple security have been taken to ensure that the system can run safely and reliably, thus improving the equipment performance of continuous fighting.
应用推荐