它通过在数字空间里,不可伪造地认证用户,授予用户的权利范围、规范用户的行为方式来保障数字化信息的所有者和经营者的权利及利益。
It ensures the rights and benefits of the digital content owner and the consumer via user authentication, user rights granting, user behavior ruling in digital space.
他秘密地将信用卡信息传送给了伪造者们。
He secretly funnelled credit-card information to counterfeiters.
这就是为什么人们听到Burri博士声明退出关于她那项伪造研究的声明地时候会感到敬畏和高兴。
This is why it was so awesome and gratifying to hear that Dr. Burri had "backed down" from the claims of her spurious study. She admitted her mistake. Wow, what a woman.
这样就可以开始向空SOAP消息体里填充伪造的消息内容了,由于签名验证无误,那攻击者定义的任何一个操作都可以被有效地执行了。
The filling of the empty SOAP body with bogus content can now begin, as any of the operations denied by the attacker can be effectively executed due to the successful signature verification.
当此标记与XSS攻击结合在一起时—在已归档的攻击中最常见—用户可以在不知情的情况下轻松地对其凭证执行一些操作—因此是伪造的。
When this tag is placed with an XSS attack - which are the most common of the documented attacks - users can easily do something with their credentials without knowing it - thus, the forgery.
确切地说,共和党的分析报告并不全靠伪造的成本构成,还靠使用三卡蒙地欺骗术来让金钱消失。
To be sure, the Republican analysis doesn't rely entirely on spurious attributions of cost - t also relies on using three-card monte tricks to make money disappear.
许多的公司是提出装置阅读有点那确认被全世界地承认如不能透入的,而且它不能被伪造,一个指纹。
A number of companies are coming up with devices that read something that is universally acknowledged as proof of identification, and it can't be forged, a fingerprint.
品德是无法伪造的,也无法像衣服一样随兴地穿上或脱下来丢在一旁。
Character cannot be counterfeited, nor can it be put on and cast off as if it were a garment to meet the whim of the moment.
方案遵循按次计费的原则,消除了商家和消费者进行欺诈行为的商业动机,并能够有效地防止电子现金的伪造和超支花费。
The scheme followed the pay-per-view principle, removing the financial incentive to cheat and resisting against forgery and over-spending.
爸爸要我们放下手里的东西和他坐到屋外的台阶上,然后他微笑着和蔼地向我们解释了“伪造”一词的含义。
He asked us to put everything down and sit with him on the front step of our house. With a smile, he gently explained what the word "counterfeiting" meant.
同时该方案能有效地抵抗重放攻击,伪造攻击,猜测和窃取攻击,扮演攻击及用户合谋攻击等。
Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.
这张死亡证明书很明显地是伪造的。
财政舞弊是企业有意识地错报漏报会计信息,伪造盈利的会计造假行为。
Financial fraud is a conscious companies reporting accounting misstatements, false falsification of accounting surplus of conduct.
用最大距离可分码构造了一个理想门限体制,该体制中的秘密恢复算法可以正确地恢复秘密,并可检测出伪造的秘密份额,确定伪造者的身份。
An ideal threshold scheme is constructed from Maximum Distance Separable (MDS) codes, the recovery algorithm in this scheme can detect cheating, recover the correct secret and identify cheaters.
品德是无法伪造的,也无法像衣服一样随兴地穿上或脱下来丢在一旁。
Character cannot be counterfeited 6, nor can it be put on and cast off as if it were a garment to meet the whim 7 of the moment.
品德是无法伪造的,也无法像衣服一样随兴地穿上或脱下来丢在一旁。
Character cannot be counter feinted, nor can it be put on and cast off as if it were a garment to meet the whim of the moment.
财务舞弊是企业有意识地错报或漏报会计信息,伪造盈余的会计造假行为。
Financial fraud is a accounting false behavior of enterprise consciously misstating or omission of accounting information, and forging surplus...
这是因为传统的电子邮件都是基于MIME协议通过明文传送的,并且发送方可轻松地伪造自己的身份。
Traditionally, based MIME, email is transmitted in form of original text. The sender can easily forge his name.
这是因为传统的电子邮件都是基于MIME协议通过明文传送的,并且发送方可轻松地伪造自己的身份。
Traditionally, based MIME, email is transmitted in form of original text. The sender can easily forge his name.
应用推荐